Tencent QQ Is One of the Two Larger Isps Located in China. They Offer A

Total Page:16

File Type:pdf, Size:1020Kb

Tencent QQ Is One of the Two Larger Isps Located in China. They Offer A Tencent QQ is one of the two larger ISPs located in China. They offer a protal site that senders can register for that will provide insight into the senders performance. All of this is free however so no additional costs for this. WHITELIST INFORMATION The following information is required for whitelisting: Company Name (matching your business license) Sending domain – ideally use the default address configured for your account. Sending IP (ranges can be added e.g. 1.2.3.4 – 1.2.3.6) Contact – Name of the contact Contact Number – mobile or land line of contact. ICP number – this number is often displayed at the bottom of the .cn version of your website. Business License – image or pdf version of a business document. REGISTRATION To register for this you will need to register a QQ address and then navigate to the site http://openmail.qq.com Select the square launch button highlighted below in red: Disclaimer: This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upo in making purchasing decisions. The development, release, timing, and pricing of any features or functionality described in this document may change and remains at the sole discretion of Oracle Corporation. 1 BRIEF / Tencent QQ Whitelisting & Best Practices Deliverability Intelligence This will ask you to log in using your QQ email address and password: Select the option on the Right of the top and add your details to log in, this will take you through to a form as per below: Copyright © 2020, Oracle and/or its affiliates. All rights reserved. 2 BRIEF / Tencent QQ Whitelisting & Best Practices Deliverability Intelligence Once completed this should take you through to your portal, you will need to verify ownership of the domain with the OMC. To do this Deliverability Ops needs to work with an internal team to capture the verification mail. Please provide login details to the DelivOps contact you are working with and they will work towards getting this approved. PLEASE NOTE: the WL is not dependant on the Portal so if you are configured as required by QQ you should already benefit from this WL. It may take some time to complete the approval request but during this time we recommend reviewing and implementing the best practices and warm up steps below. BEST PRACTICES FOR TENCENT QQ Tencent QQ does not provide a Reputation ‘score’ and so monitoring the usual metrics – bounce rates, open rates, accepted volumes etc to get a feel for reputation. When issues are encountered it is important to review the bounce reasons provided to understand what may be causing these. In the event that volume cap issues are seen adjusting the send volumes to not exceed these for a period of time (e.g. a few days) before expanding the volume again. WARMING UP We recommend implementing a 5-7 day warm up period targeting the more active segments of your lists e.g. those who have opened or clicked in the 3, or if volumes are very low 6 months. QQ adjust their reputation for senders in real time and do appear to operate volume caps which may adjust with this. This means that you may see your sends reach a set level after which all other mails bounce. Using the daily delivered levels as a guide we recommend you restrict your volumes to these levels for a short time frame e.g. a day or two before attempting to increase the volumes above this. Keep a close eye on the bounce messages you see returned, If you see bounces message with “550 mail content denied” we recommend reviewing your message content/template for those messages returning these bounces and making changes to resolve this. Testing will be required as the available information from the ISP does not provide details on what may cause this. Testing to a personal QQ inbox may help to avoid these issues. We have also found that some senders need to include a prefix of (AD) at the start of the subject line. E.g. (AD) -----subject-----!!! This indicates that the message is a promotion mailing and may help with deliverability overall. If you consistently see bounce messages for your sends we would strongly recommend adding this item to the start of your subject lines. Overall Reputation for the ISP will still be influenced by the traditional Deliverability metrics: • Volume changes. • Hard Bounce Rates. • Spam Complaint Rate. Ensuring you are not overly aggressive with your increases in volume and take steps to limit the likelihood of seeing spikes in hard bounces or complaints will help to maintain good performance to Tencent QQ Domains. Copyright © 2020, Oracle and/or its affiliates. All rights reserved. 3 BRIEF / Tencent QQ Whitelisting & Best Practices Deliverability Intelligence .
