Please take 5 to 10 minutes to answer Sherpa's 7th annual Email Questionnaire
In a trend that may dramatically increase some e-mail marketers’ ability to get their e-mail delivered, several household-name inbox providers have reportedly confirmed they are increasingly working toward domain-based reputation monitoring.
For marketers who don’t send spam, this is great news and a development to be taken advantage of.
According to e-mail deliverability firm Pivotal Veracity, AOL and Yahoo! are in the midst of implementing domain-based reputation monitoring for mailers that have authenticated their servers using DKIM.
AOL plans to implement domain-based reputation monitoring sometime between the beginning of October and the end of March, according to Pivotal Veracity.
Yahoo! will “soon” begin collecting data based on mailers with good existing reputations that are also using the DKIM authentication scheme, according to Pivotal Veracity.
Microsoft, on the other hand, is implementing a domain-based reputation system for mailers using the Sender ID authentication method—not to be confused with e-mail deliverability firm Return Path’s Sender Score Certified program.
The information was obtained through interviews with the postmaster teams at the various e-mail inbox providers, according to Pivotal Veracity.
Continue reading here: Big Reputation Changes Loom: What They Mean to You.
Why you don’t want to give up on emailThis is just a snippet from the post on Copyblogger. I highly recommend the entire blog post.! It's really good stuff!
For awhile, it looked like email was old-fashioned anyway. RSS was where it was at. We were going to create amazing connections with our blogs. Not only could we have terrific conversations, but our content was linkable, findable via search engines, and part of a global dialogue. Who needs boring old email?
But here’s the secret that smart online marketers know: When you want to move from conversation to commerce, email just works better.
Email lists are more responsive than RSS subscribers. They’re more engaged. They’re less likely to drift away and forget you. And they’re more profitable.
Email is a more intimate medium than RSS. If RSS is a networking event, permission-based email is a dinner party. (As opposed to mailing to an email list you purchased, which is some jackass cold-calling you to sell life insurance during your dinner party. Don’t do that.)
The Direct Marketing Association consistently reports that the ROI on email marketing remains far above that of search or other marketing channels. That’s in line with what I see and hear in online business. And guess what? Smarter email marketing = better results.
"Last week AOL announced on its postmaster blog changes to the way it will be handling mailer daemon errors.
What does this mean for large-volume email senders? You should expect to see a change in the From: address, as well as the number of asynchronous bounces you receive from AOL. Asynchronous bounces occur after the SMTP conversation, which means that the ISP accepts the senders' email first and then rejects it later. As a result, the bounce notifications trickle in minutes to days after the initial send in the form of an email. This is different from synchronous bounces, which occur during the SMTP conversation. Most MTAs record those bounces in the form of a log entry."
Continue reading here: Changes to AOL Bounce Processing :: Return Path Blog.
According to Return Path’s latest Deliverability Benchmark Report, only 79.3% of commercial, permissioned emails reached the inboxes in the United States and Canada during the first half of 2009. With the undelivered email, 3.3% is routed to a "junk" or "bulk" email folder and 17.4% is not delivered at all - with no hard bounce message or other notification of non-delivery.
Some other interesting findings from the study include:
The Messaging Anti-Abuse Working group (MAAWG) issued a report titled, "A Look at Consumers' Awareness of Email Security and Practices" (pdf).
MAAWG commissioned the study to gauge users' understanding of messaging threats and to identify how best to work with users in removing bots and viruses from infected systems. The report is based on 800 interviews with computer users in the United States and Canada who said they were not "security experts" and who used email addresses that were not managed by a professional IT department.
Some highlights from the report: