Recent Posts

Changes coming to Verizon email

Last year Verizon bought AOL. As part of that merger some @verizon.net email is being migrated to the AOL backend. FAQs published by Verizon say this change is only affecting users in FL, TX and CA. Users will still have @verizon.net addresses but the backend and filtering will be managed by AOL.
This shouldn’t have a huge impact on commercial senders. However, one thing I did notice while reading through the FAQ is this:

Read More

April 2016: The Month in Email

We are finishing up another busy month at WttW. April was a little nutty with network glitches, server crashes, cat woes, and other disruptions, but hopefully that’s all behind us as we head into May. I’ll be very busy in May as well, speaking at Salesforce Connections in Atlanta and the Email Innovation Summit in Las Vegas. Please come say hello if you’re attending either of these great events.
April2016MiE
Speaking of great events, I participated in two panels at EEC16 last month. We had a lot of great audience participation, and I met many wonderful colleagues. I wrote up some more thoughts about the conference here. I also had a nice conversation with the folks over at Podbox, and they’ve posted my interview on their site.
In the Podbox interview, as always, I talked about sending mail people want to receive. It always makes me roll my eyes a bit when I see articles with titles like “5 Simple Ways to Reach the Inbox”, so I wrote a bit about that here. In addition to sending mail people want to receive, senders need to make sure they are collecting addresses and building lists in thoughtful and sustainable ways. For more on this topic, check out my post on list brokers and purchased lists.
These same not-so-simple tricks came up again in my discussion of Gmail filters. Everyone wants a magic formula to reach the inbox, and — sorry to burst your bubble — there isn’t ever going to be one. And this is for a good reason: a healthy filter ecosystem helps protect all of us from malicious senders and criminal activity. The email channel is particularly vulnerable to fraud and theft. The constant evolution of filters is one way mail providers can help protect both senders and recipients — but it can be challenging for senders and systems administrators to keep up with this constant evolution. For example, companies sometimes even inadvertently filter their own mail!
I also wrote a bit about how B2B spam is different from B2C spam, and how marketers can better comply with CAN SPAM guidelines in order to reach the inbox. We also republished our much-missed friend and colleague J.D. Falk’s DKIM Primer, which is extremely useful information that was at a no-longer-active link.
One of my favorite posts this month was about “dueling data”, and how to interpret seemingly different findings around email engagement. We also got some good questions for my “Ask Laura” column, where we cover general topics on email delivery. This month we looked at “no auth/no entry” and the Microsoft Smartscreen filter, both of which are useful things to understand for optimizing delivery.
Finally, we are pleased to announce that we’ve joined the i2Coalition, an organization of internet infrastructure providers. They posted a nice introduction on their blog, and we look forward to working with them to help advocate and protect these important technical infrastructures.

Read More

Pete and Repeat

Pete and Repeat were on a boat. Pete fell out, who was left?
TechnicalScreenshot
I was searching the blog for some resources today and these were the first two posts that showed up on the search results. I often feel like I’m repeating myself, but sometimes I am.
 

Read More

Trust the list broker

Over the years I’ve worked with companies who admit to me that they’ve purchased data at one point or another. Let’s face it, as bad a practice as it is, people and companies still think they can succeed in email marketing with purchased lists.
As part of the cleanup process, I start to ask questions about the list. Who did you buy it from? How were the addressees collected? Are these addresses shared with others? What did the seller tell you about the list.
Thief.
Clients are rarely able to tell me about where the addresses are collected or if they’re shared.
It’s amazing to me how many companies choose to outsource the creation of such a valuable asset. They don’t know anything about it, but it’s a huge asset and so important they won’t let go when it doesn’t work.
Some of it is the sunk cost fallacy. But I think in some cases my clients don’t really believe the person who sold them the list wasn’t truthful. They really believe there is value in the list, if they can only unlock it.
Companies selling lists don’t really have any incentive to spend time or money making sure they have permission or that the lists are good. That’s just expense to them and returns no value. The value is in the number of addresses they can sell, not in the number of responsive addresses.
How many companies buy a list and immediately take it to a list cleansing service? Why should they? Shouldn’t the company SELLING the list make sure they’re selling deliverable addresses? Shouldn’t the seller spend the money for verification?
The very fact that so many companies believe they need to clean a purchased list speaks to the horrible quality of purchased lists. And, yet, companies are addicted to the idea of purchasing lists. They trust that the addresses are collected in a permission based manner. They believe when sellers tell them the addresses are good and valid – even when they see that 10 or 20 or 30% of the list is cleaned off by the list services.
List sellers won’t do the cleaning because they know they’re not providing the product. It’s a con and it’s a swindle and yet marketers still think they’re getting something of value from list sellers. And they still discover purchased lists are horrible in terms of deliverability and performance.

Read More

Let's talk CAN SPAM

CheckboxEarlier this week I posted about the increased amount of B2B spam I’m receiving. One message is not a huge deal and I just delete and move on. But many folks are using marketing automation to send a series of emails. These emails often violate CAN SPAM in one way or another.
This has been the law for 13 years now, I find it difficult to believe marketers are still unaware of what it says. But, for the sake of argument, let’s talk about CAN SPAM.

Read More

We joined the i2Coalition

Word to the Wise has joined the i2Coalition. Today they posted our introduction to their blog.
Why did we do it?
Email, and online spaces, are so important to modern life. We shop, bank, communicate, play and interact online. The internet has facilitated everything from political revolution to coffee dates and international friendships. Steve watched the Berlin Wall fall from his college dorm room over the internet. The internet was a major factor in the organization of the Arab Spring and other political movements. And sometimes we just meet people online. BBSes, usenet, email, and social networks let us connect with each other.
With that being said, too many people see online spaces as nebulous and “not real.” But the reality is that people genuinely connect, organize, and participate in online spaces. Those spaces need to be protected so these things can continue. The internet is, in many ways, a very special and unique place that has facilitated the growth of millions of communities. Unless we protect the infrastructure, these communities will fall apart and be useless.

Read More

It's still spam

Companies are always trying to find new ways to use and abuse email. My mailbox has been rife with mail from companies trying to sell me stuff for my business. It’s been interesting to watch the new ways they’re trying to get attention, while not honoring the most important rule of email marketing.
EmalMarketingForBlog

Read More

The source of deliverability problems

Most deliverability problems don’t start where many people think they do. So very often people call looking for deliverability help and tell me all about the things they’re doing to reach the inbox. They’ll tell me about content, they’ll tell me about bounces, they’ll talk about complaints, engagement, opens and clicks. Rarely will they bring up their list source without some prompting on my part.
1282269
The reality is, though, that list source is to root of deliverability success and deliverability problems. Where did those addresses come from and what do the people who gave them think you’re going to do with them?
Outsourcing collection to a third party can cause significant issues with delivery. Letting other people collect addresses on your behalf means you lack control over the process. And if you’re paying per address, then there monetary incentive for that company to pad the list with bogus addresses.
Sometimes there are even issues with having your own employees collect addresses from customers. For instance, a retailer requires sales associates collect a minimum percentage of addresses from customers. The company even ties the associates’ evaluations to that percentage. Associates have an incentive to submit addresses from other customers. Or a retailer will offer a discount for an address and customers want the discount but not the mail, so they give a fake address.
All of these things can affect deliverability.
Address collection is the key to delivery, but too many companies just don’t put enough attention to how they’re collecting addresses and entering into the relationship with subscribers. This is OK for a while, and delivery of small lists collected like this can be great. But as lists grow in size, they come under greater scrutiny at the ISPs and what used to work doesn’t anymore.
The first step to diagnosing any delivery problem is to look at the list. All of the things ISP use to measure reputation measure how well you’re collecting addresses. Changing IPs or domains or content doesn’t change the reason mail is being filtered. It just means the filters have to figure out something new to key on.
Want great deliverability? Start with how you’re collecting addresses.
Want to fix deliverability? Start with how you’ve collected addresses, how you’ve stored them and how you’ve maintained them.
 

Read More

Upcoming events for Laura

speakingIconForBlogWe’re more than halfway through April. Good: Taxes are finished. Bad: Wait? We’re well into Q2? How time files. With that realization, it seems like it’s a good time to share some of the places and events I’ll be at in May.
Salesforce Connections in Atlanta, GA. May 10 – 12. I’m a panelist for Deliverability Unplugged: How to Stay out of Email Jail and Other Best Practices on May 11.  I’m sharing the panel with Mickey Chandler from SFMC and Melinda Plemel from Return Path. The session will be moderated by Rebecca McAdams from Forrester Research. Bring questions. I don’t think you really want to just listen to us show you slides, so come bearing questions.
As an aside, Salesforce is offering a discount of 50% off registration for Connections16 through April 22 if you use the promo code EQUALITY. Good on Salesforce for this.
Email Innovations Summit in Las Vegas, NV. May 17 – 18Understanding your IT Department: What Non-Technical Brand Managers Need to Know about Email Security, DMARC , ISPs and Delivery. I’ve been working on this talk and, wow, there’s a lot of info I want to share. It should be a fun session, so stop by.
You can get a 15% discount off the cost of registration for Innovations by using my speaker code SPKATK

Read More
Tags