Recommended publications
  • Chinese Internet Companies and Their Quest for Globalization
    International Conference on Information, Business and Education Technology (ICIBIT 2013) Chinese Internet Companies and Their Quest for Globalization Harlan D. Whatley1 1Swiss Management Center, Zurich, Switzerland Abstract players in the technology market (Sun, 2009). Chinese internet companies have seen an This qualitative research paper unprecedented growth over the past explores the quest for globalization of decade. However, very few are two successful Chinese internet recognized brands outside of China while companies: Baidu and Tencent Holdings. some seek to develop their brands in In this case study, the focus is on the foreign markets. This paper analyzes the marketing strategies of these expanding marketing strategies of two internet multinational enterprises and the companies: Baidu and Tencent and their challenges they face to become quest for globalization. recognized as global brands. All of the firms in this study were founded as Keywords: Baidu, Tencent, internet, private enterprises with no ownership ties branding, marketing, globalization, China to the Chinese government. Furthermore, an analysis of the countries and markets 1. Introduction targeted by the firms is included in the study. In addition to a review of the Innovation efforts by technology current academic literature, interviews companies in China are driven by adding were conducted with marketing and significant value to imported foreign strategy professionals from the technologies or by developing new perspective firms as well as journalists products to satisfy specific domestic that closely follow Chinese internet firms demands (Li, Chen & Shapiro, 2010). and the technology sector. This study on Firms in the emerging market of China do the globalization of Chinese internet not possess the R&D resources that their firms will contribute to marketing developed Western counterparts have.
    [Show full text]
  • Tencent and China Mobile's Dilemma
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) Pacific Asia Conference on Information Systems PACIS 2014 Proceedings (PACIS) 2014 FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Qingqing Wan School of Economics and Management, Beijing University of Posts and Telecommunications, [email protected] Follow this and additional works at: http://aisel.aisnet.org/pacis2014 Recommended Citation Wu, Jun and Wan, Qingqing, "FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA" (2014). PACIS 2014 Proceedings. 265. http://aisel.aisnet.org/pacis2014/265 This material is brought to you by the Pacific Asia Conference on Information Systems (PACIS) at AIS Electronic Library (AISeL). It has been accepted for inclusion in PACIS 2014 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. FROM WECHAT TO WE FIGHT: TENCENT AND CHINA MOBILE’S DILEMMA Jun Wu, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Qingqing Wan, School of Economics and Management, Beijing University of Posts and Telecommunications, Beijing, China, [email protected] Abstract With the coming of mobile internet era, Giants in the different industry begin to compete face by face. This teaching case presents the event of charging for WeChat in China context to delineate the new challenges that Online Service Provider and Mobile Network Operator will face.
    [Show full text]
  • Data Source Diversity in Identifying and Understanding Events
    BABEL BEACON WORLDWIDE: DATA SOURCE DIVERSITY IN IDENTIFYING AND UNDERSTANDING EVENTS Introduction: As the online data landscape continues to exponentially expand, analysts are increasingly challenged to find where key pieces of information are hiding. Because actionable data can be found anywhere online, it is essential to cast the widest possible net over the vast pool of data sources – globally. It is our observation that many analysts, when analyzing publicly available information (PAI), tend to focus on just a few large social media (SM) platforms like Facebook, Instagram, and/or Twitter. Indeed, these data sources are useful for situational awareness in certain areas around the world. But they, in context, comprise only a small portion of the immense available data within the data universe. So, the appropriate question is: “What other data sources are there, relative to my question, that should be queried?” This Beacon explores the importance of leveraging the variety of global data sets by diving into historical social media posts and analyzing conversations they spawned both within and beyond the original posting site. Babel Street analysts winnowed down data from thousands of social media outlets, blogs and message boards, global news outlets, and the dark web to identify where else these posts were being referenced and by whom, in order to pinpoint relevant and potentially actionable intelligence. BLUF: o Focusing PAI research on only a few large SM platforms severely limits the information analysts can derive about ongoing
    [Show full text]
  • Social Media Contracts in the US and China
    DESTINED TO COLLIDE? SOCIAL MEDIA CONTRACTS IN THE U.S. AND CHINA* MICHAEL L. RUSTAD** WENZHUO LIU*** THOMAS H. KOENIG**** * We greatly appreciate the editorial and research aid of Suffolk University Law School research assistants: Melissa Y. Chen, Jeremy Kennelly, Christina Kim, Nicole A. Maruzzi, and Elmira Cancan Zenger. We would also like to thank the editors at the University of Pennsylvania Journal of International Law. ** Michael Rustad is the Thomas F. Lambert Jr. Professor of Law, which was the first endowed chair at Suffolk University Law School. He is the Co-Director of Suffolk’s Intellectual Property Law Concentration and was the 2011 chair of the American Association of Law Schools Torts & Compensation Systems Section. Pro- fessor Rustad has more than 1100 citations on Westlaw. His most recent books are SOFTWARE LICENSING: PRINCIPLES AND PRACTICAL STRATEGIES (Lexis/Nexis, 3rd ed. forthcoming 2016), GLOBAL INTERNET LAW IN A NUTSHELL (3rd ed., West Academic Publishers, 2015), and GLOBAL INTERNET LAW (HORNBOOK SERIES) (West Academic Publishers, 2d ed. 2015). Professor Rustad is editor of COMPUTER CONTRACTS (2015 release), a five volume treatise published by Matthew Bender. *** Wenzhuo Liu, LL.B., LL.M, J.D., obtained China’s Legal Professional Qual- ification Certificate in 2011. In 2014, she became a member of the New York state bar. She earned an LL.M degree from the University of Wisconsin Law School in Madison, Wisconsin in 2012 and a J.D. degree from Suffolk University Law School in Boston. She was associated with Hunan Haichuan Law Firm in Changsha, China. Ms. Liu wrote a practice pointer on Software Licensing and Doing Business in China in the second and third editions of MICHAEL L.
