🔎
Feb 3 2006

Why Email Stamps Are a Bad Idea

Why Email Stamps Are a Bad Idea

(also posted on the Return Path blog)

Rich Gingras, CEO of Goodmail is an incredibly smart and stand-up professional.  I’ve always liked him personally and had a tremendous amount of respect for him.  However, the introduction of the email stamp model by Goodmail is a radical departure from the current email ecosystem, and while I’m all for change and believe the spam problem is still real, I don’t think stamps are the answer.  Rich has laid out some of his arguments here in the DMNews blog, so I’ll respond to those arguments as well as add some others in this posting.  I will also comment on the DMNews blog site itself, but this posting will be more comprehensive and will include everything that’s in the other posting.

It seems that Goodmail’s main argument in favor of stamps is that whitelists don’t work.  While he clearly does understand ISPs (he used to work at one), he doesn’t seem to understand the world of publishers and marketers.  His solution is fundamentally hostile to the way they do business.  I’m happy to have a constructive debate with him about the relative merits of different approaches to solving the false positive problem for mailers and then let the market be the ultimate judge, as it should be.

First, whitelists are in fact working.  I know — Return Path runs one called Bonded Sender.  We have documented several places that Bonded Senders have a 21% lift on their inbox delivery rates over non-Bonded Senders.  It’s hard to see how that translates into “bad for senders” as Rich asserts.  When the average inbox deliverability rate is in the 70s, and a whitelist — or, by the way, organic improvements to reputation — can move the needle up to the 90s, isn’t that good?

Second, why, as Goodmail asserts, should marketers pay ISPs for spam-fighting costs?  Consumers pay for the email boxes with dollars (at AOL) or with ads (at Google/Yahoo/Hotmail).  Good marketers have permission to mail their customers.  Why should they have to pay the freight to keep the bad guys away?  And for that matter, why is the cost “necessary?”  What about those who can’t afford it?  We’ve always allowed non-profits and educational institutions to use Bonded Sender at no cost.  But beyond that, one thing that’s really problematic for mailers about the Goodmail stamp model is that different for-profit mailers have radically different costs and values per email they send.

For example, maybe a retailer generates an average of $0.10 per email based on sales and proit.  So the economics of a $0.003 Goodmail stamp would work.  However, they’re only paying $0.001 to deliver that email, and now Goodmail is asserting that they “only” need to pay $0.003 for the stamp.  But what about publishers who only generate a token amount per individual email to someone who receives a daily newsletter based on serving a single ad banner?  What’s their value per email?  Probably closer to $0.005 at most.  Stamps sound like they’re going to cost $0.003.  It’s hard to see how that model will work for content delivery — and content delivery is one of the best and highest uses of permission-based email.

Next, Rich’s assertion that IP-based whitelists are bad for ISPs and consumers because IP-based solutions have inherent technology flaws that allow senders to behave badly doesn’t make sense.  A cryptographically based solution is certainly more sophisticated technology — I’ve never doubted that.

In terms of the practical application, though, I’m not sure there’s a huge difference.  Either type of system (IP or crypto) can be breached, either one is trackable, and either one can shut a mailer out of the system immediately — the only difference is that one form of breach would be trackable at the individual email level and the other would only be trackable in terms of the pipeline or IP.  I’m not sure either one is more likely to be breached than the other — a malicious or errant spammy email can either be digitally signed or not, and an IP address can’t be hijacked or spoofed much like a digital signature can’t be spoofed.

It’s a little bit like saying your house in the suburbs is more secure with a moat and barbed wire fence around it than with locks on the doors and an alarm system.  It’s an accurate statement, but who cares?

I’m not saying that Return Path will never consider cryptographic-based solutions.  We absolutely will consider them, and there are some things around Domain Keys (DKIM) that are particularly appealing as a broad-based standard.  But the notion that ONLY a cryptographic solution works is silly, and the development of a proprietary technology for authentication and crypotgraphy when the rest of the world is trying desparately to standardize around open source solutions like DKIM is an understandable business strategy, but disappointing to everyone else who is trying to cooperate on standards for the good of the industry.  I won’t even get into the costs and time and difficulty that mailers and ISPs alike will have to incur to implement the Goodmail stamp system, which are real.  Now mailers are being told they need to implement Sender ID or SPF as an IP-based authentication protocol — and DKIM as a crypto-based protocol — and also Goodmail as a different, competing crypto-based protocol.  Oy vey!

Email stamps also do feel like they put the world on a slippery slope towards paid spam — towards saying that money matters more than reputation.  I’m very pleased to hear Goodmail clarify in the last couple of days that they are now considering implementing reputation standards around who qualifies for certified mail as well, since that wasn’t their original model.  That bodes well for their program and certainly removes the appearance of being a paid spam model.  However, I have heard some of the proposed standards that Goodmail is planning on using in industry groups, and the standards seem to be much looser than AOL’s current standards, which, if true, is incredibly disappointing to say the least.

Jupiter analyst David Daniels also makes a good point, which is that stamps do cost money, and money on the line will force mailers to be more cautious about “overmailing” their consumers.  But that brings me to my final point about organic deliverability.  The mailers who have the best reputations get delivered through most filtering systems.  Reputations are based largely on consumer complaints and unknown user rates.  So the mailers who do the best job of keeping their lists clean (not overmailing) and only sending out relevant, requested mail (not overmailing) are the ones that will naturally rise to the top in the world of organic deliverability.  The stamp model can claim one more forcing function here, but it’s only an incremental step beyond the forcing function of “fear of being filtered” and not worth the difficulty of adopting it, or the costs, or the risks associated with it.

Rich, I hope to continue to dialog with you, and as noted in my prior posting, I think separating the issues here is healthy.

Sep 26 2007

Lighten Up!

Lighten Up!

As with Brad, I love a good rant, and Dave McClure’s wild one this week about how VCs and Lawyers Need to Simplify, Innovate, and Automate is fantastic.  I have a roughly 3 foot shelf in my office that has all the bound paper documentation for the financings and M&A we’ve done here over the years and have always felt like it’s an enormous waste on many levels.  The insanity of the faxes, zillions of signatures, original copies, and triplicates is overwhelming.

But the core of the rant is a beautiful and simple suggestion that those who invest in lightweight technology companies and automation platforms should learn how to use just those technologies in their own businesses.  I couldn’t agree more, and it reminds me of my least favorite answer EVER from a VC about why some piece of legal documentation had to be done a certain way:  “Because that’s the way we always do it.”  That argument doesn’t even work when a parent uses it on a 5 year old!

I think lawyers are particularly problematic to this cause, because even if an innovative VC wanted to do things easier and differently, the lawyers would probably throw up all over it.  But in the end, if the VC is the client, he or she can and should overrule and manage counsel.  The world is now moving at too quick a pace to keep deal paperwork in the stone ages.

Oct 18 2010

Why CEOs Shouldn’t Mess with Engineers

Why CEOs Shouldn’t Mess with Engineers

I went to the Vasa Royal Warship Museum in Stockholm the other day, which was amazing – it had a breathtakingly massive 17th century wooden warship, which had been submerged for over 300 years, nearly intact as its centerpiece.  It’s worth a visit if you’re ever there.

The sad story of its sinking seems to have several potential causes, but one is noteworthy both in terms of engineering and leadership.  The ship set sail in 1628 as the pride of the Swedish navy during a war with Poland.  It was the pride of King Gustavus Adolphus II, who took a keen personal interest in it.  But the ship sank literally minutes after setting sail.

How could that be?  While the king was quick to blame the architect and shipbuilder, later forensics proved both to be mostly blameless.

Likely cause #1:  after the ship was designed and construction was under way, the King overruled the engineers and added much heavier cannons on the upper armament deck.  The ship became top-heavy and much less stable as a result, and while the engineers tried to compensate with more ballast below, it wasn’t enough.

Likely cause #2:  the King cut short the captain’s usual stability testing routines because he wanted to get the ship sailing towards the enemy sooner.

Let’s translate these two causes of failure into Internet-speak.  #1:  In the middle of product development, CEO rewrites the specs (no doubt verbally), overruling the product managers and the engineers, and forces mid-stream changes in code architecture.  #2:  In order to get to market sooner, the CEO orders short-cuts on QA.  I’m sure you’ll agree the results here aren’t likely to be pretty.

So product-oriented leaders everywhere…remember the tale of Gustavus Adolphus and the Vasa Royal Warship and mind the meddling with the engineers!

Jul 27 2007

A Viral Marketing Program That Needs to See a Doctor

A Viral Marketing Program That Needs to See a Doctor

I hate sites that make you register in order to read things sent by friends.  What a crappy consumer experience.  If you’re going to make people register to use the site, fine.  But at least allow a small crack in the walled garden for friends to read articles and try your site out.

Today, my friend Len Ellis sent me what looked like a really interesting article in Ad Age via the “send to a friend function.”  When I clicked through the link in the email, it first made me complete a lengthy registration process, including various special offer checkboxes and subscription offers for the magazine and its newsletters.

I went ahead and did this because I was interested in the article.  Then I had to wait for a confirmation email, click on it, and then finally got to see the article.  Except it turns out that what I got to see was the headline and first sentence.  Then Ad Age tole me that in order to read the whole article, I either have to subscribe to the print edition and fill out more forms or pay.  Forget it.  I’ll ask Len to copy the text of the article and send it to me directly.

Why even bother having a “send to a friend” function?

Dec 7 2005

The Rumors of Email’s Demise Have Been Greatly Exaggerated, Part V

The Rumors of Email’s Demise Have Been Greatly Exaggerated, Part V

Thank goodness I can finally write a positive piece under this headline, and not a rebuttal like I did here, here, here, and here.

It seems like there are signs of an email marketing renaissance left, right, and center these days.  First, the industry has enjoyed significant growth this year.  Every vendor I speak with in the space except for one or two is posting record numbers — whether they sell data, technology, or services.  And lots of vendors have been swallowed up by larger multi-channel CRM or DM companies for nice prices.  Every marketer or publisher I speak with is investing more money into their email programs, and they are seeing stellar returns.  In fact, their most persistent complaint is that they can’t get enough good names on their lists fast enough.

But beyond those signs, the much-maligned email channel has finally garnered some positive press of late.  First, as, Ellen Byron wrote on November 23 in her Wall Street Journal article entitled “Email Ads Grow Up – Department Stores Discover Devoted Fashion Fans Read Messages in Their Inboxes,” consumers are beginning to much more easily separate spam from commercial email they want, one consumer even going so far as to call emails she receives from retailers “like a quick shopping trip…a guilty pleasure.”

Byron also went on to quantify what some mailers are doing to tilt the balance of their marketing spend ever so slightly in the direction of email.  For example, The Gap is diverting over $26mm that they spent last holiday season on TV towards online and magazine.  And analysts point out that no matter how much marketers spend on their email programs, it’s still a small fraction of what it costs to create and insert a big print or broadcast spot.  I couldn’t even find the full article to link to, but it wouldn’t matter, as you have to be a Journal subscriber to read it (annoying).

And today, email industry guru Bill McCloskey wrote an admittedly self/industry-serving piece about how he is seeing the signs of this email renaissance moving into 2006 as well, starting with the fact that trade associations like the ESPC and the DMA are doing more to step up to the plate in terms of defending and promoting the email channel with the press and consumers.  He also cites the fact that consumers are getting more used to spam and mentally separating out good email from bad email as a reason for the comeback.  Bill even goes so far as to say that “email will surpass search in the battle for marketers’ hearts and minds.”  The full article is here, but warning again, you have to be a Mediapost subscriber to read it (free but still annoying).

It’s nice to see the media tide turning here towards a more rational, balanced position on email.  It’s not just about spam and scams — it’s about the power, customization, and intimacy of the channel!

Apr 2 2009

I Don’t Want to Be Your Friend (Today)

I Don’t Want to Be Your Friend (Today)

The biggest problem with all the social networks, as far as I can tell, is that there’s no easy and obvious way for me to differentiate the people to whom I am connected either by type of person or by how closely connected we are.

I have about 400 on Facebook and 600 on LinkedIn.  And I’m still adding ones as new people get on the two networks for the first time.  While it seems to people in the industry here that “everyone is on Facebook,” it’s not true yet.  Facebook is making its way slowly (in Geoffrey Moore terms) through Main Street.  Main Street is a big place.

But not all friends are created equal.  There are some where I’m happy to read their status updates or get invited to their events.  There are some where I’m happy if they see pictures of me.  But there are others where neither of these is the case.  Why can’t I let only those friends who I tag as “summer camp” see pictures of me that are tagged as being from summer camp?  Why can’t I only get event invitations from “close friends”?  Wouldn’t LinkedIn be better if it only allowed second and third degree connections to come from “strong” connections instead of “weak” ones?

It’s also hard to not accept a connection from someone you know.  Here’s a great example.  A guy to whom I have a very tenuous business connection (but a real one) friends me on Facebook.  I ignore him.  He does it again.  I ignore him again.  And a third time.  Finally, he emails me with some quasi-legitimate business purpose and asks why I’m ignoring him — he sees that I’m active on Facebook, so I *must* be ignoring him.  Sigh.  I make up some feeble excuse and go accept his connection.  Next thing I know, I’m getting an invitation from this guy for “International Hug a Jew Day,” followed by an onslaught of messages from everyone else in his address book in some kind of reply-to-all functionality.  Now, I’m a Jew, and I don’t mind a hug now and then, but this crap, I could do without. 

I mentioned this problem to a friend the other day who told me the problem was me.  “You just have too many friends.  I reject everyone who connects to me unless they’re a really, super close friend.”  Ok, fine, I am a connector, but I don’t need a web site to help me stay connected to the 13 people I talk to on the phone or see in person.  The beauty of social networks is to enable some level of communication with a much broader universe — including on some occasions people I don’t know at all.  That communication, and the occasional serendipity that accompanies it, goes away if I keep my circle of friends narrow.  In fact, I do discriminate at some level in terms of who I accept connections from.  I don’t accept them from people I truly don’t know, which isn’t a small number.  It’s amazing how many people try to connect to me who I have never met or maybe who picked up my business card somewhere.

The tools to handle this today are crude and only around the edges.  I can ignore people or block them, but that means I never get to see what they’re up to (and vice versa).  That eliminates the serendipity factor as well.  Facebook has some functionality to let me “see more from some people and less from others” — but it’s hard to find, it’s unclear how it works, and it’s incredibly difficult to use.  Sure, I can “never accept event invitations from this person,” or hide someone’s updates on home page, but those tools are clunky and reactive.

When are the folks at LinkedIn and Facebook going to solve this?  Feels like tagging, basic behavioral analysis, and checkboxes at point of “friending” aren’t exactly bleeding edge technologies any more.

Oct 27 2004

Why is Seth Godin so Grumpy?

Why is Seth Godin so Grumpy?

Permission marketing guru Seth Godin says we should all Beware the CEO blog. His logic? Blogs should have six characteristics: Candor, Urgency, Timeliness, Pithiness, Controversy, and maybe Utility — and apparently in his book, CEOs don’t possess those characteristics.

Certainly, CEOs who view blogs as a promotional tool are wasting their time, or are at least missing a fundamental understanding about the power of blogs and interactivity.

But many of the ones I read (and the one I write) do their best to be anything but promotional. One of my colleagues here describes my blog as “a peek inside the CEO’s head,” which is a great way of putting it. And I still stand by my earlier posting about the value of the blog to me and to the company — hardly “annual report fluff.”

How’s that for honest, timely, controversial, and pithy, Seth?

Aug 22 2013

Unknown Unknowns

Unknown Unknowns

There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don’t know. But there are also unknown unknowns. There are things we don’t know we don’t know.”   –Donald Rumsfeld

Say what you will about Rumsfeld or the Iraq war, but this is actually a great and extensible quote.  And more to the point, I’d say that one of the main informal jobs of a CEO, sort of like Connecting the Dots in that it’s not one of the three main roles of a CEO) is to understand and navigate known unknowns and unknown unknowns for your organization (hopefully you already understand and navigate the known knowns!).  Here’s what I mean:

  • An example of a known unknown is that a new competitor could pop up and disrupt your business from below (e.g., the low end) at any minute.  Or let’s say your biggest partner buys one of your competitors.  These are the kinds of things you and your team should be cognizant of as possibilities and always thinking about how to defeat
  • While I suppose unknown unknowns are by definition hard to pin down, an example of an unknown unknown is something like a foreign leader deciding to nationalize the industry you’re in including your local subsidiary, or a young and healthy leader in your organization dying unexpectedly, or September 11.  I suppose these are “black swan” events that Nassim Nicholas Taleb made famous in his book.

Helping your team identify potential known unknowns and think three steps ahead is critical.  But helping your team turn unknown unknowns into known unknowns is, while much harder, probably one of the best things you can do as CEO of your organization.  And there are probably two ways you can do this, noting that by definition, you’ll never be able to know all the unknowns.  As you might expect, the way to do that comes down to increasing your pool of close-at-hand knowledge.

First, you and your executive team can have as broad a view of your industry and corporate ecosystem, and of the economy at large, as possible.  It’s critical for business leaders to read diverse publications, to share insights with teammates, and to network with experts both inside and outside your space.
Second, you can design a culture so that information flows freely up, down, and sideways — so that people in your organization want to share information instead of hoard it.  That’s easier said than done, and there’s more than a blog post worth of what has to go into making that a reality.  But think about the CIA and all the flak they got about failure to connect the dots around September 11.  To close this post where I opened it, you can be the chief connector inside your organization…but you need to get your organization connecting the dots itself.
Jun 16 2011

Keeping It All In Sync?

Keeping It All In Sync?

I just read a great quote in a non-business book, Richard Dawkins’ River out of Eden, Dawkins himself quoting Darwinian psychologist Nicholas Humphrey’s revolting of a likely apocryphal story about Henry Ford.  The full “double” quote is:

It is said that Ford, the patron saint of manufacturing efficiency, once

commissioned a survey of the car scrapyards in America to find out if there were parts of the Model T Fird which never failed. His inspectors came back with reports of almost every kind of breakdown:  axles, brakes, pistons — all were liable to go wrong. But they drew attention to one notable exception, the kingpins of the scrapped cars invariably had years of life left in them. With ruthless logic, Ford concluded that the kingpins on the Model T were too good for their job and ordered that in the future they should be made to an inferior specification.

You may, like me, be a little vague about what kingpins are, but it doesn’t matter. They are something that a motor far needs, and Ford’s alleged ruthlessness was, indeed, entirely logical. The alternative would have been to improve all the other bits of the car to bring them up to the standard of the kingpins. But then it wouldn’t have been a Model T he was manufacturing but a Rolls Royce, and that wasn’t the object of the exercise. A Rolls Royce is a respectable car to manufacture and so is a Model T, but for a different price. The trick is to make sure that either the whole car is built to Rolls Royce specifications or the whole car is built to Model T specifications.

Kind of makes sense, right?  This is interesting to think about in the context of running a SaaS business or any internet or service business.  I’d argue that Ford’s system does not apply or applies less.  It’s very easy to have different pieces of a business like ours be at completely different levels of depth or quality.  This makes intuitive sense for a service business, but even within a software application (SaaS or installed), some features may work a lot better than others.  And I’m not sure it matters.

What matters is having the most important pieces — the ones that drive the lion’s share of customer value — at a level of quality that supports your value proposition and price point.  For example, in a B2B internet/service business, you can have a weak user interface to your application but have excellent 24×7 alerting and on-call support — maybe that imbalance works well for your customers.  Or let’s say you’re running a consumer webmail business.  You have good foldering and filtering, but your contacts and calendaring are weak.

I’m not sure either example indicates that the more premium of the business elements should be downgraded.  Maybe those are the ones that drive usage.  In the manufacturing analogy, think about it this way and turn the quote on its head.  Does the Rolls Royce need to have every single part fail at the same time, but a longer horizon than the Model T?  Of course not.  The Rolls Royce just needs to be a “better enough” car than the Model T to be differentiated in terms of brand perception and ultimately pricing in the market.

The real conclusion here is that all the pieces of your business need to be in sync — but not with each other as much as with customers’ needs and levels of pain.

Jun 15 2007

Is Permission Still Relevant?

Is Permission Still Relevant?

My colleague Stephanie Miller wrote a great post on our Return Path blog this week entitled Is Permission Enough? The essence of her argument is:

…permission is not forever…Subscribers opt in and then promptly forget about their actions…Nor is permission a panacea. Opt-in doesn’t replace relevancy and keeping your promises.

And she goes on to give great examples of how marketers abuse permission and a great checklist of times marketers shouldn’t ASSUME permission, which is where the trouble starts.

So I concur — permission is never enough from a sender’s perspective.  But you still have to have it.  Why?  Read on.

I’d like to extend Stephanie’s argument from senders to receivers and question whether permission is as relevant as it once was in terms of how ISPs, filters, and blacklists determine whether or not to block mail.

The argument for permission as a relevant filtering criteria goes something like this:

1. Unsolicited commercial email = evil. It is the true definition of spam.  If I don’t ask for it, you have no right to send it to me.

The argument against permission as a relevant filtering criteria is more nuanced:

1. It doesn’t matter if something is opt-out quadruple opt-in. Users think of spam as “email I don’t want,” not “email I didn’t sign up for.”  As Stephanie says, bad email I signed up for is even worse than unsolicited email in some ways.  And look at the other side of the argument as well:  would you really mind getting an unsolicited/unpermissioned email if the content or offer was highly relevant to you, e.g., you seriously consider clicking through on it?

2. Permission can be easily faked or loopholed. Companies can operate multiple web sites and email lists and gather addresses from multiple sources and then point to the one “proper permission site” and claim that’s the origin of all the names on its list.  And companies can set up privacy policies in such a way that they can automatically opt users into multiple lists without the user’s permission unless the user reads the fine print.

3. Permission is hard to measure. Besides the fact that permission can be faked, the main way that blacklists and filters try to measure permission is by looking at spam trap hits.  Sometimes this works — the cases where the spam trap addresses are newly-created addresses that never sign up for lists.  But most ISP and other spam trap networks also include recycled email addresses as well — addresses that were real and probably did sign up for email newsletters and marketing at one point but have since gone inactive.  Yes, a mailer that hits this kind of spam trap address is probably guilty of sloppy list hygiene and poor or nonexistent targeting and customer segmentation.  But does this mean they’re a truly egregious spammer?

4. Reputation trumps permission. The world of reputation systems is driving quickly to the point where we can tell much more accurately and automatically if a mail stream is “good” or “bad” as defined by users in terms of complaints and as defined by infrastructure security, authentication, and various other metrics.

So where I come out on this is that permission is FAR LESS RELEVANT than it used to be for receivers as filtering criteria, but probably not 100% irrelevant yet.  Perhaps in a couple years as reputation data-driven filtering becomes refined and the norm, we will be able to be more accepting of highly targeted and relevant unsolicited email (as we are sometimes with highly targeted and relevant postal mail), but I’m not sure the world is psychologically there just yet.  There’s still too much egregious spam in the inbox, and as a result, while users primarily think of spam as “email I don’t want,” they also do still think of spam as “email I didn’t ask for.”

But for now, senders can certainly rely on permission — if and only if it’s up to date and contextual — as “first pass” screen on relevancy.

Where do you come out on this?

Feb 25 2005

Oh, Behave!

Oh, Behave!

This week, we launched behavioral targeting for email through our PostMasterDirect group.  This is a great development for us and will produce great value for clients over time by increasing response rates.  It may seem like a bit of buzzword bingo since BT is the phrase of the year in the online media world, but it’s actually a product we’ve had in development for some time now.

Our VP Engineering for list and data products, Whitney McNamara, had a great posting on his blog about BT and how we do it.  The whole thing is worth a read, but the real gem in my mind (and what’s most consistent with Return Path‘s philosophy about consumers and targeting in general) is at the end:

As a final note, it’s critical to remember that none of this means that the people who are collecting the data know better than that actual people on the receiving end what is appropriate and interesting. Ideally (as in the case of PMD/RP’s behavioral targeting), BT is a technique that supplements — not replaces — targeting based on people’s explicit requests for information.

And yes, I have to admit that at least a small part of the reason for this posting is the title.