Archive | Abuse RSS feed for this section
Being Patient (and Self-Sufficient) in Today’s Email World

Being Patient (and Self-Sufficient) in Today’s Email World

Abuse, Dennis Dayman, ISP - July 20, 2012 - Comments Off

I know, sort of a silly title and sounds like a therapy email session in the works, but I thought I might use this piece to talk a bit about how we all need to have a little patience with email and those who power it. These past few weeks I’ve being hearing a lot [...]

Email Mythology Part II: Gods of Deliverability

Email Mythology Part II: Gods of Deliverability

Abuse, Ask the Experts - April 19, 2011 - 4 Comments

In the world of Greek mythology, all of the gods are, well, gods, but that doesn’t mean they are all equal. Zeus, for example, is the king of them all. Is there a “Zeus” of email deliverability? Not necessarily. But there are quite a few individuals who have risen above the rest and become presidents, founders, CEOs, or CTOs of various email related companies. A few of them are briefly profiled here, in no particular order.

Email Mythology, Part I: Goddesses of Email Deliverability

Abuse, Ask the Experts, ISP - March 21, 2011 - 2 Comments

The world of email deliverability seems, at first glance, to bear little resemblance to Greek mythology. However, there are some similarities. In the email industry, many dedicated professionals use their talents to make sure that email keeps progressing as new innovations come to light.

Fishbowls Aren't Always As Transparent As You Think…

Abuse, Permission - March 3, 2011 - 6 Comments

REPOSTED from my ClickZ column. —— About a week ago, I received a “spam” message promoting a virus protection company’s anti-spam products. At first, I was a bit floored that it was from an anti-spam company when I didn’t ask…

Deliverability Reporting: Gateway to Dividends

Deliverability Reporting: Gateway to Dividends

Abuse, Best Practices, Feedback Loops, ISP - January 31, 2011 - 1 Comment

When dealing with various types of sending infrastructure, many questions arise about what happens to the mails injected into the system. Were they delivered to the inbox? How rapidly were they deployed? Which email sources/domains performed most efficiently? Which destinations performed sluggishly?

A guide for new ESP abuse representatives at MAAWG

A guide for new ESP abuse representatives at MAAWG

Abuse - November 15, 2010 - Comments Off

I recently had the pleasure of meeting Sally from the email marketing company MadMimi while attending our MAAWG meeting in Washington DC. She asked if we would post this for her to the blog. ********************************************************************************** Laura from Word to the…

How to Improve Your Email Reputation Score

How to Improve Your Email Reputation Score

Abuse, Best Practices, Permission, Reputation - October 22, 2010 - Comments Off

Permission and reputation goes hand-in-hand in achieving email deliverability. Reputation is like your credit score; it is hard to build the reputation, but it is really easy to lose it. Furthermore, it takes time and effort not only to build…

Let's Rate Angie's List

Let's Rate Angie's List

Abuse, Best Practices, Permission - August 24, 2010 - 3 Comments

So the other day I saw again another commercial for the online rating service called Angie’s List. Per their site and if you have ever seen their commercials, Angie’s List is where you’ll find thousands of unbiased reports and reviews…

A Night at the Email Museum

A Night at the Email Museum

Abuse, CAN SPAM, ISP - August 10, 2010 - 2 Comments

The bottom floor will contain an important educational experience for visitors to further connect with their emotions and leave their feelings. Visitors will be able to question, interact, and, more importantly, figure out how they can contribute to eradicating spam. Ultimately, they will commit to be part of a culture that understands, respects, and supports the rights of legitimate senders

Emails' Lone Ranger: The Deliverability Consultant

Emails' Lone Ranger: The Deliverability Consultant

Abuse, Ask the Experts, Best Practices, Feedback Loops, ISP, Reputation - June 2, 2010 - 7 Comments

Depending on the scope of the project, these consultants offer a wide range of deliverability services, including, but not limited to a deep understanding of list quality and data collection, email authentication best practices, setting up FBLs, bounce handling and infrastructure.

Spamhaus Launching Domain Block List

Spamhaus Launching Domain Block List

Abuse - February 15, 2010 - 1 Comment

Spamhaus is announcing this week that they are launching their Domain Block List (DBL). The Spamhaus DBL is a realtime database of Uniform Resource Identifiers (URIs), typically web site domains found in spam messages. Mail server software capable of scanning…

Respectful Spam from @LayeredTech

Respectful Spam from @LayeredTech

Abuse, Permission, Unsubscribe - February 11, 2010 - 2 Comments

Today I received a spam message from a saleperson. It was like many others that I receive, except that I immediately noticed how respectful the tone was. Then at the end of it, he tells me that I should reply…

UA-9835597-1