Deliverability 101. #amplify International Business Machines Corporation
|
|
|
- Lizbeth Ariel Harrison
- 10 years ago
- Views:
Transcription
1 Deliverability 101
2 Jeff Dellapina Deliverability and Provisioning Manager
3 Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential future products is intended to outline our general product direction and it should not be relied on in making a purchasing decision. The information mentioned regarding potential future products is not a commitment, promise, or legal obligation to deliver any material, code or functionality. Information about potential future products may not be incorporated into any contract. The development, release, and timing of any future features or functionality described for our products remains at our sole discretion. Performance is based on measurements and projections using standard IBM benchmarks in a controlled environment. The actual throughput or performance that any user will experience will vary depending upon many factors, including considerations such as the amount of multiprogramming in the user s job stream, the I/O configuration, the storage configuration, and the workload processed. Therefore, no assurance can be given that an individual user will achieve results similar to those stated here. 2
4 Agenda Deliverability Terms Sends Authentication How Recipients Impact your Deliverability Improving Sender s Behavior Questions 3
5 Why is Deliverability Important? Increase Revenue Increase and protect Brand Recognition and Reputation Increase Automation Decrease Marketing Costs Reduce Risks Service Interruptions due to Blacklisting Phishing attempts that dilute brand trust Job Interruptions 4
6 Deliverability Terms 5
7 Bounce Categories Hard Bounce Permanent Failed Message Bad Mailbox Bad Domain Soft Bounce Temporary Failed Message Inactive Mailbox Everything else that is not a hard bounce. 6
8 Bounce Types In Stream Error messages provided by receiving server during the live mail transfer. Out of Stream Error messages provided by recipient server after message is successfully accepted. 7
9 Bulking, Blocking and Blacklisting Bulked - Message is delivered but sent to the Junk Folder Block - The destination server is refusing to accept due to ISP/Inbox Provider send practice violations Blacklist - List of IP addresses or domains that individuals or enterprises use to filter due to send practice violations 8
10 Spamtraps Digital Venus Flytraps A spam trap is an abandoned address that was shut down and after 6-12 months is re-activated Eliminate spam traps Inactive addresses older than 12 months should not be sent marketing mail Create Re-engagement mailing Segment inactive list by age Begin a re-engagement mailing Use a confirmed or double opt-in to prevent spamtraps Eliminate inactive addresses where you have no opt-in data for that address 9
11 IP Ramp-Up A process within the VMTA that limits the volume of during initial sends to specific ISPs. This ramping of the IP will build the reputation with different ISPs Aol is limited to 1,200 Yahoo and Hotmail are set to send 5,000 on the first send. Segmenting your data into buckets Ramp up any domain that makes up a 10 % or more of your list Sending same volume for 30 days to turn off Auto Ramp-up 10
12 Feed Back Loops Certain ISPs send recipient abuse complaint details back to Silverpop. The abuse complaint is marked in the mailing reports The problem address is added to the Master Suppression List Abuse complaints can generate weeks, months, years after the initial send. These complaints from previous mailings impact today s mailings People that click abuse do so for 3 reasons: No memory Relevant Frequency 11
13 What happens when I hit send? 12
14 Engage Builds and Sends a Mailing The list and creative gets uploaded to Engage and you hit Send Engage begins Blocking which is the blending of list/content Engage checks addresses against the Master Suppression List Engage hands off the mailings to the sending server - your VMTA The VMTA is actually 3 sending servers that connect to all ISPs. Error messages provided by receiving server during the live mail transfer. Most common Connections are made to each ISP and corporate domain. During this connection bad addresses are returned Depending on send size, mail may exit 1 server or all 3 servers at once. 13
15 After the Send All the results of the mailings are picked up by a service called Response Master Response Master manages all opens/clicks, unsubscribes and bounces. That data gets pushed back into Engage for Reporting. Other deliverability data gets moved to Deliverability tables and accessed by my team. This data includes bounce and delivery logs. This data populates the Deliverability Dashboard within the Support portal Allows our team to answer client questions and possible delivery concerns. 14
16 What to Expect with a Large Send When clients send to larger lists we can expect to see the following metrics: A higher than normal number of suppressed addresses. Overall slower delivery of depending on existing IP reputation. Greater risk of bouncing due to sending thresholds and complaints. Depending on the age/activity of the addresses, a higher than normal opt-out rate and abuse complaint rate. 15
17 Authentication 16
18 Authentication Sending authenticated means making sure proper DNS records are in place on the from or sending domain used in the mailings. SPF Record DKIM Record DMARC Record 17
19 Authentication SPF Record / Sender ID Silverpop can send on behalf of e.company.com e.company.com TXT v=spf1 ip4: all Actual Error message :: Hotmail - smtp;550 (COL0-MC4-F6) command rejected due to Sender ID test failing for IP Please ensure this IP is authorized to send mail on behalf of [companyname.com]. 18
20 Authentication DKIM Record Original Message Sent was the Same Message Received Reduces Screen Scraping Used by Yahoo for Feed Back Loops to manage abuse processing spop1024._domainkey.e.example.com. IN TXT "k=rsa; p=mfwwdqyjkozihvcnaqebbqadswawsajbalrpcztsoe3y863bclav91ft XKrLUymFwH9nOxFkJmMKdCRdcQo3dcIKDPn1lZqdXVfa7TFVVQVs 19
21 Authentication DMARC Record Domain-based Message Authentication, Reporting & Conformance Text Record that monitors the listed domain against various Spoofing and Phishing attempts Implemented in Stages None Monitor Don t do anything but report what is happening Quarantine Push aside any message that fails DMARC Reject Delete any message from any source not listed within DMARC 20
22 Authentication DMARC Record _dmarc.silverpop.com TXT What domain do we want to monitor? What do we do with failures? What percentage of mail do we want monitored? Where do we send these reports? 21
23 Authentication DMARC Record DMARC Report 22
24 Authentication DMARC Record - Agari The largest ISPs are now pushing next-gen authentication (DMARC) hard Google, Y!, Hotmail/Microsoft, AOL, etc have all adopted DMARC Over 2Bn mailboxes: 85% of US consumers and 70% International consumer are covered Better deliverability and classification by ISPs By authenticating properly Get ahead of the curve authentication will be a de facto necessity soon Stop criminals from using your brand to abuse your consumers Achieve better tracking and visibility globally 23
25 Authentication DMARC Record - Agari Seeing Threats from Around the World 24
26 How Recipients Impact your Deliverability 25
27 Recipient Behavior IP Reputation Delivery Rate - Throttling Placement Bulk Folder or Inbox 26
28 Recipient Behavior IP Reputation Opens build the IP reputation Opens tell the ISP that the mailings are wanted Moving message from Bulk folder to Inbox Forwarding the message 27
29 Recipient Behavior - Throttling 3 Types of Throttling At the Engage Level At the VMTA Level At the ISP Level The first 2 listed are outbound throttling. The ISP is inbound throttling ISPs use Internal / External IP reputation scores to determine throughput This is very important for clients sending time sensitive mailings 28
30 Recipient Behavior Inbox Placement Positive Behavior = Inbox placement Opening Moving from Bulk folder to Inbox Negative Behavior = Bulk folder or bounced Deleting without reading Clicking the Abuse Button Placement Bulk Folder or Inbox 29
31 Improving Sender s Behavior 30
32 Improving Sender Behavior Lead Source Frequency Send Time Optimization Call to Action 31
33 Improving Sender Behavior Lead Source Organic Double Opt-in Send Confirmation s No Pre-Populated Check Boxes Avoid List Purchases and Affiliate Marketing 32
34 Improving Sender Behavior - Frequency Set Expectations - At the time of sign-up Preference Center - Allow self management Snooze Feature Take a break Polling or Engagement Campaign Create Interest When in Doubt- Don t Send 33
35 Improving Sender Behavior Send Time Optimization Shortens Idle Time - Between Sends and Opens Conversation - The quick turnaround looks like a discussion Staggered Sends Throughout the day versus a blast Pavlov s Dog Mail is sent and mail is opened 34
36 Improving Sender Behavior Assorted Items Why Should I click Brand Development Subscribed/Unsubscribe Change up Mailings - A/B Subject Line and Content Testing Why Buy the Cow? - Preview Pane 35
37 HouseKeeping 36
38 Silverpop Engage Certification Self Improvement Add personal value / Job Search Product Knowledge/Features Currently Free to complete at your own pace Attend a 3 day dedicated boot-camp for faster certification 37
39 Links SPF DKIM DMARC Gmail Bulk Senders Guidelines CASL - fightspam.gc.ca/eic/site/030.nsf/eng/home CAN-SPAM
40 39
41 Tell us what you think! Be on the lookout for a survey in the follow up later this week. We appreciate your feedback! 40
42 Notices and Disclaimers Copyright 2015 by International Business Machines Corporation (IBM). No part of this document may be reproduced or transmitted in any form without written permission from IBM. U.S. Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM. Information in these presentations (including information relating to products that have not yet been announced by IBM) has been reviewed for accuracy as of the date of initial publication and could include unintentional technical or typographical errors. IBM shall have no responsibility to update this information. THIS DOCUMENT IS DISTRIBUTED "AS IS" WITHOUT ANY WARRANTY, EITHER EXPRESS OR IMPLIED. IN NO EVENT SHALL IBM BE LIABLE FOR ANY DAMAGE ARISING FROM THE USE OF THIS INFORMATION, INCLUDING BUT NOT LIMITED TO, LOSS OF DATA, BUSINESS INTERRUPTION, LOSS OF PROFIT OR LOSS OF OPPORTUNITY. IBM products and services are warranted according to the terms and conditions of the agreements under which they are provided. Any statements regarding IBM's future direction, intent or product plans are subject to change or withdrawal without notice. Performance data contained herein was generally obtained in a controlled, isolated environments. Customer examples are presented as illustrations of how those customers have used IBM products and the results they may have achieved. Actual performance, cost, savings or other results in other operating environments may vary. References in this document to IBM products, programs, or services does not imply that IBM intends to make such products, programs or services available in all countries in which IBM operates or does business. Workshops, sessions and associated materials may have been prepared by independent session speakers, and do not necessarily reflect the views of IBM. All materials and discussions are provided for informational purposes only, and are neither intended to, nor shall constitute legal or other guidance or advice to any individual participant or their specific situation. It is the customer s responsibility to insure its own compliance with legal requirements and to obtain advice of competent legal counsel as to the identification and interpretation of any relevant laws and regulatory requirements that may affect the customer s business and any actions the customer may need to take to comply with such laws. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the customer is in compliance with any law. 41
43 Notices and Disclaimers (con t) Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products in connection with this publication and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. IBM does not warrant the quality of any third-party products, or the ability of any such third-party products to interoperate with IBM s products. IBM EXPRESSLY DISCLAIMS ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. The provision of the information contained herein is not intended to, and does not, grant any right or license under any IBM patents, copyrights, trademarks or other intellectual property right. IBM, the IBM logo, ibm.com, Aspera, Bluemix, Blueworks Live, CICS, Clearcase, Cognos, DOORS, Emptoris, Enterprise Document Management System, FASP, FileNet, Global Business Services, Global Technology Services, IBM ExperienceOne, IBM SmartCloud, IBM Social Business, Information on Demand, ILOG, Maximo, MQIntegrator, MQSeries, Netcool, OMEGAMON, OpenPower, PureAnalytics, PureApplication, purecluster, PureCoverage, PureData, PureExperience, PureFlex, purequery, purescale, PureSystems, QRadar, Rational, Rhapsody, Smarter Commerce, SoDA, SPSS, Sterling Commerce, StoredIQ, Tealeaf, Tivoli, Trusteer, Unica, urban{code}, Watson, WebSphere, Worklight, X-Force and System z Z/OS, are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at: 42
Requirements Change Management and Artifact Workflow. DOP-1027 DOORS Next Generation
Requirements Change Management and Artifact Workflow DOP-1027 DOORS Next Generation Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery
ADY-1727: IBM Watson Analytics and Cognos Business Intelligence for Line of Business Smart Data Discovery Carm Janneteau, Product Manager, Watson Analytics Robert Hatfield, Development Manager, Watson
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535
Transformation Journey from Multiple Document Management Systems to IBM ECM Products DCP-2535 Ryan Dennings Auto-Owners Insurance Company October 28, 2015 2015 IBM Corporation Overview Auto-Owners Insurance
IBM Watson IoT Platform Analytics Real-Time Insights. Wayne Riley
IBM Watson IoT Platform Analytics Real-Time Insights Wayne Riley What Does IoT Real-Time Insights Do? Performs analytics on IoT data as in arrives at the IBM Watson IoT Platform Analytics applied immediately
The Weakest Link: Ethically Hacking the Connected Building. Paul Ionescu IBM X-Force Ethical Hacking Team
The Weakest Link: Ethically Hacking the Connected Building Paul Ionescu IBM X-Force Ethical Hacking Team Please Note: IBM s statements regarding its plans, directions, and intent are subject to change
Cryptographic Keys Life Cycle Management for your Company
Cryptographic Keys Life Cycle Management for your Company Session: SAD-6800 Torben Aaes-Jørgensen, Crypto Competency Center Agenda 1 Relevance of Encryption technologies 2 IBM Crypto Competency Center
Deliverability 201. #amplify15. 2015 International Business Machines Corporation
Deliverability 201 Jeff Dellapina Deliverability and Provisioning Manager Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences
JOURNEY DESIGNER: Transforming how Marketing Plans Customer Experiences 09/09/2015 #ibmamplify @elianetozman and @jbrett 2015 IBM Corporation PLEASE NOTE: IBM s statements regarding its plans, directions,
BBP-2665 IBM BPM Process Modeling Experience on the Web
BBP-2665 IBM BPM Process Modeling Experience on the Web Victor Chan STSM, IBM BPM Tools & User Interface Thu, 25-Feb 11:30 AM - 12:15 PM Mandalay Bay SOUTH - Reef Ballroom D Please Note: IBM s statements
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer
Bring Your Own Client with IBM mail support for Microsoft Outlook Andy Yiu, Senior Product Manager Nathan Barry, Senior Software Engineer Please Note: IBM s statements regarding its plans, directions,
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India
MNB-5587 : imobile by ICICI Bank - The First Foray into Servicing Customers on Mobile by Any Bank in India Abhijit Thosar, ICICI Bank Limited Nishant Kulkarni, IBM Introduction ICICI Bank is an is an Indian
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions. Eddie Lin IBM STSM, DS8000 Architecture [email protected].
