Emails from Cloud Server – Part 2

Practically Speaking About Cloud Computing:

SPAM, the root cause:

We learn that some companies have left cloud servers because of this email sending problem. Quite natural, because this is one of the important requirement from web sites or web applications! When this is not done, the whole purpose of the site gets defeated. So the concern is genuine. So, for us Cloud Technical Professionals, there is need to delve in to this problem. The root cause is SPAM. In the year 2010 it is reported that 107 trillion emails were sent at the rate 300 billion emails per day. Only about 11 percent of it was not Spam. 89% was spam. There are acts and regulations as protection. CAN-SPAM Protection Act from FTC is one of them.

CAN-SPAM Act:

The main requirements of the CAN-SPAM Act:

  • No false or misleading information including header and routing; originating domain and email is must be accurate.
  • No deceptive subject line.
  • You must disclose clearly that it is advt. mail.
  • Message must have valid location address.
  • Message must have info. On how user can opt out of this mail list-unsubscribe.
  • Opt out requests should be honored promptly.
  • Even if another marketing agency sends mail, the company on behalf it sent is responsible.

Each violation is subject to penalties up to $ 16000. The act further defines transactional email and commercial email. In addition to acts like this, there are Real Time Blacklist (RBL) Organizations like Spamhaus.

RBL:

There are various Blacklists databases and organizations each having their own techniques and methodologies to achieve the purpose. Spamhaus is one of the international organizations whose service includes blacklists and white lists. Many internet networks use Spamhaus service and an estimated 80 billion emails per day are captured by it as spam. SORBS or Spam and Open Relay Blocking system is another blacklist. A lot of email servers rely on these RBLs or real time blacklists. Once an IP address is listed in these blacklists databases, the digital world rejects the mails from them as spam.

Cloud an enabler of spam?

We do know that a lot of spam mail originates from compromised PCs called botnets or zombies. Next to these botnets, cloud accounts as the major culprit for sending mass mails. Anyone with credit card can rent the cloud machines and make them as their servers. With cloud service provider’s static ip address, these hosts are used to send bulk mail. This affects cloud hosting service provider’s reputation. Because of this situation, we can not entirely blame the blacklists maintainers. As such it is a Tom and Jerry like tricky situation between cloud service providers and the blacklists organizations chasing each other!

Let us see how a third party ESP can help in this situation, in Part III of this article.

By Malick of CloudTweaks

Follow Us!

CloudTweaks

Established in 2009, CloudTweaks.com is recognized as one of the leading authorities in cloud computing information. Most of the excellent CloudTweaks articles are provided by our own paid writers, with a small percentage provided by guest authors from around the globe, including CEOs, CIOs, Technology bloggers and Cloud enthusiasts. Our goal is to continue to build a growing community offering the best in-depth articles, interviews, event listings, whitepapers, infographics and much more...
Follow Us!
FacebookTwitterLinkedInGoogle+Share

One Response to Emails from Cloud Server – Part 2

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Cloud Infographic – Big Data Survey: What Are The Trends?

Cloud Infographic – Big Data Survey: What Are The Trends?

Jaspersoft Big Data Survey Shows Rise in Commitment to Projects and Decline in Confusion Nearly 1,600 Jaspersoft Community Members Participate in Second Jaspersoft Big Data Survey San Francisco, February 4, 2014 – Jaspersoft, the Intelligence Inside applications and business processes, today shared results from its Big Data Survey. Nearly 1,600 Jaspersoft community members responded to

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving