This is the blog of Adam Kalsey. Unusual depth and complexity. Rich, full body with a hint of nutty earthiness.

Security & Privacy

Spam filter service

There is likely a market for a good spam filter service that is easy to use and effective. Most of the ones that we’ve seen require complicated setups, rely on locally installed software, or have limited features.

The ideal service would allow a user to check email through POP3 or IMAP, function as a filtering proxy, and allow users to configure their accounts over the Web.

Email protocols.

Offering both POP and IMAP services is a must. While the majority of email users use POP to check their mail (most don’t even realize they have an option), many users that read mail from multiple locations have turned to IMAP for mail management. Most services only offer POP, making them useless to power users.

Providing an IMAP proxy is more difficult than creating a POP proxy, and since most users don’t use IMAP, it is understandable that existing services don’t offer IMAP. However, IMAP users tend to be power email users and are more likely to purchase advanced email services.

Proxy Server.

The service should provide a proxy server that filters mail as it is checked. Many of the services available work by downloading email from your mail server to theirs. When a user checks mail, their email program checks the filtering service’s server.

We think this approach is inadequate. This approach requires that a user’s mail be stored on the servers of the filtering service, rather than their office or ISP servers. Many offices and ISPs have Web-based or other alternative remote mail access capabilities that would be lost if the mail is no longer on those servers. AOL members, for instance, would no longer be able to access their mail through the AOL interface. Another obvious disadvantage is that corporations may not want potentially sensitive email stored on servers outside their control.

A filtering proxy functions by acting as a middleman between the user and their mail server. The user changes their mail software’s settings to request mail from the proxy server, which passes each mail command through to the primary mail server. As the messages are retrieved, the proxy filters them based on criteria defined by the user. The proxy doesn’t store the messages; it only acts as a filter between the user and their mail server.

Email Filtering.

The user can tell the service how they would like the proxy server to filter the mail and what to do with it once it is filtered. The proxy server will use a rules-based engine similar to that used by SpamAssassin. The user can easily configure the filtering engine by choosing which rules to apply. Depending upon the user’s preference, messages that are recognized as spam are deleted without showing them to the user, forwarded to another address, or rewritten so the subject line contains a tag identifying the message as spam.

A company that provides this service would find a large number of users willing to pay a monthly fee in order to have mailboxes with greatly reduced spam counts.

Recently Written

Your OKR Cascade is Breaking Your Strategy
Aug 1: Most companies cascade OKRs down their org chart thinking it creates alignment. Instead, it fragments strategy and marginalizes supporting teams. Here's what works better than the waterfall approach.
Your Prioritization Problem Is a Strategy Problem
Jul 23: Most teams struggle with prioritization because they're trying to optimize for everything at once. The real problem isn't having too many options—it's not having a clear strategy to choose between them. Without strategy, every decision feels equally important. With strategy, most decisions become obvious.
Behind schedule
Jul 21: Your team is 6 weeks late and still missing features. The solution isn't working harder—it's accepting that your deadlines were fake all along. Ship what you have. Cut ruthlessly. Stop letting "one more day" turn into one more month.
VC’s Future Lies In Building Winners
Jun 21: AI and megafunds are about to kill the traditional venture model, forcing smaller VCs to stop hunting for hidden gems and start rolling up their sleeves to fix broken companies instead.
Should individual people have OKRs?
May 14: A good OKR describes and measures an outcome, but it can be challenging to create an outcome-focused OKR for an individual.
10 OKR traps and how to avoid them
May 8: I’ve helped lots of teams implement OKRs or fix a broken OKR process. Here are the 10 most common problems I see, and what to do instead.
AI is Smart, But Wisdom Requires Judgement
May 3: AI can process data at lightning speed, but wisdom comes from human judgment—picking the best imperfect option when facts alone don’t point the way.
Decoding Product Leadership Titles
Mar 18: Not all product leadership titles mean what they sound like. ‘Head of Product’ can mean anything from a senior PM to a true VP. Here’s how to tell the difference.

Older...

What I'm Reading