Blog
How Cryptography Protects Your Data (& What You Can Do Today)
Lock It Up (But Don’t Throw Away The Key) As we readied this post for publication in September 2017, Equifax announced…
The Do’s & Don’ts of Naming Your IP Addresses
What’s in a Name? As humans, we love to name things: children, pets, streets, mountains, rivers, oceans, deserts, and IP…
Four Ways Routing Rules Will Redefine Your Email Sending
What’s a Routing Rule? If you send email using VirtualMTAs (which allow senders to send email from multiple IP addresses), you…
Nine Essential Ways to Keep Your Email Server Secure
My wife and I have a new hobby—powerlifting. Most people relax during the summer, but Paige and I decided to…
How ISP Rate Limiting Is Ruining Your Relationship
We need to talk. I think we need some space. I like you, but I need time to process our relationship. …
Transactional Email Speed: A 30-Day Experiment
Has this ever happened to you? I love aged Sumatran coffee. It’s often marketed as a Christmas blend, so it…
What Is a Bounce Processor, and Why Does It Matter?
I love eggs. Fried, scrambled, poached, or boiled, they’re one of my favorite foods. But as we all know, eggs…
Advanced Email Throttling: Three Essential Tools for Sending Success
Ready for the spotlight? Even though I’ve been playing for several years now, I’m still pretty much a novice whose…
Email Throttling Basics: What You Need to Know
One of my favorite hobbies is practicing the banjo. And while my wife is a good sport about it, there’s…
Three Ways To Warm-Up Your IP Addresses (& Keep Them Hot)
There you are. The great outdoors. The tent is pitched. Marshmallows, graham crackers, and Hershey’s chocolate sit nearby as your…