The part of a Web page or email message that is visible without scrolling. Material in this area is considered more valuable because the reader sees it first. Refers to a printing term for the top half of a newspaper above the fold.
A software interface that allows your application to access another application or web service. A client may have an API connection to load database information to an email vendor automatically and receive data back from the email..
Company that provides a web based service. Clients access the service by interfacing with a web server. No software is installed on their computers. The tasks are performed remotely by the ASP servers - the service is hosted remotely.
Automated email message-response, such as a welcome message sent to all new subscribers when they join a list. May be triggered by joins, unsubscribes with all email sent to a particular mailbox. May be more than a single message - can be a series of date or event-triggered emails. A common usage for the Autoresponder is as soon as someone sends you an email they receive an instant response email which advises them that you have received their email etc.
A list developed by anyone receiving email or processing email on its way to the recipient that includes the domain or ISP address of any emailers suspected of sending spam. Many companies use blacklists to reject inbound email either at the server level or before it reaches the recipient’s in-box. Also referred to as Blocklist and Blackhole list. An example of an a up to date Blacklist is the Spamhaus Block List.
An email that is not delivered normally is said to have bounced. Emails can bounce for dozens of reasons; incorrect email address, the recipient’s mailbox is full, the mail server is down, or the system detects spam or offensive content. See hard bounce and soft bounce.
Message sent back to an email sender reporting the message could not be delivered and why. Not all bounced emails result in messages being sent back to the sender, nor are all bounce messages clear about the reason the email was bounced.
The process of dealing with the email that has bounced. Bounce handling is important for list maintenance, list integrity and delivery. Given the lack of consistency in bounce messaging formats, list handling software is programmed with several rules and needs manual help when it cannot determine the nature of the bounce
The process of DAI broadcasting through it's server utilizing technology that enables it to send a single email message to multiple recipients simultaneously. The State of the Art Hardware and Software of DAI ensure rapid transmission and optimum deliverability.
A designed and planned series of e-mail marketing messages to a list of recipients delivered according to a time schedule, with a conversion goal in mind. A campaign allows each new message to build on previous success or permission. The progressive and relationship nature of the sequence is the basis of permission marketing
Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003 A U.S. statute effective January 1, 2004 that allows spammers to be fined up to $6 million. It defines how legitimate marketers must create their email ads in order not to be considered spam. The message header must have a truthful subject line and a valid return address. The message must clearly state that it is an advertisement and have a simple way to Opt out (cancel future ads from this source). If the user Opts out, the advertiser must no longer send to that address after 10 days.
An anti-spam program that requires a human being on the sender's end to respond to an emailed challenge message before their messages can be delivered to recipients. Senders who answer the challenge correctly are added to an authorization list. Bulk emailers find ways round this by designating an employee to watch the sending address' mailbox and replying to each challenge manually.
A click-through occurs when a recipient clicks on a URL link included in an email. Click-through tracking refers to the data collected about each click-through link, such as how many people clicked it, how many clicks resulted in a conversion or subscriptions.
Management and training supplied by DAI to a client including broadcasting, email design, List Management and any other IT knowledge requirements. Full analytics and statistics from client’s website including visits are provided to the client as well as full analytics and statistics from any email Broadcast campaign.
Percentge of recipients who respond to your call-to-action in a given e-mail marketing campaign. It is the final measure of a email campaign's success. The conversion might be sales, sales leads, appointments or event specific user information
Arrangement in which companies collecting registration information from users (email sign-up forms, shopping checkout process, etc.) include a separate box for users to check if they would also like to be added to a specific third-party list.
Also Cost per Action. A form of advertising based on a transaction rather than impressions or clicks. Used widely in affiliate marketing. The CPA is the agreed rate for the campaign. Sometimes referred to as variable rate campaigns. CPA can be proportional to the value of the client's purchase.
Customer Relationship Management systems. The ability to keep track of every interaction with every prospect and customer and keeps tracks of trends and tabulates results of such notes on an aggregate scale. Essentially, an intelligent interface that allows keeping notes of every action, sale, phone call, email, fax, etc. Allows businesses to better know their customers and target messages to portions of their customers and prospects. CRM is an integrated system designed to identify, acquire, and retain customers. CRM helps organizations maximize the value of every customer interaction by managing and coordinating customer interactions across multiple channels and departments.
Percentage of clicks on email URL links divided by number of email's opened. Often has a discrepancy between clicks measured at the server and meausured by at the email. Click-throughs on email text on the PC are more fragile than clicks on browser displayed pages. Unique click-throughs refers to discarding multiple clicks from the same user - avoiding possible click fraud.
A server used by only one webmaster or email manager. A dedicated server costs more to use as the expense is not shared by several users. Dedicated servers perform better and are more robust than shared servers. Dedicated servers also eliminate the possibility of being blacklisted or banned from search engines because of the actions of one of the users
Where the attacker attempts to take down a service, email or web, by flooding the service with so much data that it may crash or be unable to serve genuine requests. Distributed Denial of Service Attacks (DDOS) where the Denial of Service attack comes from a network of computers rather than a single point of attack
An anti-spam software application being developed by Yahoo and using a combination of public and private "keys" to authenticate the sender's domain and reduce the chance that a spammer or hacker will fake the domain sending address
This is the process of adding an individual's email address to that individual's record inside an existing database. This is accomplished by matching the database against another in-house or third-party, permission-based database to produce a corresponding email address
A software tool that categorizes, sorts or blocks incoming email, based either on the sender, the email header or message content. Filters may be applied at the email client, the recipient's mail server, at the email client, the ISP or a combination.
Content distributed to subscribers by email, on a regular schedule. Content is seen as valued editorial in and of itself rather than primarily a commercial message with a sales offer. Also known as an ezine
Buying ad space in an e-mail newsletter. Advertisers pay to have their ad (text, HTML or both depending on the publication) inserted into the body of the newsletter. E-mail newsletter ads and sponsorships allow advertisers to reach a targeted audience driving traffic to a website
A company that sends and manages e-mail campaigns on behalf of clients. They broadcast e-mail lists from their own servers and domains. The advantage of contracting an ESP for your campaigns is that their mail servers have a higher delivery ratio than a standard company mail server. The ESP have a close relationship with ISPs and mail services like hotmail so emails from their domains and IP addresses have a lower bounce ratio
A legitimate message, that has legitimate content and which adheres to the technical standards, but is mistakenly rejected or filtered as spam, either by an ISP or a recipient's anti-spam application. The more stringent an anti-spam application, the higher the false-positive rate. Many mail service providers, like Hotmail, address this with the Bonded Sender program.
Whatever appears in the email recipient's inbox as the visible name of the origin. Chosen by the sender. May be a personal name, a brand name, an email address, a blank space, or hash number. The actual sender address contained in the email's header may be different, i.e. the email reply address may be different. The "from" is easy to fake
An email message sent automatically to list members who unsubscribe, acknowledging the removal from the list. Best to always include a link to resubscribe in case the unsubscribe was requested accidentally.
An html formatted e-mail instead of plain text. HTML allows a graphical appearance with fonts, graphics and background colors. HTML makes an e-mail more interesting and can improve the response rates of a campaign
The list of email addresses an company develops on its own. Email campaigns based on in-house lists are invariably more successful than those based on purchased or vendor lists. It is always the recommendation that a business should develop its own in-house list.
A unique routing address assigned to each device connected to the Internet. An IP address can be dynamic, meaning it changes each time an email message or campaign goes out, or it can be static, meaning it does not change. Static IP addresses are best, because dynamic IP addresses often trigger spam filters or bans from search engines
The actual purchase of a mailing list along with the rights to mail it directly. Permission from the email recipients may not however be transferred with the sale unless the list owner has pre-agreed so with the recipients. Permission from the recipients can be quickly lost if the list is abused or its permission terms not respected. Close to a spamming practice.
Feature of the better email marketing tools that allows each email to each subscriber to be personalised based on information for that subscriber. When each email is sent out, a call to the database retrieves information like the actual first name of that subscriber and pastes it into the email. Important feature of the software for permission marketing and CRM
Service provided by DAI securing client’s Lists through encryption and constant updating Lists by verification, Syntax checking, verification with recipient’s receiving Server, opt-in, opt-out, subscribe and unsubscribe. Providing monthly Status Reports with full analytics and statistics from client’s website including visits as well as full analytics and statistics from any email Broadcast campaign.
Opt-In is when a user actively agrees to receive messages. To opt-in or subscribe to an e-mail list is to choose to receive e-mail messages by supplying your e-mail address to a particular company, website or individual thereby giving them permission to e-mail you. The subscriber is usually requested to give personal information such as interests or requested for further interaction.