YS4331 Leverage zos and Cloud Storage for Backup/Archive Efficiency and Cost Reductions Eddie Lin IBM STSM, DS8000 Architecture [email protected] Please Note: IBM s statements regarding its plans, directions,
Taking the next hot mobile video game live with Docker and IBM SoftLayer. Scott Porter, Daniel Krook, Shaun Murakami
Taking the next hot mobile video game live with Docker and IBM SoftLayer Scott Porter, Daniel Krook, Shaun Murakami Agenda Mobile video gaming on the cloud The video gaming market in 2016 Typical mobile
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize. Chris Walker IBM
Enterprise Java Monitoring on z/os: Discover, Alert, Optimize Chris Walker IBM Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience
How IBM Bluemix and Watson Helps Zurich to Improve Communities' Flood Resilience MBM-5829 Thorsten Gau (@tgau) IBM Distinguished Engineer v04 Zurich Insurance is... helping customers understand and protect
Provably Secure Data Protection in the Cloud. ICDES (IBM Cloud Data Encryption Services)
Provably Secure Data Protection in the Cloud ICDES (IBM Cloud Data Encryption Services) Agenda Cloud Security and Intro to ICDES Manish Aggarwal, IBM, Offering Manager Cloud Client Case Study: Crohn s
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016
Help!! I need people with z skills!! Christy Schroeder, WW z Skills Client Leader Academic Initiative Interconnect Session 2679 February 24, 2016 Notices and Disclaimers Copyright 2016 by International
Soar into the API Economy by Moving Services and Metadata. from WSRR to IBM API Connect
Soar into the API Economy by Moving Services and Metadata from WSRR to IBM API Connect Please Note: IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
Smart E-Marketer s Guide
30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step
Deliverability Best Practices by Tamara Gielen
Deliverability Best Practices by Tamara Gielen Hello, my name is Tamara Gielen Blogger Community manager Speaker Independent consultant Trainer Based in Belgium 2010 Tamara Gielen BVBA all rights reserved
Keynote: Cyber Intelligence and Cyber Security Overview
3/08/205 Keynote: Cyber and Cyber Security Overview David Waxman Executive Architect EIA Bob Stasio EIA for Cyber Security Product Manager Ralph Klaassen Senior Architect EIA 3/08/205 Important Disclaimer
Deliverability Counts
Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
How To Ensure Your Email Is Delivered
Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making
Email Reputation Metrics Troubleshooter. Share it!
Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,
Email AntiSpam. Administrator Guide and Spam Manager Deployment Guide
Email AntiSpam Administrator Guide and Spam Manager Deployment Guide AntiSpam Administration and Spam Manager Deployment Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec
Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework. Subtitle here
Ro Planning@Scale: Adopting IBM DevOps and the Scaled Agile Framework Subtitle here Please Note: Ro IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without
DST EMAIL. Product FAQs. Thank you for using our products. DST UK www.dstsystems.co.uk
EFFECTIVE PERSONALISED PRINT AND E-COMMUNICATION SOLUTIONS DESIGNED WITH YOU IN MIND DSTSYSTEMS.CO.UK DST EMAIL Product FAQs version 01 Thank you for using our products. DST UK www.dstsystems.co.uk DST
Email Marketing Glossary of Terms
Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to
8/4/2015 Sphere 9.4.6 Sphere Email US
Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,
Blackbaud Communication Services Overview of Email Delivery and FAQs
Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers
INinbox Start-up Pack
2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the products that it supports, read the information in Notices on page 3. This document applies
YSS-1841 IBM Cloud Storage Options. Tony Pearson IBM Master Inventor and Senior Software Engineer
YSS-1841 IBM Cloud Storage Options Tony Pearson IBM Master Inventor and Senior Software Engineer Cloud Storage Taxonomy Ephemeral Storage Typically boot volumes, page files and temporary data Goes away
INBOX. How to make sure more emails reach your subscribers
INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes
z/os V1R11 Communications Server system management and monitoring
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server system management and monitoring z/os Communications Server Development, Raleigh, North
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue.
