This email list growth was a major component of a massive product launch we undertook this past winter. In the lead-up to the launch of our Instagram Domination 2.0 course, we doubled down on our goal to rapidly grow our email list. In this article I’m going to reveal to you the exact tactics we used and how we employed them in order to explode our mailing list.
“The Foundr Podcast has come to a close but it’s not time to sleep, it’s time to hustle. Download the Richard Branson issue of Foundr Magazine for FREE right now by visiting. Again that’s an absolutely free download of the Richard Branson issue of Foundr Magazine containing an exclusive interview with the man himself. It’s only available at foundr.com/branson so download it now and we’ll see you next time at the Foundr Podcast!”

Next up is building an email newsletter. The best services offer several ways to do this; you can import your own HTML, start from scratch, or use a pre-designed template. Most of these services have drag-and-drop UIs that let you choose exactly the elements you want to include, as well as image libraries in which you can store assets such as your logo or company photos. Tools that let you test your emails for spam are also essential since there are some seemingly innocuous terms that may send up red flags and drop all of your hard work into your subscribers' junk folders or, worse, get your emails banned before they ever reach their recipients.


While getting the word out to many people at once can seem appealing, it also lacks the personalization that today’s online consumers crave. And with today’s email marketing services that make it simple to segment and personalize your messages, there’s no reason not to dip your toe into the email customization waters, right? Plus, as laws change around the world to make unsolicited electronic messages illegal, one wrong email could land your business squarely in the red. 

Meta keywords are different from usual keywords since they are only in the source code of your web page, instead of the living, visible web page. Anyway, meta keywords can be filled out later on if you need to, but focus on the things that matter first. Integrate keywords for the meta description tag. Do this just for the page description that comes up in search engines.
I am a scientist. My e-mail has been drawn from publicly-available sites related to science. My name and e-mail is being sold as part of a 7 Million+ e-mail list to biomedical companies and anyone who wants to buy targeted lists. I NEVER gave permission to use my name and e-mail and in fact requested that my name be removed. The company continues to make profits by selling my name + 6.999 million others. I don’t care what country you are from, this is UNETHICAL and ILLEGAL (in my eyes). Of course, who as the money to try and persecute such crooks? Worse yet, if I live in South Africa and the company is selling from India, how can US laws affect or cover me? These guys work across transnational borders because they know that they can operate across international borders online, without any regulation (unless they operate from the US, perhaps). So no fear, no penalties, no recrimination, no fines, just sickening profits from unjust and unfair and illegal marketing methods. Because frauds all abuse innocents.

“We’re always giving people the option to join our email list when they come into the spa, but we just recently added the option for people to sign up when they visit our website,” explains Christine Copertino, spa director for Allegria Spa. “The response has been great. We’re seeing a ton of people signing up, and we know that these are really engaged people who will be excited to receive our emails.”
E-marketing is a process of planning and executing the conception, distribution, promotion, and pricing of products and services in a computerized, networked environment, such as the Internet and the World Wide Web, to facilitate exchanges and satisfy customer demands. It has two distinct advantages over traditional marketing. E-marketing provides customers with more convenience and more competitive prices, and it enables businesses to reduce operational costs. http://www.jarcreativeuk.co.uk/assets/images/Ten_steps_to_email-success.jpg
This one really ruffles our feathers because it implies that you are shoving a bunch of spammy emails down your unsuspecting audiences throats. Blast away! In reality, we want email to be strategic, targeted, personalized, and properly segmented. Additionally, we want the content to be simple, direct, to the point, and useful. With this in mind, the word "blast" seems a bit too intense.

Just because something is true, it doesn’t mean it should be sent to the customer. Good personalization is relevant and valuable, but it shouldn’t be too specific, O’Keefe says, citing Netflix and Amazon as good examples for direct marketers. These companies know what their customers want, but they don’t go over the top in telling them things about themselves they may not yet know. 


Email blasts are a great way to send bulk correspondence with businesses or consumers. Eblasts can contain special promotional information to customers or critical updates to other businesses. Sending ineffective or irrelevant emails to people will cause them to ignore future emails and can tarnish your company's reputation. Luckily, there are ways that you can optimize writing your e-blasts so that they captivate the largest audience possible. By using best practices to write and send your email and by evaluating the progress and effectiveness of them, you'll be able to reach a much wider customer base.
Using Dr Dave Chaffey's approach, the digital marketing planning (DMP) has three main stages: Opportunity, Strategy and Action. He suggests that any business looking to implement a successful digital marketing strategy must structure their plan by looking at opportunity, strategy and action. This generic strategic approach often has phases of situation review, goal setting, strategy formulation, resource allocation and monitoring.[60]

As of mid-2016 email deliverability is still an issue for legitimate marketers. According to the report, legitimate email servers averaged a delivery rate of 73% in the U.S.; six percent were filtered as spam, and 22% were missing. This lags behind other countries: Australia delivers at 90%, Canada at 89%, Britain at 88%, France at 84%, Germany at 80% and Brazil at 79%.[7]

QR codes and PURLs: To make landing page content unique to each person, create personalized QR codes or personalized URLs (PURLs). This landing page content can be changed and updated as needed, creating an easy way to keep people coming back for new content. Make sure that your content is using responsive design since people can use a mobile device or PC. You can use the same landing page for both the QR and the PURL, providing the recipient with the choice of which method they prefer.


Different jurisdictions have taken different approaches to privacy issues with advertising. The United States has specific restrictions on online tracking of children in the Children's Online Privacy Protection Act (COPPA),[109]:16–17 and the FTC has recently expanded its interpretation of COPPA to include requiring ad networks to obtain parental consent before knowingly tracking kids.[112] Otherwise, the U.S. Federal Trade Commission frequently supports industry self-regulation, although increasingly it has been undertaking enforcement actions related to online privacy and security.[113] The FTC has also been pushing for industry consensus about possible Do Not Track legislation.
This email list growth was a major component of a massive product launch we undertook this past winter. In the lead-up to the launch of our Instagram Domination 2.0 course, we doubled down on our goal to rapidly grow our email list. In this article I’m going to reveal to you the exact tactics we used and how we employed them in order to explode our mailing list.
The first widely publicized example of online advertising was conducted via electronic mail. On 3 May 1978, a marketer from DEC (Digital Equipment Corporation), Gary Thuerk, sent an email to most of the ARPANET's American west coast users, advertising an open house for a new model of a DEC computer.[5][10] Despite the prevailing acceptable use policies, electronic mail marketing rapidly expanded[11] and eventually became known as "spam."

I know a few of you just thought, “I cannot run my business like that”. So work with this. Instead of sending endless sale item emails, send just one “give” email a month. And what if you sent a really cool story of what someone has done with your products once a month? If you send weekly emails, just adding those two emails into the mix every month now means you’re on 1 to 1 schedule. Will your sales go down if you do this? Maybe a little. Will your engagement go up over time if you execute this well? Like a rocket ship.
Promotional emails are one of the most economical ways for any business to connect with customers. Research shows a message is five times more likely to be seen through email than on social media like Facebook or Twitter. That’s why musicians use email marketing software to share their performance schedule with their fans, non-profits use it to get donations and photographers use it to promote their portrait services. It just works.
E-marketing refers to the use of the Internet and digital media capabilities to help sell your products or services. These digital technologies are a valuable addition to traditional marketing approaches regardless of the size and type of your business. E-marketing is also referred to as Internet marketing (i-marketing), online marketing or web-marketing.

This ties into the second 40 of the 40/40/20 rule – now you’re probably beginning to see why that was listed up front and why it’s universally considered the gold standard when it comes to direct mail marketing guidelines. With other forms of advertisements or marketing, it is perfectly acceptable to only go after impressions – a billboard in a highly-trafficked area or a TV spot that is more of a teaser in nature can sometimes go a long way toward educating the public of your existence, which is the first step in getting them to engage. With direct mailings however, you might as well be printing cash to send out to people if you don’t have a compelling call to action to give people.
!function(n,t){function r(e,n){return Object.prototype.hasOwnProperty.call(e,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw o.report(e),e}}return n},o.report=function(){function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(a.call(arguments,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,p=a.call(arguments,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return r.open("GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",name:e.name,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!==o.report){if(r={url:null,func:l,args:[],line:null,column:null},p.name?r.func=p.name:(t=a.exec(p.toString()))&&(r.func=t[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",name:e.name,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var e=a.call(arguments),n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});

There are many vendors out there who sell lists or rent them (though renting means that the list seller maintains ownership and control of the email list). These are collections of email addresses that the vendors sell to any business or individual who can pay the fees. Your email list is considered to be a purchased or shared list if it’s provided to you by a third party, like an email list vendor or affiliate. There's a few ways that vendors build these non opt-in email lists.
Shifting the focus to the time span, we may need to measure some "Interim Metrics", which give us some insight during the journey itself, as well as we need to measure some "Final Metrics" at the end of the journey to inform use if the overall initiative was successful or not. As an example, most of social media metrics and indicators such as likes, shares and engagement comments may be classified as interim metrics while the final increase/decrease in sales volume is clearly from the final category.
Just one subscriber and something to say, that’s it! Don’t wait to have a “large list”. Email Marketing has no limits in size, BIG or small. When it comes to using a tool like Benchmark, the last thing you want is to have to learn something new. That’s why Benchmark Email was created with familiar tools in mind. Here is how and what you will need to get started
The criteria and metrics can be classified according to its type and time span. Regarding the type, we can either evaluate these campaigns "Quantitatively" or "Qualitatively". Quantitative metrics may include "Sales Volume" and "Revenue Increase/Decrease". While qualitative metrics may include the enhanced "Brand awareness, image and health" as well as the "relationship with the customers".

Purchased lists are ineffective, and they impact everyone else who uses Mailchimp, too. If you send emails to a list of people whose contact info you bought, many of the emails will get identified as spam. Some spam filters will flag a campaign if anyone with the same IP has sent spam in the past. When you use Mailchimp, your email is delivered through our servers, so if one person sends spam, it could prevent other users’ emails from reaching inboxes. But by forbidding Mailchimp users from using purchased lists, we increase deliverability for everyone.

It's important to know the exact result you want before you begin. Then make that result happen by ending your message with a specific call to action (or CTA). A call to action might be "call us now," "use this discount code in our shop," or "schedule a demo." Make sure the CTA is direct and appealing, and that you show the reader why it's worth their time to click, visit, or call.
Ever since the dawn of time, entrepreneurs have been giving away stuff for free. From the “lite” versions of apps, to samples in the grocery story, or straight up assaulting you with perfume every time you walk past the makeup department. Entrepreneurs of all sorts will fall over themselves trying to give you their stuff for free, all in the hopes that you’ll want to come back for more.
One of Raquel’s suggestions is to make sure the email contains a clear call to action. The recipient should be able to tell right away what you’re asking them to do, and when they click through, they should be taken to the exact page they need, not just your homepage. If you ask them to click on a video thumbnail to watch a video, you need to link them directly to the video. If you’re asking them to read your latest blog post, link them right to it.

By using Internet platforms, businesses can create competitive advantage through various means. To reach the maximum potential of digital marketing, firms use social media as its main tool to create a channel of information. Through this a business can create a system in which they are able to pinpoint behavioral patterns of clients and feedback on their needs.[30] This means of content has shown to have a larger impingement on those who have a long-standing relationship with the firm and with consumers who are relatively active social media users. Relative to this, creating a social media page will further increase relation quality between new consumers and existing consumers as well as consistent brand reinforcement therefore improving brand awareness resulting in a possible rise for consumers up the Brand Awareness Pyramid.[31] Although there may be inconstancy with product images;[32] maintaining a successful social media presence requires a business to be consistent in interactions through creating a two way feed of information; firms consider their content based on the feedback received through this channel, this is a result of the environment being dynamic due to the global nature of the internet.[29] Effective use of digital marketing can result in relatively lowered costs in relation to traditional means of marketing; Lowered external service costs, advertising costs, promotion costs, processing costs, interface design costs and control costs.[32]
With the GDPR now governing all email correspondence across Europe, adding an opt-out option to your email template no longer cuts it. Under this act, you must have explicit consent from your contacts to send them emails. Explicit, in this case, means the checkbox a person must click to opt in to an email subscription isn't pre-checked when they see it on your website. And when you buy your email lists, the people on it haven't been given this option -- making you non-compliant with GDPR before you send your first email.

Craig Simpson, a direct marketing consultant, says that he works on hundreds of direct mail campaigns each year and finds the most successful campaigns are those coordinated with other media. For example, if a brand sends a piece of direct mail to a consumer, who then receives an e-mail and retargeted ads as parts of the same campaign, Simpson believes that those campaigns will have the best results. 
The first part of the definition illustrates the range of access platforms and communications tools that form the online channels which e-marketers use to build and develop relationships with customers. The access platforms or hardware include PCs, mobile phones and interactive digital TV (IPTV) and these deliver content and enable interaction through different online communication tools such as organisation web sites, portals, search engines, blogs , e-mail, instant messaging and text messaging. Some also include traditional voice telephone as part of digital marketing.
I am a scientist. My e-mail has been drawn from publicly-available sites related to science. My name and e-mail is being sold as part of a 7 Million+ e-mail list to biomedical companies and anyone who wants to buy targeted lists. I NEVER gave permission to use my name and e-mail and in fact requested that my name be removed. The company continues to make profits by selling my name + 6.999 million others. I don’t care what country you are from, this is UNETHICAL and ILLEGAL (in my eyes). Of course, who as the money to try and persecute such crooks? Worse yet, if I live in South Africa and the company is selling from India, how can US laws affect or cover me? These guys work across transnational borders because they know that they can operate across international borders online, without any regulation (unless they operate from the US, perhaps). So no fear, no penalties, no recrimination, no fines, just sickening profits from unjust and unfair and illegal marketing methods. Because frauds all abuse innocents.
Marketers don’t always automatically receive notifications when they’ve been blacklisted, so it’s up to the marketer to monitor their brand’s email sending reputation. There are a number of free online resources that marketers should utilize to check their blacklist status before sending an email blast, such as Barracuda Reputation Block List or MultiRBL.

Push marketing is a proactive technique that enables e-marketers to "push" their product/service information to Web visitors or shoppers without their requesting it. Banner advertising, pop-up advertising, e-mail promotion, and spamming belong to push marketing. For instance, e-marketers can rent designated space from Internet service providers such as America Online or MSN for their banner or pop-up ads. Using animated graphics, appealing messages, and links, e-marketers try to lure visitors to their sites to buy their products or services. Many Internet users, however, find such ads annoying and employ software that blocks pop-ups and banner ads. <

×