Building email messages such that the recipient feels it was written specifically for him. Personalization is about including as much personal and specific information in the design and drafting of the message.
Mail client options a user can set to for receiving messages. How they want to receive addresses, to which email address message should go and which messages they want to receive from you. The more preferences you offer a user, the more credible your mailing request.
Where an email message goes after you send it but before the list owner approves it for broadcast. Buffer where the mailing is stored prior to broadcast by server. Some list software allows you to queue a message and then set a time to send it automatically.
The DNS system is sent an IP address, and the domain name is returned. Reverse DNS is used to log incoming traffic by domain name for statistical purposes. It is also used to prevent spam by determining if the e-mail message is coming from the domain name indicated in the message header. Reverse DNS is only an option and not mandatory in a DNS server. Reverse DNS is a popular method for catching spammers who use invalid IP addresses. If a spam filter or program can't match the IP address to the domain name, it can reject the email.
Creative that includes video, animation, or sound. Rich-media emails often collect high open and click rates but require more bandwidth and are less compatible with different email clients than text or regular HTML email-format messages.
Email addresses placed on a list to evaluate the sending service; see what messages are being sent to the list, to track delivery rate, to evaluate the delivered message. Seeds may also be placed on Web sites and elsewhere on the Internet to track spammers' harvesting activities.
A segment of a list determined by any number of attributes, such as source of name, job title, purchasing history and so on. CPM list renters pay an additional fee per thousand names for each select on top of the base list price.
An email server used by more than one company or sender. Shared servers are cheaper since the cost to the broadcast vendor is spread among several users. In addition to reduce robustness, senders sharing a server risk being blacklisted if one of the other users infringes CAN-SPAM standards with the server's shared IP address. See Dedicated server.
A soft bounce is the failed delivery of an e-mail due to a nonpermanent reason, such as mailbox full or unavailable server. Mail servers are configured to retry sending emails a number of times on receiving soft-bounce responses.
Email messages sent to someone who has not opt-in or given permission to the sender. Also known as "unsolicited commercial e-mail" (UCE), "unsolicited bulk e-mail" (UBE), "gray mail" and just plain "junk mail," the term is both a noun (the e-mail message) and a verb (to send it). Spam is used to advertise products or to broadcast some political or social commentary.
A freely available and upto date blacklist created by Spamhaus.org, it is available at Spamhaus Block List. The SBL is a realtime database of IP addresses of verified spam sources (including spammers, spam gangs and spam support services), maintained by the Spamhaus Project team and supplied as a free service to help email administrators better manage incoming email streams.
The title of the e-mail communication. The first line read by email recipients. The most important part of the email campaign copy; is the biggest influence on mailing open rates. Split testing is recommended to determine the best copy
Targeted messages is the right message to the right recipient at the right time. A target audience or group selected because of their interest. Targeting is very important for an e-mail marketer because targeted and relevant e-mail campaigns, yield a higher response and result in fewer unsubscribes.
A message, or part of a message, designed to arouse curiosity and interest, but without revealing too much detail in itself. You can use appropriate teaser copy in the subject line to encourage prospects or customers to read the email.
A unique click is a single click by a single user. When unique clicks are measured, it is an aggregate number of how many times that URL was clicked by individual users. Related to the unique users metric for web servers.
The address that defines the route to a website, page or any other resource on the Internet. URLs are typed into a Web browser to access Web pages and files, and URLs are embedded within the pages themselves as hypertext links. The URL contains the protocol prefix, port number, domain name, subdirectory names and file name.
An email message that includes a video file, either inserted into the message body, accessible through a hotlink to a Web site or accompanying it in an attachment (least desirable because many ISPs block executable attachments to avoid viruses).
A type of marketing that is carried out voluntarily by a company's customers. It is often referred to as word-of-mouth advertising. E-mail has made this type of marketing very prevalent. The aim of such campaigns is to motivate recipients to forward the message on to their contacts.
A report based on a code installed on a client’s website on how many people looked at the site, what pages they looked at, how long they spent on each page and where they are located (Through their IP address) Plus lot more info.
Opposite of blacklisting. Lists of sites with which ISP have built good relationships, and allow emails from. Advance-authorized list of email addresses, held by an ISP, subscriber or other email service provider, from whom email messages are delivered regardless of spam filters.