Most of the article really talks about how to successfully get an email of a person who has already landed on your landing page/podcast page/affiliate/blog etc. but how to get those people there in the first place is a bigger challenge. Also, one of the ways you can include in your list is by offering free tools/widgets. For example, OpenSiteExplorer by Moz is a great example. Evergreen and very useful for the target audience.
A lead magnet (a.k.a. an optin bribe) is something amazing that you give away for free in exchange for an email address. This doesn’t have to cost you anything to create– most lead magnets are digital materials like PDFs, MP3 audio files, or videos that you can create yourself at minimal or no cost. It can be absolutely anything you want, so long as it provides value for free.
When writing this guide, we reached out to the marketer community to collect case studies and learnings about creative marketing strategies. Most of these examples are included throughout the guide, but some didn’t quite fit. So we included those loose ends here, from the perspective of four awesome marketers. What better way to wrap up this guide than with you, our community?
QR codes and PURLs: To make landing page content unique to each person, create personalized QR codes or personalized URLs (PURLs). This landing page content can be changed and updated as needed, creating an easy way to keep people coming back for new content. Make sure that your content is using responsive design since people can use a mobile device or PC. You can use the same landing page for both the QR and the PURL, providing the recipient with the choice of which method they prefer.
Even better was the fact that we had built the Foundr brand up to the point where we had people actually ask to become an affiliate of ours. Our very brand became an important leveraging point for us because we had developed it to the point where people would want to become associated with our brand. Obviously this didn’t happen overnight and it took many years of work to get us to that point, but it was a great side-benefit to all the success we had achieved so far.
Email marketing - Email marketing in comparison to other forms of digital marketing is considered cheap; it is also a way to rapidly communicate a message such as their value proposition to existing or potential customers. Yet this channel of communication may be perceived by recipients to be bothersome and irritating especially to new or potential customers, therefore the success of email marketing is reliant on the language and visual appeal applied. In terms of visual appeal, there are indications that using graphics/visuals that are relevant to the message which is attempting to be sent, yet less visual graphics to be applied with initial emails are more effective in-turn creating a relatively personal feel to the email. In terms of language, the style is the main factor in determining how captivating the email is. Using casual tone invokes a warmer and gentle and inviting feel to the email in comparison to a formal style. For combinations; it's suggested that to maximize effectiveness; using no graphics/visual alongside casual language. In contrast using no visual appeal and a formal language style is seen as the least effective method.[48]
Even though this falls into just one of the myriad of elements in the 20 portion of the 40/40/20 rule, it is arguably the most important. Nothing will get your piece of direct mail marketing throw into the trash bin more quickly than a glaring typo, a noticeable formatting issue, or an overall poor print quality. If you’re writing the copy, be sure to not only proof it yourself but also have some of your more linguistically-inclined friends and colleagues give it a once over, not only for grammatical and punctuation mistakes but for overall ease of reading and flow. Don’t be afraid to seek as many trusted opinions as possible, and be sure to have thick skin to prepare for any constructive criticisms. http://emaildripcampaigns.com/wp-content/uploads/sites/2/2016/12/emaildripcampaigns-header.png

The concept is simple. If someone is reading an in-depth blog post of yours, chances are they’re very interested in what you have to say on the topic. The key is to then offer them something that is directly related to the topic they’re reading about. You know they’re already interested, so by offering instantaneous extra value it’s not difficult to see why people would gladly sign up.
Be sure to look at the tech support offered by each of these companies, as we felt many weren't as available as we would have liked. You'll find that some offer 24/7 phone support, live chat, and email help, while others leave you to rely on online documentation and limited live support hours. The best services offer a combination of self-serve help resources—where you can search FAQs and articles to find your own answers—as well as live support via chat or phone when you can't solve an issue yourself. We cover all of these concerns in our reviews, plus you can get an overview in the feature chart above.

Targeting, viewability, brand safety and invalid traffic: Targeting, viewability, brand safety and invalid traffic all are aspects used by marketers to help advocate digital advertising. Cookies are a form of digital advertising, which are tracking tools within desktop devices; causing difficulty, with shortcomings including deletion by web browsers, the inability to sort between multiple users of a device, inaccurate estimates for unique visitors, overstating reach, understanding frequency, problems with ad servers, which cannot distinguish between when cookies have been deleted and when consumers have not previously been exposed to an ad. Due to the inaccuracies influenced by cookies, demographics in the target market are low and vary (Whiteside, 2016).[42] Another element, which is affected within digital marketing, is ‘viewabilty’ or whether the ad was actually seen by the consumer. Many ads are not seen by a consumer and may never reach the right demographic segment. Brand safety is another issue of whether or not the ad was produced in the context of being unethical or having offensive content. Recognizing fraud when an ad is exposed is another challenge marketers face. This relates to invalid traffic as premium sites are more effective at detecting fraudulent traffic, although non-premium sites are more so the problem (Whiteside, 2016).[42]


Affiliate marketing occurs when advertisers organize third parties to generate potential customers for them. Third-party affiliates receive payment based on sales generated through their promotion.[24]:22 Affiliate marketers generate traffic to offers from affiliate networks, and when the desired action is taken by the visitor, the affiliate earns a commission. These desired actions can be an email submission, a phone call, filling out an online form, or an online order being completed.
Choose analytics software that works for your organization. While many email marketing applications have built-in analytics, you may consider getting a third party system to help you process the data or statistics on your campaigns. Some software can give you a more comprehensive or visual representation of your analytics, while others may track something that your current content management system does not. The size and scope of your e-blast campaign will dictate which kind of software you require.

