
Proper Assumptions
I’m at the Messaging, Malware, & Mobile Anti-Abuse Working Group meeting this week. After all of the sessions on Tuesday were over, I was speaking
Deliverability, authentication, sending practices, and messaging operations
I’m at the Messaging, Malware, & Mobile Anti-Abuse Working Group meeting this week. After all of the sessions on Tuesday were over, I was speaking
Zoominfo, DiscoverOrg, and Lead411 are popular lead generation sources. Every once in a while someone comes along and tries to defend the use of crowd sourced
I was recently asked about how to go about proving that someone was not obtaining email addresses in a direct, opt-in manner. The methodology won’t
“I am not a spammer – so why have I been blocked?” Well, as the saying goes, ‘that depends’. In recent weeks, I have certainly
It’s been a long week and you’re relaxing at the local watering hole. Someone comes over and strikes up a conversation with you and the
I just finished an Emergency Medical Responder course. I’m not a paramedic, I’m not even an EMT, but I am now qualified to stop and
An interesting question comes in today: “Is it required by law to unsubscribe feedback loop complaints received by senders?” And I call it interesting because
What is your conversation like with the people you communicate with? I don’t care what they really are. They could be people on Twitter, bloggers,
When you do business with a government agency, at just about any level, you surrender a certain amount of privacy. Whatever you give to the
Following up on yesterday’s blog post on the Beatles’ song “I’m Looking Through You,”1 I’d like to revisit a sort of one-off statement that formed
S | M | T | W | T | F | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | 5 | 6 | 7 |
8 | 9 | 10 | 11 | 12 | 13 | 14 |
15 | 16 | 17 | 18 | 19 | 20 | 21 |
22 | 23 | 24 | 25 | 26 | 27 | 28 |
29 | 30 |