Eloqua Enhanced Branding and Deliverability More emails to the inbox means more opportunities and revenue. Product Description In order to provide the best possible deliverability tool set, Eloqua has
Email Marketing Workshop
Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate
Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post
IBM Enterprise Marketing Management. Domain Name Options for Email
IBM Enterprise Marketing Management Domain Name Options for Email Note Before using this information and the product it supports, read the information in Notices on page 3. This document applies to all
You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing
You ve got Best practices for email deliverability Microsoft Dynamics Marketing Table of Contents Summary & author introduction Getting into the inbox with grace If you don t know, now you know: terms
Anchor s Email Marketing Glossary and Common Terms
Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can
10 Ways to Improve B2B Email Deliverability:
From First Click to Lifetime Customer 10 Ways to Improve B2B Email Deliverability: Expert Insights on How You Can Better Deliverability 10 WAYS TO IMPROVE B2B EMAIL DELIVERABILITY: Expert insights on how
2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO)
2792 - Leveraging WebSphere Commerce for Search Engine Optimization (SEO) Walfrey Ng, Development Manger, WebSphere Commerce Srini Rangaswamy, Product Manager, WebSphere Commerce IBM s statements regarding
IBM Tivoli Service Request Manager 7.1
IBM Tivoli Service Request Manager 7.1 Using the e-mail listener and workflow to generate, query, update, and change the status of tickets Updated September 29, 2009 IBM Tivoli Service Request Manager
DMA s E-Mail Authentication Requirement: FAQs and Best Practices
DMA s E-Mail Authentication Requirement: FAQs and Best Practices DMA s Board of Directors approved a new guideline for ethical marketing practices in October 2005, with the new member requirement going
Enhanced Customer Engagement through Email - A Croma & Experian CheetahMail Success Story Experian Marketing Services Experian and the marks used herein are service marks or registered trademarks of Experian
Database lifecycle management
Lotus Expeditor 6.1 Education IBM Lotus Expeditor 6.1 Client for Desktop This presentation explains the Database Lifecycle Management in IBM Lotus Expeditor 6.1 Client for Desktop. Page 1 of 12 Goals Understand
Communications Server for Linux
Communications Server for Linux SNA connectivity ^business on demand software Multiple types of connectivity exist within the Communications Server for Linux. CSLinux_snaconn.ppt Page 1 of 10 SNA connectivity
DataPower z/os crypto integration
New in version 3.8.0 DataPower z/os crypto integration Page 1 of 14 DataPower z/os crypto integration NSS performs requested key operation using certificates and keys stored in RACF RACF Administrator
MIDDLE EAST POST BOX. - Opt-In Direct Marketing -
Best Practice is a management idea which asserts that there is a technique, method, process, activity, incentive or reward that is more effective at delivering a particular outcome than any other. The
Reputation Monitor User Guide
August 18, 2015 Return Path, Inc. Table of Contents What is Reputation Monitor... 3 How Reputation Monitor Works... 4 What is a Sender Score... 5 How is a Sender Score Calculated... 5 Reputation Measures
A White Paper. VerticalResponse, Email Delivery and You A Handy Guide. VerticalResponse,Inc. 501 2nd Street, Suite 700 San Francisco, CA 94107
A White Paper VerticalResponse, Email Delivery and You Delivering email seems pretty straightforward, right? You upload a mailing list, create an email, hit send, and then mighty wizards transport that
CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)
Software Group Enterprise Networking and Transformation Solutions (ENTS) CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES) 1 A little background information on cipher
WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application
WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the
Knowledge Guide: Deliverability. Your Reputation Holds the Key to Deliverability. virtualroi May 2009. by: Return Path
Knowledge Guide: Deliverability Your Reputation Holds the Key to Deliverability virtualroi May 2009 by: Return Path Your Reputation Holds the Key to Deliverability Twenty percent of legitimate email never
IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467
IBM Integration Bus & Transformation Extender: One Platform for Internal & External Integration HBB-2467 Brian E Wilson IBM Cloud Middleware Connectivity & Integration Solution Architect Member of the
How to Engage Your Contacts Using Email Marketing
How to Engage Your Contacts Using Email Marketing We will be starting at 2:00 pm EST. Use the Question Pane in GoToWebinar to Ask Questions! CHAT WITH US: 1 Using the question pane shown above 2 Use the
MCH Channel_e Email Best Practices for Marketers
MCH Channel_e Email Best Practices for Marketers Best Practices for Marketers Communicating with your prospects and customers through email is a popular channel that provides almost immediate response.
