ArchiveAugust 2015

Politics and Delivery

Last week I posted some deliverability advice for the DNC based on their acquisition of President Obama’s 2012 campaign database. Paul asked a question on that post that I think is worth some attention. I am fascinated by the ramifications of email deliverability for political donations. Are there sysadmins at the big ISPs who make human decisions on deliverability issues anymore? The power...

Deliverability advice to the DNC

I was working on another post for this afternoon, but when I checked Facebook Autumn Tyr-Salvia had posted a link that’s much more interesting to talk about. It seems the Democratic National Committee has acquired President Obama’s email list from the 2012 campaign. The […] list […] includes details about the amount donors gave and how they prefer to be contacted, will be...

Deliverability strategy to reach the inbox

I wrote a piece for the Only Influencers special Holiday Preparations edition about deliverability and the holiday email rush. One thing I like about the chance to write for other publications is the process often leads me down thought pathways and generate some new ideas. One thing this post helped crystalize in my mind is the idea that every company doing email marketing needs a deliverability...

Still Spamming…

This morning I woke up to news that Sanford Wallace pled guilty to spamming. Again. Sanford was one of the very early spammers (savetrees.com). He moved to email from junk faxing when Congress made junk faxing illegal in 2005. He sued AOL when AOL blocked his mail. He lost and the courts maintained that blocking spam was not a violation of the sender’s rights. Sanford then moved on to using...

Check your tech

One of the things we do for just about every new client coming into WttW is have them send us an email from their bulk mail system. We then check it for technical correctness. This includes things like reviewing all the different From headers, rDNS of the connecting IP, List-Unsubscribe headers and authentication. This is always useful, IMO, because we often find things that were right when they...

Utilizing all of your data

Email marketing continues to be a great way to reach out to prospects and customers and many companies utilize multiple mail streams. Companies often have the following systems sending mail: Welcome Messages for new subscribers Transactional Messages such as password resets or receipts from purchases Drip programs from a marketing automation system Direct to customers via CRM Depending on your...

The FTC answers questions about CAN SPAM

The FTC posted answers to a number of questions about the CAN SPAM act. Email is an essential part of most companies’ marketing strategy. If you send commercial email – or have others send it for you – are you complying with the CAN-SPAM Act and the FTC’s CAN-SPAM Rule? FTC attorney Christopher Brown answers some of the CAN-SPAM questions businesses are asking. Nothing really surprising...

Linking identities to email addresses

As I predicted yesterday, a bunch of sites have popped up where you can input email addresses and find out if the address was part of the Ashley Madison hack. My spam trap address isn’t on it, which makes me wonder if unsubscribe data was kept elsewhere or if they just never bothered to save the requests. One of the things I’m seeing in most articles about the hack is reassurance that...

Ashley Madison Compromise

Last month Brian Krebs reported that the Ashley Madison database was compromised. Ashley Madison is a dating site that targets married folks who are looking to have affairs. Needless to say, there is a lot of risk for users if their data is found on the released data. Today what is supposedly the Ashley Madison data was released. The release of this data can have some significant impacts on the...

TXTing

On Friday I talked a bit about the history behind TXT records, their uses and abuses. But what’s in a TXT record? How is it used? When and where should you use them? Here’s what you get if you query for the TXT records for exacttarget.com from a unix or OS X command line with dig exacttarget.com txt ~ ∙ dig exacttarget.com txt ; <<>> DiG 9.8.3-P1 <<>>...

Recent Posts

Archives

Follow Us