    [Show full text]
  • Protocol Filter Planning Worksheet, V7.X
    Protocol Filter Planning Worksheet Websense Web Security Solutions (v7.x) Protocol filter (name): Applies to (clients): In policy (name): At (time and days): Legend Action Bandwidth Permit Block Network Protocol (percentage) Protocol Name Action Log Bandwidth Database SQL Net P B N P % File Transfer FTP P B N P % Gopher P B N P % WAIS P B N P % YouSendIt P B N P % Instant Messaging / Chat AOL Instant Messenger or ICQ P B N P % Baidu Hi P B N P % Brosix P B N P % Camfrog P B N P % Chikka Messenger P B N P % Eyeball Chat P B N P % 1 © 2013 Websense, Inc. Protocol filter name: Protocol Name Action Log Bandwidth Gadu-Gadu P B N P % Gizmo Project P B N P % Globe 7 P B N P % Gmail Chat (WSG Only) P B N P % Goober Messenger P B N P % Gooble Talk P B N P % IMVU P B N P % IRC P B N P % iSpQ P B N P % Mail.Ru P B N P % Meetro P B N P % MSC Messenger P B N P % MSN Messenger P B N P % MySpaceIM P B N P % NateOn P B N P % Neos P B N P % Netease Popo P B N P % netFM Messenger P B N P % Nimbuzz P B N P % Palringo P B N P % Paltalk P B N P % SIMP (Jabber) P B N P % Tencent QQ P B N P % TryFast Messenger P B N P % VZOchat P B N P % Wavago P B N P % Protocol Filter Planning Worksheet 2 of 8 Protocol filter name: Protocol Name Action Log Bandwidth Wengo P B N P % Woize P B N P % X-IM P B N P % Xfire P B N P % Yahoo! Mail Chat P B N P % Yahoo! Messenger P B N P % Instant Messaging File Attachments P B N P % AOL Instant Messenger or ICQ P B N P % attachments MSN Messenger attachments P B N P % NateOn Messenger
    [Show full text]
  • Resolving Mobile Communique App Using Classification of Data Mining Technique
    ISSN:0975-9646 M.Mohamed Suhail et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 7 (2) , 2016, 583-587 Resolving Mobile Communique App Using Classification of Data Mining Technique M.Mohamed Suhail, Lecturer,Department of Computer Science, Jamal Mohamed College, Trichy, K.SyedKousarNiasi, Assistant Professor,Department of Computer Science, Jamal Mohamed College, Trichy, Abstract- A mobile app is a software application Data Mining refers to extracting or “mining” developed specifically for use on small, wireless computing knowledge from large amount of data.Many other terms devices, such as smartphones and tablets, rather than carry a similar or slightly different meaning to Data mining, desktop or laptop computers.On the Internet and mobile such as knowledge mining from data, knowledge app, chatting is talking to other people who are using the extraction, data/pattern analysis, Data archaeology, and Internet at the same time you are. Usually, this "talking" is Data dredging.Many people treat data mining as a synonym the exchange of typed-in messages requiring one site as the for another popularly used term, Knowledge Discovery repository for the messages (or "chat site") and a group of form Data, or KDD.Data mining has attracted a great deal users who take part from anywhere on the Internet.In this of attention in the information industry and in society as a work, we apply classification techniques of data mining whole in recent years, due to the wide availability of huge using a dataset of some mobile applications (eg. whatsapp, amounts of data and the imminent need for turning such Line…etc.,) to analyze the messengers.
    [Show full text]
  • Why Are Some Websites Researched More Than Others? a Review of Research Into the Global Top Twenty Mike Thelwall
    Why are some websites researched more than others? A review of research into the global top twenty Mike Thelwall How to cite this article: Thelwall, Mike (2020). “Why are some websites researched more than others? A review of research into the global top twenty”. El profesional de la información, v. 29, n. 1, e290101. https://doi.org/10.3145/epi.2020.ene.01 Manuscript received on 28th September 2019 Accepted on 15th October 2019 Mike Thelwall * https://orcid.org/0000-0001-6065-205X University of Wolverhampton, Statistical Cybermetrics Research Group Wulfruna Street Wolverhampton WV1 1LY, UK [email protected] Abstract The web is central to the work and social lives of a substantial fraction of the world’s population, but the role of popular websites may not always be subject to academic scrutiny. This is a concern if social scientists are unable to understand an aspect of users’ daily lives because one or more major websites have been ignored. To test whether popular websites may be ignored in academia, this article assesses the volume and citation impact of research mentioning any of twenty major websites. The results are consistent with the user geographic base affecting research interest and citation impact. In addition, site affordances that are useful for research also influence academic interest. Because of the latter factor, however, it is not possible to estimate the extent of academic knowledge about a site from the number of publications that mention it. Nevertheless, the virtual absence of international research about some globally important Chinese and Russian websites is a serious limitation for those seeking to understand reasons for their web success, the markets they serve or the users that spend time on them.
    [Show full text]
  • Corporate Social Responsibility in Chinese Media Industry Subtitle: a Case Study of CCTV and Tencent Language: English Pages: 35
    Corporate Social Responsibility in Chinese Media Industry A Case Study of CCTV and Tencent COURSE: Master Thesis in Media and Communication Science with Specialization in International Communication, 15 hp PROGRAMME: International Communication AUTHOR: Xuan Wang TUTOR: Renira Gambarato SEMESTER: Spring 2018 JÖNKÖPING UNIVERSITY Master thesis, 15 credits School of Education and Communication Course: Master Thesis in Media and Communication Box 1026, SE-551 11 Jönköping, Sweden Science with Specialization in International +46 (0)36 101000 Communication Term: Spring 2018 ABSTRACT Writer(s): Xuan Wang Title: Corporate Social Responsibility in Chinese Media Industry Subtitle: A Case Study of CCTV and Tencent Language: English Pages: 35 This thesis is a case study about Corporate Social Responsibility in Chinese media industry. The implementation of CSR in state-owned media companies and private media companies are different. The role that the government play in Chinese media companies implementing CSR were barely studied before. Since this thesis is a case study, two media companies were chosen for this study. One is CCTV, a state-owned media company, another is Tencent, a private media company. Document analysis was chosen as the main method for the analysis. Stakeholder theory, corporate political connection, and meta-governance are the main theories used in this study. In this thesis, the analysis of implementing CSR is divided into two dimensions, internally and externally implementing CSR. The internal dimension is further analyzed in three aspects, employees and health at work, shareholders, and public welfare and charitable activities. The external dimension is further analyzed in four aspects, customers, business partners, local community, and government.
    [Show full text]
  • Advanced Messaging & Communications Intelligence Service
    Advanced Messaging Communications is “ entering a new visual era, with three out of five chat & Communications app users now regularly making video calls. The COVID-19 pandemic is Intelligence Service accelerating the trend Part of the Digital Consumer Services Service Area Package towards ingrained“ use of Global, in-depth coverage of all types of consumer communication video calling among platforms. Analysis of telco platforms including P2P and A2P SMS consumers. and RCS, and of the major OTT platforms including users, traffic and revenues. Pamela Clark-Dickson Principal Analyst Advanced Messaging and Communications Intelligence Service | RETE-000022 PRODUCT OVERVIEW Advanced Messaging & HOW OMDIA HELPS YOU KEY QUESTIONS ADDRESSED • Size the telco and OTT messaging markets using • What is the size of the telco messaging market, for Communications country-level forecasts P2P and A2P SMS, and RCS? • Size the consumer VoIP and video calling markets • What is the size of the messaging app market, for Intelligence Service using country-level forecasts users, traffic and revenues? Track developments in the OTT Messaging, Social Part of the Digital Consumer Services • • Who are the key communications app players, and Service Area Package Media, and Enhanced Telco Communications what is their market share for users and messaging Services markets using detailed data trackers traffic in key countries? • Analyse multi-country surveys to identify how consumers use communications • How fast is app-based consumer VoIP and video calling growing, and who are the key players? How consumers typically access • How are key social media players addressing issues customer care such as data privacy and the spread of functions from misinformation on their platforms? service providers • What are the key platforms and technologies in the business-to-consumer messaging and communications market? • What role does CPaaS play in B2C messaging and communications? Page 2 Copyright © 2020.
    [Show full text]
  • Memory Forensics for QQ from a Live System
    JOURNAL OF COMPUTERS, VOL. 5, NO. 4, APRIL 2010 541 Memory Forensics for QQ from a Live System Yuhang Gao, Tianjie Cao School of Computer, China University of Mining and Technology Sanhuannanlu, Xuzhou, Jiangsu, 221116, China Email:[email protected], [email protected] Abstract—Our paper details the techniques to collect Besides, QQ promises good security on individual sensitive information of the QQ client, which is the most privacy by encrypting. All files related to privacy are popular instant messaging (IM) in China. We have managed encrypted and not readable without a successful login. to acquire the contact list, the QQ account, the chats Even if we are able to acquire these files, it takes great records, the QQ discussion group, the display names and the efforts to parse them. However, we can collect sensitive contents of network notepad. They are of great interest to the examiners. Besides, as the techniques we use to search information from the physical memory. The QQ client for process are able to reveal terminated and hidden would decrypt all received messages. Therefore, the processes, we are very likely to find sensitive information as physical memory would contain the plaintext of these long as somebody has logged in the QQ client. What’s more, messages. we propose the method of reconstructing the process space Thus it can be seen that the forensics for the QQ client by integrating paging file into memory dump file. We have is different from other instant messaging. The examiners reconstructed the process space of the QQ client in this way need new techniques.
    [Show full text]
  • Instant Messaging Service Reference
    IceWarp Unified Communications Instant Messaging Service Reference Version 10.4 Printed on 16 April, 2012 Contents Instant Messaging 1 Reference ....................................................................................................................................................................... 2 General .............................................................................................................................................................. 2 Services .............................................................................................................................................................. 2 Trusted Hosts ..................................................................................................................................................... 8 Archive/History .................................................................................................................................................. 9 File Transfers between Clients ..................................................................................................................................... 10 Monitoring via IM ......................................................................................................................................................... 12 Monitor Services and Get Your GW Events, Tasks and Notes via IM .................................................. 12 Usage ..................................................................................................................................................
    [Show full text]
  • On the Existence of Subliminal Channel in Instant Messaging Systems
    International Journal of Security and Its Applications Vol. 9, No. 3 (2015), pp. 353-362 http://dx.doi.org/10.14257/ijsia.2015.9.3.27 On the Existence of Subliminal Channel in Instant Messaging Systems Lingyun Xiang1, Yuhua Xie2, Gang Luo3 and Weizheng Wang1 1School of Computer and Communication Engineering, Changsha University of Science and Technology, Changsha 410114, China 2Loudi Municipal Office, SAT, Loudi 417000, China 3College of Information Science and Engineering, Hunan University, Changsha 410082, China [email protected], [email protected], [email protected] Abstract Subliminal channel is a covert communication channel that can securely exchange secret information. By analyzing the communication protocols and encryption algorithms of two popular instant messaging systems QQ and Skype, this paper devotes the efforts to find whether they satisfy the condition of establishing subliminal channel or not. The broad-band subliminal channel can be established in Skype and QQ messages. Therefore, two subliminal channel schemes are proposed to embed and extract subliminal information. Finally, performances of the proposed subliminal channels are compared with those of the ones based on ElGamal digital signature and Newton channel. Experimental results and theoretical analysis show that they are easy to be implemented with large bandwidth and execute fast. Keywords: subliminal channel, covert communication, instant messaging, Skype, QQ 1. Introduction Subliminal channel is a covert communication channel constructed in public channel. It hides additional message mainly in public-key cryptosystem, authentication, and digital signature schemes. The sender and the designated receiver can transmit secret information by the subliminal channel without arousing suspicion from the public or channel warden.
    [Show full text]