Improve Email Deliverability: Tactics for Handling Complaints and Boosting Reputation. Sponsored by
Improve Email Deliverability: Tactics for Handling Complaints and Boosting Reputation Sponsored by Introductions Adam T. Sutton, Senior Reporter MarketingSherpa / MECLABS Primary Research @AdamTSutton
WebSphere Commerce V7.0
IBM Software Group WebSphere Commerce V7.0 Multi-channel precision marketing overview Updated December 3, 2009 This presentation introduces multi-channel precision marketing in WebSphere Commerce version
Enterprise Email Marketing: The 8 Essential Success Factors
Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing
The Grande Guide To Email Deliverability and Privacy
The Grande Guide To Email Deliverability and Privacy What s a Grande Guide? We know what the typical day is like for marketers. After all, we are marketers ourselves. Between strategy sessions, impromptu
EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT
PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription
Email Marketing Do s and Don ts A Sprint Mail Whitepaper
Email Marketing Do s and Don ts A Sprint Mail Whitepaper Table of Contents: Part One Email Marketing Dos and Don ts The Right Way of Email Marketing The Wrong Way of Email Marketing Outlook s limitations
IBM Cognos Controller Version 10.2.1. New Features Guide
IBM Cognos Controller Version 10.2.1 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 3. Product Information This document applies
Table of Contents Recommendation Summary... 3 Introduction... 4 Formatting Recommendations... 5 Creative:... 7 Deliverability & Infrastructure:...
Table of Contents Recommendation Summary... 3 Technical:... 3 Creative:... 3 Introduction... 4 Formatting Recommendations... 5 JavaScript:... 5 Forms:... 5 Background Tags and Colors:... 5 Html Text:...
IBM Cognos Controller Version 10.2.0. New Features Guide
IBM Cognos Controller Version 10.2.0 New Features Guide Note Before using this information and the product it supports, read the information in Notices on page 9. Product Information This document applies
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability
Get to the Inbox Ten Top Tips to Maximize Your Email Deliverability Introduction It s estimated that 70%* of all email is spam - not just unwelcome promotional messages, but phishing scams, hoaxes and
CommuniGator. Avoiding spam filters
CommuniGator Avoiding spam filters How to dodge the junk box; deliverability and avoiding spam filters Email marketers often have more to battle with than just creating an email and sending it to their
5 tips to improve your email database. An Experian Data Quality white paper
5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers
Email Marketing Features
Email Marketing Features JPC s Email Marketer includes everything you need to create, send and track professional HTML emails. It is fullyfeatured email marketing software which has been developed by marketing
WHITE PAPER SEPTEMBER 2008. Make It Into the Inbox. Co-authored by Jaren Angerbauer and Shaneli Ramratan
THE DIGITAL MARKETING COMPANY WHITE PAPER SEPTEMBER 2008 The 10 Commandments of Email Delivery Make It Into the Inbox Co-authored by Jaren Angerbauer and Shaneli Ramratan In the world of email marketing
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Data is at the heart of deliverability
FOR ADESTRA CLIENTS ONLY! Page 1 of 5 Data is at the heart of deliverability Introduction Following an in-depth project by Adestra into deliverability in the UK a common theme has emerged. Your data management
New SMTP client for sending Internet mail
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server New SMTP client for sending Internet mail z/os Communications Server Development, Raleigh, North Carolina This presentation
Top 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...
1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5
z/os V1R11 Communications Server System management and monitoring Network management interface enhancements
IBM Software Group Enterprise Networking Solutions z/os V1R11 Communications Server z/os V1R11 Communications Server System management and monitoring Network management interface enhancements z/os Communications
Java and Other Languages
Java and Other Languages Chris Bailey: STSM, IBM Runtime Monitoring 2015 IBM Corporation A Quick Survey 2 Percentage of Audience What languages do you use? 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Java
Email Deliverability: Optimizing Your Email Marketing Strategy. Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst
: Optimizing Your Email Marketing Strategy Version 1.0.08: September 7, 2008 Presented by: Angela McKay CRM Business Analyst Version 1.0.08 Table of Contents Table of Contents... 2 About this Document...
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide
eprism Email Security Appliance 6.0 Intercept Anti-Spam Quick Start Guide This guide is designed to help the administrator configure the eprism Intercept Anti-Spam engine to provide a strong spam protection
Email Marketing Features
Email Marketing Features intouch Email Marketer is a true all-in-one communications platform and includes everything you need to create, send and track professional HTML emails, autoresponders, surveys,
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics
Name: Srinivasan Govindaraj Title: Big Data Predictive Analytics Please note the following IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice
