We are excited to announce the next generation of SparkPost’s Recipient Validation — data-driven email address validation powered by the world’s largest email database. Our Recipient Validation now catches twice as many invalid addresses as before, giving you the best sender reputation protection on the market. Our new data-driven system uses data from thousands of other senders, so you can remove more undeliverable and toxic addresses from your lists before they bounce and hurt your sending reputation. We analyzed a sample of customers using another validation solution and found that on average our Recipient Validation would catch an additional 31% of their hard bounces missed by our competitors, helping you send with confidence. …


What’s orange, six-feet tall, and weighs 160 pounds?

Image for post
Image for post
AWS re:Invent 2017 SparkPost booth

When we sat down to plan our booth at AWS re: Invent I had this grand idea of incorporating one of our Q4 campaigns, “Send an Email to Santa’s Inbox” with a winter wonderland themed booth. However, someone came forward and said, “I don’t think we should do it because I just don’t get it. Developers and Santa. It’s not working for me. It’s also untested. What about something like Star Wars?”

Most of the marketing team responded with “Who doesn’t love Santa?” and eye-rolled at the idea of a Star Wars themed booth (so overdone at this point). Plus, I firmly believe that developers like more than just Star Wars. I bet I can even find developers who don’t like Star Wars. …


Image for post
Image for post

A couple years ago, I was chatting with a friend who was telling me about working at SparkPost. He asked me if I thought it would be a challenge to communicate about email and how it works. I have to confess, my first reaction was, “how hard can it be?” After all, I was a technically literate person who had a lot of enterprise tech marketing under my belt. I knew something about the basic standards involved with email transmission. I even had some hands-on knowledge of administering small-scale mail servers.

Suffice to say, it didn’t take me long to realize just how much I didn’t know! In particular, the challenge of ensuring email deliverability for large-scale senders was a real eye-opener. …


Image for post
Image for post

I’ll be honest, I’m not a morning person. Jokes have been made about this, coffee meetups are a common occurrence, and I may have gotten my partner and some of my coworkers addicted to coffee… but that’s another story. There’s something about having to do all of the menial morning tasks around the house that makes me want to burrow deeper into the covers. This way I can wake up excited and ready to face the day.

Enter MyMorning.Online, winners of the SparkPost prize from AngelHack Silicon Valley. …


Image for post
Image for post
Image credit: SparkPost.com/blog

Every startup dreams of being covered in the popular tech publications. But how do you pitch to these cloud, infrastructure or dev beat reports to cover your tiny little startup when you’re vying for their attention in their inbox along with the likes of Google, Amazon or Microsoft? Tech journalists get hundreds of pitches a day.

At a recent event held by Heavybit, tech journalists from prestigious publications such as TechCrunch, VentureBeat, and eWeek shared their tips on how to pitch them. It was really insightful for startups to hear first hand from these tech journalists on what they deem valuable pitches versus cardinal sins in pitching your story. …


Image for post
Image for post

An attestation, by definition, is an indication that makes something evident. In the case of security, specifically security programs it means to certify in an official capacity.

People often ask me what makes a good security program. As much as I would like to point to one aspect of my security perimeter to use as an example, there are multiple items to highlight. The industry relies on attestations and certifications to measure your security defenses. Engineers and operators will tell you that your actual security perimeter and threat assessment capabilities define your security program. I will tell you it is both compliance attestations as a measurement and the operational capabilities of your security team, that define your program. …


Image for post
Image for post

We love it when developers use SparkPost webhooks to build awesome responsive services. Webhooks are great when you need real-time feedback on what your customers are doing with their messages. They work on a “push” model — you create a microservice to handle the event stream.

Did you know that SparkPost also supports a “pull” model Message Events API that enables you to download your event data for up to ten days afterwards? This can be particularly useful in situations such as:

  • You’re finding it difficult to create and maintain a production-ready microservice. …


As a sender in today’s environment it is important to stay up on any and all Anti-Spam Laws that may affect your business. The safest way to stay ahead of the curve is to follow the strictest anti-spam laws keeping it simple so that you don’t have to focus on different laws for different regions. With a global market and ISPs that have a global footprint making it difficult to rely on regional TLDs to know where each recipient resides makes it all the more important to follow the strictest of laws. …


Image for post
Image for post

Providing a SaaS product to both large enterprise customers and smaller startups means we’ve got a wide range of possible touch points with our user base. One of the benefits to this is the opportunity for 1:1 feedback. Sometimes it’s in the form of a formal business review, sometimes it’s a cold email to an employee that gets forwarded up the chain. In this particular instance, a budding entrepreneur reached out to our VP of Growth Marketing for some potential cross promotional activity, and our relationship grew from there. …


Email Basics for Developers Just Starting Out

Being new to the world of email is a daunting thing. I should know. When I joined SparkPost, I knew nothing of the nuances that make email move from sender to inbox. Don’t get me wrong, I knew about SMTP, POP3, and how email moved through the internet. That is the theory of sending email. The practice is far more nuanced. Hopefully, sharing my experience will help you, my fellow developers.

Sending an email through software is generally a trivial task for a software developer. Creating a successful email communication system that allows your organization to effectively engage with an application’s users takes more effort and knowledge, but with a little planning the process can be fairly painless. …

About

SparkPost

SparkPost, is the world’s fastest growing cloud email service. Built for devs, by devs. Follow us to learn more.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store