21.07.2013 Views

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

Essential Guide to E-mail Marketing - Haymarket

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

32 INFRASTRUCTURE DM News • E-Mail <strong>Marketing</strong> <strong>Guide</strong> 2007<br />

Spam finally has a definition<br />

BY JORDAN COHEN<br />

When industry groups first started tackling deliverability best<br />

practices a few years ago, the struggle <strong>to</strong> define spam raised<br />

some controversial questions. Marketers, ISPs, consumer groups<br />

and government agencies alike wondered: Should all unsolicited<br />

commercial e-<strong>mail</strong> be considered spam? Or just unsolicited bulk<br />

commercial e-<strong>mail</strong>? Or perhaps it’s any e-<strong>mail</strong> sent without permission;<br />

bulk, commercial or otherwise?<br />

Eventually, attempts <strong>to</strong> define spam were abandoned, as no one<br />

could agree on a meaning that would encompass all unwanted<br />

messages while excluding legitimate e-<strong>mail</strong>. Besides, a definition<br />

seemed irrelevant when an estimated one-in-five commercial<br />

e-<strong>mail</strong>s were getting caught in filters for failing content checks or<br />

poor bounce management, even when specifically requested by<br />

the consumer.<br />

Fast forward <strong>to</strong> 2007, and we may finally have a definition for<br />

spam. Yahoo’s <strong>to</strong>p e-<strong>mail</strong> operations executive, Miles Libbey, senior<br />

product manager at Yahoo Mail, probably put it best at the<br />

Federal Trade Commission’s recent Spam Summit: “Operationally,<br />

we define spam as anything users don’t want in their inbox,”<br />

Libbey said. It’s short, sweet, highly understandable and 100 percent<br />

consumer-centric. But it’s also a definition that may frighten<br />

the many marketers who previously believed that acquiring affirmative<br />

consent meant they would never be considered spammers.<br />

As we move closer <strong>to</strong> a time when consumer spam complaints<br />

will weigh heaviest on a marketers’ deliverability and ROI, successful<br />

firms will increase their focus on making sure that every<br />

e-<strong>mail</strong> they send is relevant, valuable, welcomed and wanted by its<br />

recipients. To survive and thrive in the next phase of e-<strong>mail</strong> marketing,<br />

keep these two core principles in mind:<br />

■ How you give notice trumps how you get permission. Getting<br />

consumers’ permission is meaningless unless you are clear about<br />

what they are agreeing <strong>to</strong> when they sign up. At a recent industry<br />

conference, AOL’s postmaster, Charles Stiles, <strong>to</strong>ld attendees, “I<br />

don’t care if they triple opted-in and gave you their credit card<br />

number.” He drew chuckles, but made his point loud and clear:<br />

Opt-in is meaningless if consumers subsequently click the “Report<br />

Spam” but<strong>to</strong>n.<br />

■ Relevancy rules. There are no<br />

“throw away” communications in<br />

the e-<strong>mail</strong> world, where consumers<br />

provide immediate and<br />

constant feedback about what<br />

they think of your programs <strong>to</strong><br />

their ISPs. Before clicking send,<br />

always ask yourself, “Is the individual<br />

recipient I’m sending this<br />

<strong>to</strong> going <strong>to</strong> find it valuable?” And<br />

while you’re at it, “Would I be<br />

Jordan Cohen<br />

happy <strong>to</strong> receive this message.”<br />

Epsilon<br />

Jordan Cohen is direc<strong>to</strong>r of industry and government relations at Epsilon. He<br />

can be reached at jcohen@epsilon.com.<br />

ESSENTIAL GUIDE<br />

Controlling messaging costs<br />

BY BARRY ABEL<br />

For every message that doesn’t make it <strong>to</strong> the intended inbox,<br />

the bot<strong>to</strong>m line takes a direct hit. The number one reason why<br />

<strong>mail</strong> doesn’t get delivered is infrastructure. Infrastructure in the<br />

e-<strong>mail</strong> world means MTA (Message Transfer Agent) and is the<br />

way your company presents itself <strong>to</strong> the ISP community. But most<br />

companies’ sending infrastructures are not conducive <strong>to</strong> handling<br />

large volumes of outbound <strong>mail</strong>. Common sending architecture<br />

falls in<strong>to</strong> two camps. The first is composed of open source solutions<br />

such as Send<strong>mail</strong>, which<br />

requires dozens of servers <strong>to</strong> meet<br />

volume and speed requirements.<br />

The second includes early-<strong>to</strong>-market<br />

spam engines intended <strong>to</strong><br />

send high volumes of <strong>mail</strong>, but<br />

without the control features<br />

required <strong>to</strong> secure delivery and a<br />

positive reputation. Neither<br />

approach is optimal.<br />

There are, however, several<br />

ways companies can optimize<br />

Barry Abel<br />

their infrastructure <strong>to</strong> reduce<br />

Message Systems<br />

costs and improve deliverability.<br />

■ Improve infrastructure performance There is a tremendous<br />

cost <strong>to</strong> running servers, so if you can reduce the number you need<br />

<strong>to</strong> support, you au<strong>to</strong>matically reduce costs. Adopting a solution<br />

that will allow each server <strong>to</strong> send millions of messages per hour<br />

with ability <strong>to</strong> maintain 100k concurrent connections, results in a<br />

10:1 hardware reduction.<br />

■ Insist on virtual IP support By adopting an infrastructure that<br />

supports virtual IPs — the ability <strong>to</strong> segment traffic by unlimited<br />

IP addresses on a server — you can optimize your throughput for<br />

each type of <strong>mail</strong> you send <strong>to</strong> each ISP.<br />

■ Cluster servers This will allow you <strong>to</strong> configure, manage and<br />

support all servers from a single interface.<br />

■ Establish bounce classifications and a list hygiene process This<br />

will decrease <strong>mail</strong>ing costs, because you’ve eliminated bad addresses<br />

by setting up an au<strong>to</strong>mated way <strong>to</strong> handle bounced <strong>mail</strong>.<br />

■ Obtain workflow and policy management capability Being able<br />

<strong>to</strong> set <strong>mail</strong> processing policies in advance saves admin time and<br />

processing power. Setting thresholds <strong>to</strong> alert admin of deliverability<br />

problems will help catch problems early so they can be corrected.<br />

■ Prepare for authentication To prevent messages from being<br />

blocked by ISPs using authentication technology, establish a policy<br />

<strong>to</strong> mark e-<strong>mail</strong> with DKIM and Sender ID.<br />

■ Adopt e-<strong>mail</strong> moni<strong>to</strong>ring E-<strong>mail</strong> moni<strong>to</strong>ring lets you know if<br />

your message landed in the inbox, a junk folder or was blocked<br />

by a spam catcher. Knowing this can give you a better chance of<br />

making changes that will get you <strong>to</strong> more inboxes.<br />

■ Insist on real-time reporting With real-time analytics, adjustments<br />

can be made before sending subsequent campaigns.<br />

Barry Abel is vice president of field operations at Message Systems. He can be<br />

reached at barry.abel@messagesystems.com.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!