Zip Recruiter Logo
Jun. 10, 2011 By John Pinson

Adventures at the Deliverability Summit – Part 3

We’re hoping to get some thoughts posted from all of our Deliverability Summit panel participants, and Dennis Dayman was nice enough to provide the following.

Read more
Zip Recruiter Logo
Jun. 7, 2011 By John Pinson

Adventures at the Deliverability Summit – Part 1

Great session yesterday at the Deliverability Summit, with a bigger than expected turnout. Kudos to Barry Abel, Carrie Scott and Mike Hillyer for hosting and presenting, and to George Schlossnagle for leading the expert panel.

Read more
Jun. 6, 2011 By George Schlossnagle

At the Deliverability Summit…

We held our Deliverability Summit earlier today, and had a great turn out – probably around 45 or 50 clients, friends and industry colleagues on hand. We’ll have more about the event later, but I just wanted to quickly share a short post based on my remarks at the beginning of the event. In looking at deliverability, my relatively external viewpoint is that the job of deliverability folks basically boils down to two types of activities - the proactive and the reactive.

Read more
Apr. 26, 2011 By Dave Lewis

Right and Wrong Lessons From Recent Data Breaches

My friend Ken Magill has been right to call out some of the over-the-top (arguably stupid) assertions made around the Epsilon breach. But there’s another category of statements that offend my sensibilities – those that take this unfortunate incident and an issue core to the well-being of our industry — customer trust — and twist them to their competitive advantage. Or try to, anyway.

Read more
Apr. 18, 2011 By Dave Lewis

Breaches and Consequences: Thoughts On A Way Forward for the Email Community – Part 2

What I want to talk about here is how we move forward in addressing data security — more precisely, a framework for addressing the issue, not the particulars. First, I’m pleased to see various industry organizations mobilizing to form task forces, etc. to address this challenge — DMA, ESPC, MAAWG, OTA, etc.

Read more
Apr. 18, 2011 By Dave Lewis

Breaches and Consequences: Thoughts On A Way Forward for the Email Community – Part 1

There’s been a lot of ink spilled recently regarding data breaches among the email service provider community. Some comments I’ve found to be well-reasoned and constructive while others to be alarmist (even borderline irresponsible) or drilldowns on side issues that don’t really matter much at this point. But what concerns me most are the voices that minimize what’s happening.

Read more
Apr. 11, 2011 By Dave Lewis

Permissions and the Road to Improved Deliverability – Let’s Rethink This

I participated in a lively exchange online with some email industry colleagues recently around the topic of improving deliverability through permission-based lists versus data management techniques, such as list hygiene. My contention was that for years the industry has been hung-up on the term ‘permission’ – single opt-in, confirmed opt-in, double opt-in, etc. But at the end of the day, does permission really matter?

Read more
Mar. 14, 2011 By Mike Hillyer

Message Queuing & Segregation: Lessons from the Airline Industry

Many email marketers are unaware of the importance of message queuing to the successful delivery of their email. As a component of their messaging infrastructure, queuing is something that marketers typically defer to their IT department to manage. Yet, the reality is that queuing and the segregation of message streams can make the critical difference between the success and failure of a company’s messaging programs, and therefore, should be of concern to both the IT and marketing departments.

Read more
Mar. 11, 2011 By Alec Peterson

Let’s Not Panic About The Transition To IPv6

A handful of articles in the British tech press earlier this week attracted a lot of attention in the email anti-abuse community because of issues raised about IPv6 potentially obsoleting certain spam-blocking techniques (see: http://www.theregister.co.uk/2011/03/08/ipv6_spam_filtering_headache/). While caution is warranted in the transition to IPv6, there’s no reason to panic.

Read more