The books I've written have actually had three different titles, updated to move with the times. My first text book was titled: Internet Marketing: Strategy, Implementation and Practice. I then created E-business E-commerce Management and, with PR Smith, E-marketing Excellence, for professionals a couple of years later. Then, much later, the names switched and in 2012 we renamed the Internet Marketing book to Digital Marketing with the others becoming Digital Business and Digital Marketing Excellence.  About time too, since I was involved in developing the syllabus as an examiner for the first IDM Diploma in Digital Marketing back in 2004-5 when the term was hardly used at all - so it's been great to see 'Digital Marketing' adopted as the 'de facto' term, when I was first involved in defining it with the IDM students in 2004!
Digital marketing activity is still growing across the world according to the headline global marketing index. A study published in September 2018, found that global outlays on digital marketing tactics are approaching $100 billion.[40] Digital media continues to rapidly grow; while the marketing budgets are expanding, traditional media is declining (World Economics, 2015).[41] Digital media helps brands reach consumers to engage with their product or service in a personalised way. Five areas, which are outlined as current industry practices that are often ineffective are prioritizing clicks, balancing search and display, understanding mobiles, targeting, viewability, brand safety and invalid traffic, and cross-platform measurement (Whiteside, 2016).[42] Why these practices are ineffective and some ways around making these aspects effective are discussed surrounding the following points.
The fact is, a significant percentage of millennials like mail. It has a built-in emotional response factor. Gallup reported that 36% of people under the age of 30 look forward to checking their mailboxes every day. What’s more, 95% of 18-to-29-year-olds have a positive response to receiving personal cards and letters. Notably this generation will wield a combined $1.4 trillion in spending power by 2020, as reported by Accenture.

Most email marketers around the world are legally required to allow recipients to opt out of emails they no longer want to receive. Contacts must be able to do this directly in the email message. The General Data Protection Regulation (GDPR), a European data privacy act that went into effect in May 2018, doubles down on the opt-in side of this relationship. And purchased email lists are simply not compliant.

Another key aspect of any email blast is the target audience. Make sure you’re hitting inboxes where the probability response, purchase or interaction is high. If you’re shooting emails like a loose cannon on a rolling deck, you could put off prospects and customers (if you make it to their inboxes!), tarnish your image and end up wasting a lot of time, money and effort.


The first part of the definition illustrates the range of access platforms and communications tools that form the online channels which e-marketers use to build and develop relationships with customers. The access platforms or hardware include PCs, mobile phones and interactive digital TV (IPTV) and these deliver content and enable interaction through different online communication tools such as organisation web sites, portals, search engines, blogs , e-mail, instant messaging and text messaging. Some also include traditional voice telephone as part of digital marketing.
Are you really willing to risk not only your email deliverability, but also the reputation of your IP address and your company? Even if you find the light after purchasing or renting email lists and decide to only email those who have opted in with your company, it'll take you months (or maybe years) to get your Sender Score up and rebuild the reputation of your IP.
If someone didn't ask to hear from you yet, it doesn't mean they won't want to hear from you later. It's your job to prove to them -- through helpful content and valuable offers -- that they should stay up to date with your company via email. If you force your email content on anyone too early, even if you know in your bones they're a great fit for your products or services, you risk preemptively losing their trust and their future business.
You want to have a single purpose for your direct mail piece. Often times the goal of a direct mail campaign is to get the recipient to buy a product or use a service. Other goals can be to send people to your website, get people to enter a contest, or let people know about an upcoming event. Knowing your goal will help you formulate what you want the direct mail piece to say. You also need to consider what the recipient stands to gain from the letter.
Emails triggered by milestones, like anniversaries and birthdays, are fun to get -- who doesn't like to celebrate a special occasion? The beauty of anniversary emails, in particular, is that they don't require subscribers to input any extra data, and they can work for a variety of senders. Plus, the timeframe can be modified based on the business model.
While getting the word out to many people at once can seem appealing, it also lacks the personalization that today’s online consumers crave. And with today’s email marketing services that make it simple to segment and personalize your messages, there’s no reason not to dip your toe into the email customization waters, right? Plus, as laws change around the world to make unsolicited electronic messages illegal, one wrong email could land your business squarely in the red.
Electronic mailing list servers may be set to forward messages to subscribers of a particular mailing list either individually as they are received by the list server, or in digest form in which all messages received on a particular day by the list server are combined into one email that is sent once per day to subscribers. Some mailing lists allow individual subscribers to decide how they prefer to receive messages from the list server (individual or digest).[2]
Does the difference in these terms and their definitions matter? No, of course not, it's semantics! But it is interesting to see how the scope of Internet marketing vs Digital marketing has changed over time. In my books, when discussing alternative definitions, I explain that, no it doesn't really matter, but the scope and responsibility is important to make the most of managing the opportunities. So the scope of digital marketing activities should be agreed within a business and/or between a company and its agencies. The biggest difference is whether digital marketing is simply seen as about communications (online marketing) or whether it is broader, looking at underpinning marketing technology and options for new online business and revenue models.

If you’re serious about growing your business, building a healthy email list should be one of your top priorities. When it comes down to it, your list is one of the only online assets that you have 100% control over. Having a solid social media presence is absolutely essential (here’s why), but you’ll always be at the mercy of new and changing algorithms (think Facebook’s Edgerank). And achieving high search engine rankings is great too, but again, you’re at the mercy of changing algorithms and updates.
Online advertisers can collect data on their ads' effectiveness, such as the size of the potential audience or actual audience response,[19]:119 how a visitor reached their advertisement, whether the advertisement resulted in a sale, and whether an ad actually loaded within a visitor's view.[59][60]:59 This helps online advertisers improve their ad campaigns over time.
In 2002 the European Union (EU) introduced the Directive on Privacy and Electronic Communications. Article 13 of the Directive prohibits the use of personal email addresses for marketing purposes. The Directive establishes the opt-in regime, where unsolicited emails may be sent only with prior agreement of the recipient; this does not apply to business email addresses.
Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:
“The Foundr Podcast has come to a close but it’s not time to sleep, it’s time to hustle. Download the Richard Branson issue of Foundr Magazine for FREE right now by visiting. Again that’s an absolutely free download of the Richard Branson issue of Foundr Magazine containing an exclusive interview with the man himself. It’s only available at foundr.com/branson so download it now and we’ll see you next time at the Foundr Podcast!”
!function(n,t){function r(e,n){return Object.prototype.hasOwnProperty.call(e,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw o.report(e),e}}return n},o.report=function(){function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(a.call(arguments,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,p=a.call(arguments,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return r.open("GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",name:e.name,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!==o.report){if(r={url:null,func:l,args:[],line:null,column:null},p.name?r.func=p.name:(t=a.exec(p.toString()))&&(r.func=t[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",name:e.name,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var e=a.call(arguments),n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
Even though this falls into just one of the myriad of elements in the 20 portion of the 40/40/20 rule, it is arguably the most important. Nothing will get your piece of direct mail marketing throw into the trash bin more quickly than a glaring typo, a noticeable formatting issue, or an overall poor print quality. If you’re writing the copy, be sure to not only proof it yourself but also have some of your more linguistically-inclined friends and colleagues give it a once over, not only for grammatical and punctuation mistakes but for overall ease of reading and flow. Don’t be afraid to seek as many trusted opinions as possible, and be sure to have thick skin to prepare for any constructive criticisms.
There are numerous ways that advertisers can be overcharged for their advertising. For example, click fraud occurs when a publisher or third parties click (manually or through automated means) on a CPC ad with no legitimate buying intent.[80] For example, click fraud can occur when a competitor clicks on ads to deplete its rival's advertising budget, or when publishers attempt to manufacture revenue.[80]
The concept is simple. If someone is reading an in-depth blog post of yours, chances are they’re very interested in what you have to say on the topic. The key is to then offer them something that is directly related to the topic they’re reading about. You know they’re already interested, so by offering instantaneous extra value it’s not difficult to see why people would gladly sign up.
Email blasts are a great way to send bulk correspondence with businesses or consumers. Eblasts can contain special promotional information to customers or critical updates to other businesses. Sending ineffective or irrelevant emails to people will cause them to ignore future emails and can tarnish your company's reputation. Luckily, there are ways that you can optimize writing your e-blasts so that they captivate the largest audience possible. By using best practices to write and send your email and by evaluating the progress and effectiveness of them, you'll be able to reach a much wider customer base.
Just because something is true, it doesn’t mean it should be sent to the customer. Good personalization is relevant and valuable, but it shouldn’t be too specific, O’Keefe says, citing Netflix and Amazon as good examples for direct marketers. These companies know what their customers want, but they don’t go over the top in telling them things about themselves they may not yet know. 
Choose analytics software that works for your organization. While many email marketing applications have built-in analytics, you may consider getting a third party system to help you process the data or statistics on your campaigns. Some software can give you a more comprehensive or visual representation of your analytics, while others may track something that your current content management system does not. The size and scope of your e-blast campaign will dictate which kind of software you require.
×