TITLE

Beyond Can-Spam: E-mail Authentication

AUTHOR(S)
Miller, Paul
PUB. DATE
November 2004
SOURCE
Catalog Age;Nov2004, Vol. 21 Issue 12, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Discusses the use of e-mail authentication to reduce spam. Description of the e-mail authentication process; Efforts of Internet service providers to create a platform for e-mail authentication standards; Advantages of registering in white listing programs for Internet service providers; Process of registering in a white listing program. INSET: Spam Glossary.
ACCESSION #
14796882

 

Related Articles

  • Are All Your Servers Authenticated? Magill, Ken // Direct;6/1/2007, Vol. 19 Issue 6, p55 

    The article talks about e-mail authentication. According to the author, most of this e-mail came from service providers whose business is to make sure their processes abide by industry best practices. He says that e-mail authentication is intended to let e-mail inbox providers determine if...

  • Today's competitive inboxes transform e-mail marketing. Blumberg, Matt // Direct Marketing News;10/2/2010, p12 

    The article focuses on Internet service providers (ISPs) and large electronic mail (e-mail) providers that are fighting to be a priority inbox.

  • eBay wins e-mail bid. Dilworth, Dianna // DM News;2009 Supplement, p9 

    The article focuses on the deliverability of commercial e-mails. eBay Inc. has build the reputation of successful deliverability with rate of 98-99 percent and sends around 25 billion e-mails per year. Nicole Birdsall, group manager with eBay, mentions they make sure the e-mails are relevant and...

  • Outsourcing: A not-so-new e-mail strategy. Yudkowsky, Chaim // Business Journal (Central New York);11/12/2004, Vol. 18 Issue 46, p18 

    Focuses on the adoption of email, the single most critical computer application, by executives in New York. Reliability of an email strategy; Expansion of services through an Internet Service Provider-hosted mailbox; Maintenance of personnel resources.

  • What Is Federated Identity Management? Kobielus, James // Business Communications Review;Aug2005, Vol. 35 Issue 8, p56 

    This article discusses various issues related to the significance of federated identity management (IdM) computer network security. Federated IdM is a hot topic right now in the world of network security. Although it has many definitions and applications, at heart, federated IdM refers to a new...

  • Holidays exacerbate ISPs' e-mail problems. Weil, Nancy // InfoWorld;01/05/98, Vol. 20 Issue 1, p48 

    Details the electronic mail (e-mail) problems experienced by several Internet service providers in the United States during the 1997 holiday season. Computers added to AT&T WorldNet's servers to increase its e-mail capacity; Problems experienced by America Online attributed to a hardware glitch...

  • E-mail outsourcing. Greene, Roger C. // Communications News;Aug99, Vol. 36 Issue 8, p56 

    Discusses the advantages of having an Internet service provider (ISP) handle one's corporate electronic mail (e-mail). Cost of managing e-mail; Costs cut when e-mail is handled at a central location; Use of ISP expertise for organizations involved with mergers and acquisitions.

  • Inaction Threatens E-mail Authentication. Magill, Ken // Direct;9/15/2005, Vol. 17 Issue 12, p9 

    Reports on a deadline for electronic mail authentication among Internet service providers imposed by Microsoft in 2005. Views of Matt Blumberg, CEO of Return Path Inc., on the reason for several authentication standards; Information on the Server ID Framework of Microsoft; Use of Domain Keys...

  • Can email fight bounce-backs?  // Precision Marketing;1015/2004, Vol. 16 Issue 50, p12 

    This article discusses the problem associated with E-mail message. E-marketers hold out hope that the medium can rise to the challenge. After all, one-fifth of people contacted by Internet services provider Yahoo admit to buying goods from spammers. It is

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics