By
Tom Sather
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
1 Comment
Comments
4. Use only dedicated IPs. When you share a sending IP with other senders, you have no control over how they use it. However, you'll certainly pay if they abuse it. Blacklist operators aren't able to distinguish your sending practices from others, so if their messages trigger a blacklisting, your baby will be thrown out with their bath water.
1 Comment
View Comments
- Companies:
- Return Path, Inc.
E
Tom Sather
Author's page
Tom Sather is Return Path’s senior director of email research. Tom uses his knowledge of ISPs, spam filters and deliverability rules to advise marketers on how to get their email delivered to the inbox. He began his Return Path career as an email deliverability consultant working with top-brand clients like eBay, MySpace, IBM and Twitter. Tom’s previous experience includes roles with email service provider Experian and on the abuse desks for AOL, Bellsouth, AT&T and GTE.
Related Content
Comments