TITLE

Authentic confusion

AUTHOR(S)
Magill, Ken
PUB. DATE
June 2007
SOURCE
Multichannel Merchant (Penton Media, Inc.);Jun2007, Vol. 3 Issue 6, p23
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the importance of electronic mail (e-mail) authentication to marketers. E-mail authentication enables e-mail inbox providers to determine if incoming mail has truly been sent by the company from which it purports to be sent. According to Microsoft, it had witnessed an increase in adoption of its Sender ID authentication solution which helped decrease unsolicited bulk e-mail into Hotmail accounts.
ACCESSION #
25400328

 

Related Articles

  • Qurb dumps junk mail. Sturdevant, Cameron // eWeek;2/28/2005, Vol. 22 Issue 9, p52 

    The article presents information on Version 3.0 of Qurb Inc.'s namesake product. Qurb 3.0, which became available in February 2005, costs $29.95 for an individual copy, and volume discounts are available. Qurb 3.0 is well worth considering for departmental deployments where additional anti-spam...

  • E-mail. Clark, David // IEEE Internet Computing;Jul/Aug2002, Vol. 6 Issue 4, p18 

    Presents an abstract of the article 'Spam Smackdown,' by Andrew Conry-Murray, published in the May 2002 issue of 'Network Magazine.'

  • Don't Call it a Comeback.  // Information Security;Mar2007, Vol. 10 Issue 3, p17 

    The article reports on the increase in number of spam electronic messages in the U.S. at the end of December 2006 according to Symantec. Spam messages rose by 80 percent compared to all electronic mail traffic recorded in the country. The increase in junk mail was made after months of a slow...

  • You have our permission. Parmar, Arundhati // Marketing News;1/6/2003, Vol. 37 Issue 1, p3 

    Presents results from an online study about e-mail marketing. Permission e-mails versus unsolicited e-mails; Findings that 62% of respondents were eager to read permission e-mails; Unsolicited e-mails as the cause of most e-mail inbox saturation.

  • Message in a bottleneck. Vermond, Kira // CMA Management;May2004, Vol. 78 Issue 3, p38 

    Offers tips for companies on how to develop and implement an e-mail marketing program. Points that a marketer need to consider when developing an e-mail marketing program; Tips on how to avoid being branded as a spammer; Problems faced by companies that use e-mail marketing; Advantages offered...

  • CAUGHT IN THE CROSSFIRE. Neuborne, Ellen // Inc.;Aug2003, Vol. 25 Issue 8, p37 

    Reports that several legitimate e-mail marketing messages have been blocked by anti-spam filters in the U.S., as of 2003. Percentage of legitimate, permission-based e-mail which have been blocked by spam filters; Impact of the block on small companies which rely on e-mail marketing; Decision of...

  • Spam--stopping the flood of unsolicited commercial e-mail. Sardoni, Ken // Enterprise/Salt Lake City;7/07/2003, Vol. 33 Issue 2, p11 

    Offers tips on stopping Unsolicited Commercial E-mail. Activities that make e-mail marketing a spam; Characteristics of spam; Recommendations to reduce exposure to spam e-mails.

  • Take a Number, Please. Yager, Tom // InfoWorld;5/3/2004, Vol. 26 Issue 18, p58 

    This article presents the opinion of the author on unsolicited electronic mails. I respect the great thinkers devising anti-spam solutions based on intelligent protocols and brilliant mathematics. I also believe that although this research will improve security for those who choose to apply...

  • EFFECTIVE EMAIL. Kawasaki, Guy // Smart Business Chicago;Jul2012, Vol. 9 Issue 8, p5 

    The article offers tips on how to create an effective e-mail. It suggests that emailer must remove the subject about sex and money-saving special offers to get message past the spam filters. It warns to avoid writing in all caps because the recipients might interpret it as yelling in email. It...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics