The quantity of e-mailed advertising pitches for different opportunities is about to increase dramatically
Published:
9 July 2002 y., Tuesday
The quantity of e-mailed advertising pitches for different opportunities is about to increase dramatically, according to research by Bob West, an anti-spam activist.
E-mail addresses are the currency in a financial shell game that involves rapidly moving consumer contact information from database to database while concealing where and how the data was collected, according to West's research, which he has documented in a map that painstakingly details all the dark and twisted paths that your e-mail address has been traveling.
Spammers harvest e-mail addresses from websites and public posts on Internet newsgroups and bulletin boards and then sell the addresses to other spammers, or to unscrupulous marketing companies who pay a bounty fee per submitted name. These marketing lists may eventually be sold to legitimate companies who often believe they are purchasing a list of eager consumers' addresses.
One end result of all this activity is, rather obviously, more spam showing up in already jammed inboxes. West said his research indicates that unless consumers complain publicly and loudly about the promiscuous passing around of their e-mail addresses, spam will make the mailboxes of most Internet users virtually unusable within the next six to nine months ... "a year if we're lucky."
Other anti-spam activists agreed that spam is proliferating, but pointed out that West's "Spamdemic Map" doesn't indicate any concepts that aren't already widely understood.
Šaltinis:
wired.com
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »