AWS Messaging & Targeting Blog
Category: Storage
Securing communications at the edge with AWS Wickr
Organizations that are looking to establish secure communication networks at the edge often encounter challenges. The use of disparate collaboration tools on personal and government-issued devices can make it difficult to protect sensitive data and avoid communication gaps. This blog post highlights four common communication issues that customers encounter when operating in disconnected (or intermittently […]
Serverless IoT email capture, attachment processing, and distribution
Many customers need to automate email notifications to a broad and diverse set of email recipients, sometimes from a sensor network with a variety of monitoring capabilities. Many sensor monitoring software products include an SMTP client to achieve this goal. However, managing email server infrastructure requires specialty expertise and operating an email server comes with […]
Analyzing Amazon SES event data with AWS Analytics Services
In this post, we will walk through using AWS Services, such as, Amazon Kinesis Firehose, Amazon Athena and Amazon QuickSight to monitor Amazon SES email sending events with the granularity and level of detail required to get insights from your customers engage with the emails you send. Nowadays, email Marketers rely on internal applications to […]
Tracking email engagement with AWS Analytics services
Update: July 26, 2023 – This blog has now a script to automate its deployment. You can find it in this Github repository. Email at scale is one of the most valuable forms of reaching and engaging with customers, but creating the most engaging email content means frequent tracking, monitoring, and analyzing bounces, complaints, opens, […]
Forwarding emails automatically based on content with Amazon Simple Email Service
Introduction Email is one of the most popular channels consumers use to interact with support organizations. In its most basic form, consumers will send their email to a catch-all email address where it is further dispatched to the correct support group. Often, this requires a person to inspect content manually. Some IT organizations even have […]