Have a few different buttons on your email template: separate social media buttons that produce pre-written social posts linking to a webpage version of your email, and an "Email to a Friend" button that transfers the email into a compose window so your contacts can instantly forward the message. Just make sure your email has an opt-in button so each new viewer can subscribe to more emails from you if they like what they see.
One hundred years ago, companies such as Sears, Roebuck & Co. and J.C. Penny Co. used customer data to send out catalogs and mailers. Back then, the companies possessed small sets of data, mainly names and addresses of customers. Now, marketers have mountains of complex data and are faced with a modern conundrum: How much personal data is too much to incorporate into the content?
As email marketing has blossomed and matured over the years, the terms email blast and e-blast have declined in popularity due to their negative connotations, being replaced with more palatable terms like newsletter or email campaign. And along with the new names have come innovations that allow marketers to create email blasts that are more personalized, better segmented, and thankfully less aggressive. We’ll talk about those innovations a little later.

Project conversion metrics. The general rule of thumb is that the smaller and more targeted your list, the more you can spend per piece. It’s better to make a strong impression to a few than to make a weak impression to many. Know your cost per unit, and project a conversion rate, so you can estimate whether your campaign will have a positive ROI before running it. https://www.lyfemarketing.com/blog/wp-content/uploads/2018/01/email-marketing-roi-2.jpg

Just because something is true, it doesn’t mean it should be sent to the customer. Good personalization is relevant and valuable, but it shouldn’t be too specific, O’Keefe says, citing Netflix and Amazon as good examples for direct marketers. These companies know what their customers want, but they don’t go over the top in telling them things about themselves they may not yet know. 
A mailing list archive is a collection of past messages from one or more electronic mailing lists. Such archives often include searching and indexing functionality. Many archives are directly associated with the mailing list, but some organizations, such as Gmane, collect archives from multiple mailing lists hosted at different organizations; thus, one message sent to one popular mailing list may end up in many different archives. Gmane had over 9,000 mailing list archives as of 16 January 2007. Some popular free software programs for collecting mailing list archives are Hypermail, MHonArc, and FUDforum.
Well, charity: water took an alternate route. Once someone donates to a charity: water project, her money takes a long journey. Most charities don't tell you about that journey at all -- charity: water uses automated emails to show donors how their money is making an impact over time. With the project timeline and accompanying table, you don't even really need to read the email -- you know immediately where you are in the whole process so you can move onto other things in your inbox.

It includes email marketing, search engine marketing (SEM), social media marketing, many types of display advertising (including web banner advertising), and mobile advertising. Like other advertising media, online advertising frequently involves both a publisher, who integrates advertisements into its online content, and an advertiser, who provides the advertisements to be displayed on the publisher's content. Other potential participants include advertising agencies who help generate and place the ad copy, an ad server which technologically delivers the ad and tracks statistics, and advertising affiliates who do independent promotional work for the advertiser.


Using Dr Dave Chaffey's approach, the digital marketing planning (DMP) has three main stages: Opportunity, Strategy and Action. He suggests that any business looking to implement a successful digital marketing strategy must structure their plan by looking at opportunity, strategy and action. This generic strategic approach often has phases of situation review, goal setting, strategy formulation, resource allocation and monitoring.[60]

A lead magnet (a.k.a. an optin bribe) is something amazing that you give away for free in exchange for an email address. This doesn’t have to cost you anything to create– most lead magnets are digital materials like PDFs, MP3 audio files, or videos that you can create yourself at minimal or no cost. It can be absolutely anything you want, so long as it provides value for free.
Here are some of the most interesting email marketing stats around. The Radicati Group says we’ll send and receive around 281 billion emails this year. According to Adestra, 78% of teens use email. Statista reports that 85% of US adults use email. Consumers like getting emails from the brands they love. But email senders have to respect the inbox. Email too often, or include the wrong content, and Litmus says some people will report your email as spam instead of unsubscribing.
!function(n,t){function r(e,n){return Object.prototype.hasOwnProperty.call(e,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw o.report(e),e}}return n},o.report=function(){function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(a.call(arguments,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,p=a.call(arguments,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return r.open("GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",name:e.name,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!==o.report){if(r={url:null,func:l,args:[],line:null,column:null},p.name?r.func=p.name:(t=a.exec(p.toString()))&&(r.func=t[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",name:e.name,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var e=a.call(arguments),n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
Further, today's consumer is connected 24/7 and attention spans are divided across multiple mediums -- web, email, mobile apps, texts, TV, radio, etc. Direct mail pieces received directly to homes or businesses break through marketing silos and require a dedicated pause to consider compared to the many thousands of on-screen messages we receive any given hour. Consider how unaffected you are as a consumer when you receive spam emails -- it's a quick click to delete without a second thought. But we're receiving less physical mail than before, and are therefore less likely to dismiss mail as quickly as we used to.
Pam Neely has been marketing online for 15 years. She's a serial entrepreneur and an avid email and content marketing enthusiast with a background in publishing and journalism, including a New York Press Award. Her book "50 Ways to Build Your Email Marketing List" is available on Amazon.com. Pam holds a Master's Degree in Direct and Interactive Marketing from New York University. Follow her on Twitter @pamellaneely.
Choose an email blasting software or website. To send your email blast, you'll need to do research on popular email blast websites and choose one that works for your team. Consider the amount of training that would be required, if it automatically links to your current database or CRM, how much it costs, and how easy it is to use. Write down pros and cons of each provider and determine the blasting software that's right for you.
Many laws specifically regulate the ways online ads are delivered. For example, online advertising delivered via email is more regulated than the same ad content delivered via banner ads. Among other restrictions, the U.S. CAN-SPAM Act of 2003 requires that any commercial email provide an opt-out mechanism.[108] Similarly, mobile advertising is governed by the Telephone Consumer Protection Act of 1991 (TCPA), which (among other restrictions) requires user opt-in before sending advertising via text messaging.
A pop-up ad is displayed in a new web browser window that opens above a website visitor's initial browser window.[31] A pop-under ad opens a new browser window under a website visitor's initial browser window.[24]:22 Pop-under ads and similar technologies are now advised against by online authorities such as Google, who state that they "do not condone this practice".[32]

Push marketing is a proactive technique that enables e-marketers to "push" their product/service information to Web visitors or shoppers without their requesting it. Banner advertising, pop-up advertising, e-mail promotion, and spamming belong to push marketing. For instance, e-marketers can rent designated space from Internet service providers such as America Online or MSN for their banner or pop-up ads. Using animated graphics, appealing messages, and links, e-marketers try to lure visitors to their sites to buy their products or services. Many Internet users, however, find such ads annoying and employ software that blocks pop-ups and banner ads.
Video: Video mailers have a built-in audiovisual player. The video plays after opening the mailer or by pushing a button. With a built-in video screen, people are inclined to instantly watch it. You don’t have to worry about applications or other software; you know that once opened, people will watch it. Since this form of direct mail is relatively new, they can be costly and not affordable for all campaigns. But the costs are starting to come down, so keep an eye on them until you can afford to try them.

For Campaign Monitor customers, you can either manually upload an existing list (from an Excel file for instance) or you can connect your Campaign Monitor account to the tool where your customer data lives (such as your CRM, accounting, eCommerce tool, and hundreds of others) and automatically sync your customer information into your Campaign Monitor account.
Are you really willing to risk not only your email deliverability, but also the reputation of your IP address and your company? Even if you find the light after purchasing or renting email lists and decide to only email those who have opted in with your company, it'll take you months (or maybe years) to get your Sender Score up and rebuild the reputation of your IP.
E-marketing can offer more competitive prices than traditional marketing because e-marketing reduces costs by not having to maintain physical store space and by strategically placing distribution centers throughout the country. Second, because the Internet is available 24/7, e-marketing enables shoppers to search for product/service information and buy goods at their convenience, not just when the store is open. Third, research indicates that the cost of Internet-based promotion is one-fourth of traditional promotion, because it does not incur the costs of paper, printing, handling, and mailing. Fourth, e-marketing enables buyers to custom-build products such as shoes, clothes, computers, and automobiles on the Web, options often not available in stores. 

Use it to make sales on autopilot. Creating a sales funnel out of an email autoresponder sequence is a widely adopted strategy used by information marketers, but it can also be used by software companies, eCommerce businesses and service providers. For example, it could consist of a series of educational videos, a sales video and follow-ups to sell your information products. Or, you could create a sequence of free educational emails, and then invite them to a live or recorded webinar where you make an offer. For eCommerce businesses, your sales sequence could include promo offers for products your subscriber has just viewed on your website.

Because users have different operating systems, web browsers[84] and computer hardware (including mobile devices and different screen sizes), online ads may appear to users differently from how the advertiser intended, or the ads may not display properly at all. A 2012 comScore study revealed that, on average, 31% of ads were not "in-view" when rendered, meaning they never had an opportunity to be seen.[85] Rich media ads create even greater compatibility problems, as some developers may use competing (and exclusive) software to render the ads (see e.g. Comparison of HTML 5 and Flash).


Cost per mille, often abbreviated to CPM, means that advertisers pay for every thousand displays of their message to potential customers (mille is the Latin word for thousand). In the online context, ad displays are usually called "impressions." Definitions of an "impression" vary among publishers,[58] and some impressions may not be charged because they don't represent a new exposure to an actual customer. Advertisers can use technologies such as web bugs to verify if an impression is actually delivered.[59][60]:59
By placing links back to Foundr’s website, it means that we’re able to piggyback on high-profile influencers and expose our brand to an already interested audience. Similar to how the content upgrades work, placing these backlinks throughout these guest articles encourages readers to click on them and get even more value with our much more in-depth article.
Another collection method happens when list vendors buy emails lists from industry trade shows (or other events) where people give their info during the registration process. This is not the same thing as folks who signed up with you, directly, at your trade show booth! This is where list vendors purchase the entire registration list, from the trade show, itself.
A web-based interface is often available to allow people to subscribe, unsubscribe, and change their preferences. However, mailing list servers existed long before the World Wide Web,[1] so most also accept commands over email to a special email address. This allows subscribers (or those who want to be subscribers) to perform such tasks as subscribing and unsubscribing, temporarily halting the sending of messages to them, or changing available preferences - all via email. The common format for sending these commands is to send an email that contains simply the command followed by the name of the electronic mailing list the command pertains to. Examples: subscribe anylist or subscribe anylist John Doe.
Establishment of customer exclusivity: A list of customers and customer's details should be kept on a database for follow up and selected customers can be sent selected offers and promotions of deals related to the customer's previous buyer behaviour. This is effective in digital marketing as it allows organisations to build up loyalty over email.[22]
×