Emails from Cloud Server – Part 2

Practically Speaking About Cloud Computing:

SPAM, the root cause:

We learn that some companies have left cloud servers because of this email sending problem. Quite natural, because this is one of the important requirement from web sites or web applications! When this is not done, the whole purpose of the site gets defeated. So the concern is genuine. So, for us Cloud Technical Professionals, there is need to delve in to this problem. The root cause is SPAM. In the year 2010 it is reported that 107 trillion emails were sent at the rate 300 billion emails per day. Only about 11 percent of it was not Spam. 89% was spam. There are acts and regulations as protection. CAN-SPAM Protection Act from FTC is one of them.

CAN-SPAM Act:

The main requirements of the CAN-SPAM Act:

  • No false or misleading information including header and routing; originating domain and email is must be accurate.
  • No deceptive subject line.
  • You must disclose clearly that it is advt. mail.
  • Message must have valid location address.
  • Message must have info. On how user can opt out of this mail list-unsubscribe.
  • Opt out requests should be honored promptly.
  • Even if another marketing agency sends mail, the company on behalf it sent is responsible.

Each violation is subject to penalties up to $ 16000. The act further defines transactional email and commercial email. In addition to acts like this, there are Real Time Blacklist (RBL) Organizations like Spamhaus.

RBL:

There are various Blacklists databases and organizations each having their own techniques and methodologies to achieve the purpose. Spamhaus is one of the international organizations whose service includes blacklists and white lists. Many internet networks use Spamhaus service and an estimated 80 billion emails per day are captured by it as spam. SORBS or Spam and Open Relay Blocking system is another blacklist. A lot of email servers rely on these RBLs or real time blacklists. Once an IP address is listed in these blacklists databases, the digital world rejects the mails from them as spam.

Cloud an enabler of spam?

We do know that a lot of spam mail originates from compromised PCs called botnets or zombies. Next to these botnets, cloud accounts as the major culprit for sending mass mails. Anyone with credit card can rent the cloud machines and make them as their servers. With cloud service provider’s static ip address, these hosts are used to send bulk mail. This affects cloud hosting service provider’s reputation. Because of this situation, we can not entirely blame the blacklists maintainers. As such it is a Tom and Jerry like tricky situation between cloud service providers and the blacklists organizations chasing each other!

Let us see how a third party ESP can help in this situation, in Part III of this article.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

Find out more
View All Articles

Sorry, comments are closed for this post.

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

The Monstrous IoT Connected Cloud Market

The Monstrous IoT Connected Cloud Market

What’s Missing in the IoT? While the Internet of Things has become a popular concept among tech crowds, the consumer IoT remains fragmented. Top companies continue to battle to decide who will be the epicenter of the smart home of the future, creating separate ecosystems (like the iOS and Android smartphone market) in their wake.…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Cloud Infographic – Big Data Analytics Trends

Cloud Infographic – Big Data Analytics Trends

Big Data Analytics Trends As data information and cloud computing continues to work together, the need for data analytics continues to grow. Many tech firms predict that big data volume will grow steadily 40% per year and in 2020, will grow up to 50 times that. This growth will also bring a number of cost…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Low Cost Cloud Computing Gives Rise To Startups

Low Cost Cloud Computing Gives Rise To Startups

Balancing The Playing Field For Startups According to a Goldman Sachs report, cloud infrastructure and platform spending could reach $43 billion by 2018, which is up $16 billion from last year, representing a growth of around 30% from 2013 said the analyst. This phenomenal growth is laying the foundation for a new breed of startup…