Build the future of communications.
Start building for free
  • By Len Shneyder
    Twilio Emailを数字で見る〜'21年秋冬ホリデーシーズン TSG-Email-BFCM-2021-jp

    この記事は、インダストリーマーケティング担当のLen Shneyderが、こちら(英語)で執筆した記事を日本語化したものです。

    11月末の米国のホリデーシーズンを振り返る時期になりました。Eメールの世界では、このホリデーシーズン(ブラックフライデーとサイバーマンデー)は、スポーツの世界のワールドカップ、スーパーボウル、スタンレーカップ、ワールドシリーズ、オリンピックなどが同時並行で実施されるような規模の出来事(あくまでも例えです 😁)として捉えられます。2021年のホリデーシーズンは2020年に比べれば、人びとのショッピングに対する期待度の点で確かに改善されていると言えますが、パンデミック前の2019年とは比べものになりません。とはいえ、2019年から今年2021年のホリデーシーズンにおいて一貫しているのは、顧客を惹きつけ、ホリデーショッピングシーズンを盛り上げる手段として、Eメールに驚くほど依存していることです。


    Twilio SendGridにおけるEメールトラフィックの処理量は、今年2021年も大幅に伸長しました。Twilio SendGridプラットフォームはブラックフライデー(BF)に約68億通、サイバーマンデー(CM)に70億通超のEメールを処理しましたが、これは2020年からの対前年比(YoY)で各々16.9%、22.2%の伸びとなっています。Twilio SendGridプラットフォームは、1時間あたり5.3億APIリクエストという再繁時バーストレートを維持しながら、優れたパフォーマンスを発揮しました。 …

    Read More
  • By Len Shneyder
    The Google BIMI Pilot Is Here! Google BIMI Pilot

    In January of this year, Twilio became a part of the Authindicators working group, joining numerous other entities in the email ecosystem including Google, Yahoo!, Comcast, Valimail, and Validity in an effort to bring Brand Indicators for Message Identification (BIMI) to life. BIMI is a standard that attempts to increase the wide adoption of email authentication in the ecosystem while simultaneously providing senders with a way to provide their customers with a more immersive experience.

    With two of the three biggest North American free mailbox providers, as well as one of the largest ISP's committing to supporting the development of the standard, the importance of BIMI is abundantly clear and we wanted to ensure that we brought BIMI to the community of senders that view email as a crucial communication tool. This couldn’t be more true today as the global community struggles with the ongoing effects of the COVID-19 …

    Read More
  • By Len Shneyder
    Protecting Inboxes is a Civic Duty Inbox Protection Rate Q4 2019

    Since the 2016 elections there has been a critical focus on the mechanisms we use to engage with the political process, discuss issues, read news, and ultimately, engage in the constitutionally enshrined activity of voting. Although email is tangential to the voting process, it is nonetheless a critical component of our everyday lives, both personal and professional, and often the first salvo in a cyber attack. Phishing is of course a social engineered attack via email, however the ramifications of a successful phishing attack can be far reaching and infinitely devastating. David Ingram put it best in a recent article focused on phishing attacks against Burisma and Democratic Presidential Candidates: Cracking computer systems is hard. Cracking people? Not as hard.” Presidential candidates have been warned about not only financial scams but the attempts of state sponsored hackers seeking to derail the 2020 elections.

    In 2016 we saw how …

    Read More
  • By Len Shneyder
    Efforts Ramp Up to Strengthen Wanted Campaign Communications Efforts Ramp Up

    Election security means different things to different people. Cyber security personnel may think of election security as locking down access to voting machines. Other experts in the field may focus their attention on securing systems that are critical to the day to day operations of organizing elections, such as email and other communication channels, as a means of shrinking the attack surface of our elections. Whatever the focus, one thing rings absolutely true: maintaining free, fair and credible elections in democracies around the world is absolutely key to ensuring the survival of those democracies. With that in mind we can all agree that election security is crucial and complicated given the inherent complexities that lay across every aspect of communications, systems, hardware and the software that powers today’s internet.

    Twilio sits in an interesting spot in the complex and layered framework of elections in the United States. As the world’s …

    Read More
  • By Len Shneyder
    2019 Holiday Email Metrics 2019 Holiday Email Analytics

    The holidays are a distant memory for some—for others they’re a big looming target on the horizon 10 months from now. Whatever perspective you take, the truth of the matter is that every iteration of the holiday bonanza is an opportunity to experiment and learn. And yes, capitalize on the growing opportunity to engage and convert new and existing customers.

    The Big Picture

    I’ve said it before and I’ll say it again: email is a highly instrumented channel that allows senders to benchmark their performance across numerous data points and vectors. In 2019 Twilio SendGrid processed over 4.2 billion emails on Black Friday and over 4.3 billion emails on Cyber Monday. The trend chart below shows you the growth of our platform from SendGrid’s inception and although it’s not causal, the growth of the holiday shopping event which reaches new highs with every trip around the sun. Chart

    The reason for …

    Read More
  • By Len Shneyder
    Twilio SendGrid Joins The Authindicators Working Group Twilio SendGrid joins the Authindicators Working Group

    The Email Renaissance

    The email inbox has been undergoing a renaissance for the better part of a decade. At first the changes were small and a matter of necessity. Then iOS and Android came along which meant that the inbox was no longer just on our laptops but in everyone’s pocket. Email had to adapt to new platforms, formats and ways of being used and consumed. Last year Google announced the general availability of AMP for Email. The new standard is being adopted by other mailbox providers solidifying the fact that the inbox is becoming more interactive.

    These new form factors, interactivity and functionality are all being built with the understanding that the inboxes of tomorrow must be more secure than ever before. Email authentication is quickly becoming not only a best practice but a prerequisite for senders hoping to engage their recipients in new and unique ways.

    BIMI …

    Read More
  • By Len Shneyder
    TWILIO STUDY: Presidential Campaigns Are Not Hitting Their Mark With Their Email Outreach Presidential Campaign Email Study.png

    If it feels like today’s election season has neither an end, nor a beginning, you may not be far off the mark. The 2020 presidential campaign kicked off barely minutes after the 2018 midterm elections. Between the start of 2019 through this fall, the field of presidential candidates plus the incumbent swelled to 26 individuals running for the top job in the country. As we head into Q4, the field has narrowed a bit on the Democratic side. However, the one thing that has remained constant since the beginning is that these candidates use email to engage potential voters, raise campaign contributions and educate subscribers about their platforms and messages.

    Between July and August of 2019 we decided to take a close look at how political campaigns leverage email as part of their digital strategy. Our methodology was simple but effective given the diverse group of candidates. We set up …

    Read More
  • By Len Shneyder
    Everything You Need to Know About SHAKEN/STIR Right Now Developer 101 SHAKEN/STIR

    If you’re like the rest of us, your phone rings periodically throughout the day receiving calls from numbers that look suspiciously close to your own phone number, or sometimes it is your phone number calling you. Don’t worry, you’re not seeing things, this is robocalling fraudsters trying their darndest to get you to pick up your phone. You’ve most likely blocked many of these numbers, installed apps like Hiya, Youmail, Nomorobo or Robokiller and considered throwing your phone against the wall. We get it, we’ve all been there. However change is on the horizon and it’s coming in the form of SHAKEN/STIR.

    The Phone Network of Yesterday

    How did we get here?

    Robocalls didn’t just suddenly appear one day. Robocalls are the byproduct of the evolution of telephony that has been weaponized by scammers to defraud vulnerable populations. When our parents grew up, telephony was highly regulated and people answered the phone because …

    Read More
  • By Len Shneyder
    Your Phone, Your Call - Part II - Whatever Happened to Caller ID callerID Header

    A version of this originally appeared on Marketing Land

    Way back when the Internet was young, and early internet surfers were using 3600 baud modems to launch themselves via copper into the Netscape driven cyberverse, trust and identity were not really as important as they are today. Flash forward to today: Identity and reputation both play a critical role for re-establishing trust across digital communications. Who calls or emails us and their credibility (whether the caller or sender is someone who’s credible enough and worth the time of the recipient to respond) are key elements that help us decide whether to take a call, open an email or respond to an SMS. Precautions, such as two factor authentication, is based on the fact that we can’t trust just one form of identity. I hate to sound like an alarmist, but the Internet can be a scary place. This is why …

    Read More
  • By Len Shneyder
    Protecting Ever More Inboxes With a 99.99% Inbox Protection Rate in Q2 2019 q2-2019-inbox-protection.png

    This article was first posted on the Twilio SendGrid Blog.

    Twilio SendGrid’s 80,000+ paying customers generate more than 50 billion emails per month. When we reviewed the volume of email we process on behalf of our global customer base, it became apparent that we touch—on a rolling 90-day basis—half the world’s email users.

    A footprint that massive only happens when compliance and the overall security of the world’s inboxes is addressed in a scalable and performant manner. In Q2 of 2019, Twilio SendGrid achieved a 99.99% Inbox Protection Rate.

    Today, we’re excited to announce an improvement of two 100th’s of a percent, thus achieving four 9’s of protection for the world’s email ecosystem.

    This improvement is significant.

    When you consider the devastating effects that phishing attacks can have on an individual’s financial records and identity, those effects are vastly amplified when spear phishing is employed to compromise a businesses’ …

    Read More
  • Newer
    Sign up and start building
    Not ready yet? Talk to an expert.