Email marketing has evolved rapidly alongside the technological growth of the 21st century. Prior to this growth, when emails were novelties to the majority of customers, email marketing was not as effective. In 1978, Gary Thuerk of Digital Equipment Corporation (DEC) sent out the first mass email[1] to approximately 400 potential clients via the Advanced Research Projects Agency Network (ARPANET). This email resulted in $13 million worth of sales in DEC products, and highlighted the potential of marketing through mass emails. However, as email marketing developed as an effective means of direct communication, users began blocking out content from emails with filters and blocking programs. In order to effectively communicate a message through email, marketers had to develop a way of pushing content through to the end user, without being cut out by automatic filters and spam removing software.

Email marketing is now a very popular offshoot of direct mail marketing (See also Email Marketing). However, it’s worth bearing in mind that 37 states now have laws regarding “spam,” or unwanted junk email. Therefore, companies that wish to maintain a positive reputation use an “opt-in” policy for marketing email, targeting only interested customers.


Most popular email marketing services offer functionality that strikes a recipient from a list once a certain number of emails to a specific recipient ‘bounced’ back as undeliverable. Don’t be overeager to remove a subscriber, though; there are valid reasons why an email cannot be delivered. Consider only removing such a subscriber after four or five “bounces”.


E-mail promotion is widely used by e-marketers to send new product/service information to their registered customers. For example, airline companies periodically e-mail their registered customers about their e-fares and promotional vacation packages. Spamming refers to sending millions of e-mail promotions to recipients who have never asked for the information. These recipients' e-mail addresses are often purchased or swapped with other businesses. Spamming is at best unethical and at worst illegal.
Emails triggered by milestones, like anniversaries and birthdays, are fun to get -- who doesn't like to celebrate a special occasion? The beauty of anniversary emails, in particular, is that they don't require subscribers to input any extra data, and they can work for a variety of senders. Plus, the timeframe can be modified based on the business model.
Neil O’Keefe, senior vice president of marketing and content at the Data & Marketing Association, says that marketers began questioning direct mail’s endurance in 2007. That year, Statista reports that smartphone sales jumped 70% from the previous year to $8.7 billion. At the same time, the volume of mail sent through the U.S. Postal Service began to plummet: In 2006, people in the U.S. sent 213.1 billion pieces of mail, according to USPS; by 2017, they were sending 149.5 billion pieces each year, a 29.9% decline. By this point, smartphone sales had reached $55.6 billion. The price of postage and paper had skyrocketed, as did the number of internet users—everything seemed to hammer a nail into direct mail’s coffin.

One hundred years ago, companies such as Sears, Roebuck & Co. and J.C. Penny Co. used customer data to send out catalogs and mailers. Back then, the companies possessed small sets of data, mainly names and addresses of customers. Now, marketers have mountains of complex data and are faced with a modern conundrum: How much personal data is too much to incorporate into the content?
Two other practical limitations can be seen in the case of digital marketing. One,digital marketing is useful for specific categories of products,meaning only consumer goods can be propagated through digital channels.Industrial goods and pharmaceutical products can not be marketed through digital channels. Secondly, digital marketing disseminates only the information to the prospects most of whom do not have the purchasing authority/power. And hence the reflection of digital marketing into real sales volume is skeptical.[citation needed]
A trick banner is a banner ad where the ad copy imitates some screen element users commonly encounter, such as an operating system message or popular application message, to induce ad clicks.[34] Trick banners typically do not mention the advertiser in the initial ad, and thus they are a form of bait-and-switch.[35][36] Trick banners commonly attract a higher-than-average click-through rate, but tricked users may resent the advertiser for deceiving them.[37]
It's important to know the exact result you want before you begin. Then make that result happen by ending your message with a specific call to action (or CTA). A call to action might be "call us now," "use this discount code in our shop," or "schedule a demo." Make sure the CTA is direct and appealing, and that you show the reader why it's worth their time to click, visit, or call.
If your campaign includes emails to a large number of accounts that are either no longer active or have not been used for a long time, alarm bells start to ring. Email services want to see senders of bulk email campaigns make an effort to send only emails that will be seen by their recipients, since this is something spammers are unlikely to care about.
Use it to make sales on autopilot. Creating a sales funnel out of an email autoresponder sequence is a widely adopted strategy used by information marketers, but it can also be used by software companies, eCommerce businesses and service providers. For example, it could consist of a series of educational videos, a sales video and follow-ups to sell your information products. Or, you could create a sequence of free educational emails, and then invite them to a live or recorded webinar where you make an offer. For eCommerce businesses, your sales sequence could include promo offers for products your subscriber has just viewed on your website.
Push marketing is a proactive technique that enables e-marketers to "push" their product/service information to Web visitors or shoppers without their requesting it. Banner advertising, pop-up advertising, e-mail promotion, and spamming belong to push marketing. For instance, e-marketers can rent designated space from Internet service providers such as America Online or MSN for their banner or pop-up ads. Using animated graphics, appealing messages, and links, e-marketers try to lure visitors to their sites to buy their products or services. Many Internet users, however, find such ads annoying and employ software that blocks pop-ups and banner ads.

Use it as a lead magnet/free mini course. You can also use an autoresponder as a lead magnet to attract new subscribers to your email list. This is commonly done in the form of a free “mini course”, or a free “challenge”, which promises to deliver a series of emails containing lessons (or other valuable information) over the course of several days or weeks. There is a high perceived value with a mini course or a challenge like this, which makes it a very effective lead magnet.
This is why it’s so important to make the time to establish strong connections with other influencers in your niche, and to view them as collaborators and not competitors. It was because of the relationships that we’ve built with these other influencers that allowed us to have our lead magnets and content shared directly to their own community. Which in turn led to us growing our mailing list by 56,000 new subscribers in just 30 days.
!function(n,t){function r(e,n){return Object.prototype.hasOwnProperty.call(e,n)}function i(e){return void 0===e}if(n){var o={},s=n.TraceKit,a=[].slice,l="?";o.noConflict=function(){return n.TraceKit=s,o},o.wrap=function(e){function n(){try{return e.apply(this,arguments)}catch(e){throw o.report(e),e}}return n},o.report=function(){function e(e){l(),h.push(e)}function t(e){for(var n=h.length-1;n>=0;--n)h[n]===e&&h.splice(n,1)}function i(e,n){var t=null;if(!n||o.collectWindowErrors){for(var i in h)if(r(h,i))try{h[i].apply(null,[e].concat(a.call(arguments,2)))}catch(e){t=e}if(t)throw t}}function s(e,n,t,r,s){var a=null;if(w)o.computeStackTrace.augmentStackTraceWithInitialElement(w,n,t,e),u();else if(s)a=o.computeStackTrace(s),i(a,!0);else{var l={url:n,line:t,column:r};l.func=o.computeStackTrace.guessFunctionName(l.url,l.line),l.context=o.computeStackTrace.gatherContext(l.url,l.line),a={mode:"onerror",message:e,stack:[l]},i(a,!0)}return!!f&&f.apply(this,arguments)}function l(){!0!==d&&(f=n.onerror,n.onerror=s,d=!0)}function u(){var e=w,n=p;p=null,w=null,m=null,i.apply(null,[e,!1].concat(n))}function c(e){if(w){if(m===e)return;u()}var t=o.computeStackTrace(e);throw w=t,m=e,p=a.call(arguments,1),n.setTimeout(function(){m===e&&u()},t.incomplete?2e3:0),e}var f,d,h=[],p=null,m=null,w=null;return c.subscribe=e,c.unsubscribe=t,c}(),o.computeStackTrace=function(){function e(e){if(!o.remoteFetching)return"";try{var t=function(){try{return new n.XMLHttpRequest}catch(e){return new n.ActiveXObject("Microsoft.XMLHTTP")}},r=t();return r.open("GET",e,!1),r.send(""),r.responseText}catch(e){return""}}function t(t){if("string"!=typeof t)return[];if(!r(j,t)){var i="",o="";try{o=n.document.domain}catch(e){}var s=/(.*)\:\/\/([^:\/]+)([:\d]*)\/{0,1}([\s\S]*)/.exec(t);s&&s[2]===o&&(i=e(t)),j[t]=i?i.split("\n"):[]}return j[t]}function s(e,n){var r,o=/function ([^(]*)\(([^)]*)\)/,s=/['"]?([0-9A-Za-z$_]+)['"]?\s*[:=]\s*(function|eval|new Function)/,a="",u=10,c=t(e);if(!c.length)return l;for(var f=0;f0?s:null}function u(e){return e.replace(/[\-\[\]{}()*+?.,\\\^$|#]/g,"\\$&")}function c(e){return u(e).replace("<","(?:<|<)").replace(">","(?:>|>)").replace("&","(?:&|&)").replace('"','(?:"|")').replace(/\s+/g,"\\s+")}function f(e,n){for(var r,i,o=0,s=n.length;or&&(i=s.exec(o[r]))?i.index:null}function h(e){if(!i(n&&n.document)){for(var t,r,o,s,a=[n.location.href],l=n.document.getElementsByTagName("script"),d=""+e,h=/^function(?:\s+([\w$]+))?\s*\(([\w\s,]*)\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,p=/^function on([\w$]+)\s*\(event\)\s*\{\s*(\S[\s\S]*\S)\s*\}\s*$/,m=0;m]+)>|([^\)]+))\((.*)\))? in (.*):\s*$/i,o=n.split("\n"),l=[],u=0;u=0&&(g.line=v+x.substring(0,j).split("\n").length)}}}else if(o=d.exec(i[y])){var _=n.location.href.replace(/#.*$/,""),T=new RegExp(c(i[y+1])),E=f(T,[_]);g={url:_,func:"",args:[],line:E?E.line:o[1],column:null}}if(g){g.func||(g.func=s(g.url,g.line));var k=a(g.url,g.line),A=k?k[Math.floor(k.length/2)]:null;k&&A.replace(/^\s*/,"")===i[y+1].replace(/^\s*/,"")?g.context=k:g.context=[i[y+1]],h.push(g)}}return h.length?{mode:"multiline",name:e.name,message:i[0],stack:h}:null}function y(e,n,t,r){var i={url:n,line:t};if(i.url&&i.line){e.incomplete=!1,i.func||(i.func=s(i.url,i.line)),i.context||(i.context=a(i.url,i.line));var o=/ '([^']+)' /.exec(r);if(o&&(i.column=d(o[1],i.url,i.line)),e.stack.length>0&&e.stack[0].url===i.url){if(e.stack[0].line===i.line)return!1;if(!e.stack[0].line&&e.stack[0].func===i.func)return e.stack[0].line=i.line,e.stack[0].context=i.context,!1}return e.stack.unshift(i),e.partial=!0,!0}return e.incomplete=!0,!1}function g(e,n){for(var t,r,i,a=/function\s+([_$a-zA-Z\xA0-\uFFFF][_$a-zA-Z0-9\xA0-\uFFFF]*)?\s*\(/i,u=[],c={},f=!1,p=g.caller;p&&!f;p=p.caller)if(p!==v&&p!==o.report){if(r={url:null,func:l,args:[],line:null,column:null},p.name?r.func=p.name:(t=a.exec(p.toString()))&&(r.func=t[1]),"undefined"==typeof r.func)try{r.func=t.input.substring(0,t.input.indexOf("{"))}catch(e){}if(i=h(p)){r.url=i.url,r.line=i.line,r.func===l&&(r.func=s(r.url,r.line));var m=/ '([^']+)' /.exec(e.message||e.description);m&&(r.column=d(m[1],i.url,i.line))}c[""+p]?f=!0:c[""+p]=!0,u.push(r)}n&&u.splice(0,n);var w={mode:"callers",name:e.name,message:e.message,stack:u};return y(w,e.sourceURL||e.fileName,e.line||e.lineNumber,e.message||e.description),w}function v(e,n){var t=null;n=null==n?0:+n;try{if(t=m(e))return t}catch(e){if(x)throw e}try{if(t=p(e))return t}catch(e){if(x)throw e}try{if(t=w(e))return t}catch(e){if(x)throw e}try{if(t=g(e,n+1))return t}catch(e){if(x)throw e}return{mode:"failed"}}function b(e){e=1+(null==e?0:+e);try{throw new Error}catch(n){return v(n,e+1)}}var x=!1,j={};return v.augmentStackTraceWithInitialElement=y,v.guessFunctionName=s,v.gatherContext=a,v.ofCaller=b,v.getSource=t,v}(),o.extendToAsynchronousCallbacks=function(){var e=function(e){var t=n[e];n[e]=function(){var e=a.call(arguments),n=e[0];return"function"==typeof n&&(e[0]=o.wrap(n)),t.apply?t.apply(this,e):t(e[0],e[1])}};e("setTimeout"),e("setInterval")},o.remoteFetching||(o.remoteFetching=!0),o.collectWindowErrors||(o.collectWindowErrors=!0),(!o.linesOfContext||o.linesOfContext<1)&&(o.linesOfContext=11),void 0!==e&&e.exports&&n.module!==e?e.exports=o:"function"==typeof define&&define.amd?define("TraceKit",[],o):n.TraceKit=o}}("undefined"!=typeof window?window:global)},"./webpack-loaders/expose-loader/index.js?require!./shared/require-global.js":function(e,n,t){(function(n){e.exports=n.require=t("./shared/require-global.js")}).call(n,t("../../../lib/node_modules/webpack/buildin/global.js"))}});
One hundred years ago, companies such as Sears, Roebuck & Co. and J.C. Penny Co. used customer data to send out catalogs and mailers. Back then, the companies possessed small sets of data, mainly names and addresses of customers. Now, marketers have mountains of complex data and are faced with a modern conundrum: How much personal data is too much to incorporate into the content?

I think what Brian and the testers are missing is that 15k is neither big enough to be impressive nor small enough to be inviting. It’s not a number that works effectively as social proof, and while I can’t test it out myself, I believe, based on evidence for social proof around the web, that DIYthemes would have had much better success with a combined number in the 50k+ range as mentioned above.
A/B testing is trying two different techniques that communicate the same message on a small percentage of your list, seeing whether A or B performed the best, then using the better performing option when you email the rest of the list. It sounds complicated, but there are plenty of email marketing solutions out there that take all the math and guesswork out of it. (All you have to do is come up with the option A and option B you want to try.)
Besides the fact that email blasts can be spammy and impersonal, they’re also not the most effective way to make money. Although a large-scale email blast is sure to convert, it’s not because sending it was a strategic move — it’s because you cast a wide net. If you crafted a targeted newsletter instead, you’d see a better conversion rate and you’d be able to replicate the strategy many times over. Marissa Petteruti calls email blasts a wasted opportunity to generate more revenue, citing:
This is a process described by Seth Godin known as permission marketing. The core concept of this idea is that you never market to someone that doesn’t want it, you first have to ask them for their permission. When someone signs up to your email not only do they become a warm lead but they give you their permission to send them offers and to market to them.

"Constant Contact makes it easy to create as many contact lists as we need. I can add an email address to multiple lists at once, or a reader can subscribe to several email lists. This allows us to send targeted emails. Sending people only the emails they want makes readers happier, increases open rates, and makes my email marketing efforts—and my time—more effective."


Buying email lists aren’t allowed by reputable email marketing services Email marketing services, including Constant Contact, do not allow you to use purchased lists. That’s because we are an email service provider that maintains a strong anti-spam policy to ensure that our customers are only sending emails to people who have expressed interest in receiving them. And that means refraining from buying an email list.
Short for e lectronic mail , the transmission of messages over communications networks . The messages can be notes entered from the keyboard or electronic files stored on disk . Most mainframes , minicomputers , and computer networks have an e-mail system . Some electronic-mail systems are confined to a single computer system or network, but others have gateways to other computer systems, enabling users to send electronic mail anywhere in the world. Companies that are fully computerized make extensive use of e-mail because it is fast, flexible, and reliable.. Most e-mail systems include a rudimentary text editor for composing messages, but many allow you to edit your messages using any editor you want. You then send the message to the recipient by specifying the recipient's address. You can also send the same message to several users at once. This is called broadcasting .. Sent messages are stored in electronic mailboxes until the recipient fetches them. To see if you have any mail, you may have to check your electronic mailbox periodically, although many systems alert you when mail is received. After reading your mail, you can store it in a text file , forward it to other users, or delete it. Copies of memos can be printed out on a printer if you want a paper copy .. All online services and Internet Service Providers (ISPs) offer e-mail, and most also support gateways so that you can exchange mail with users of other systems. Usually, it takes only a few seconds or minutes for mail to arrive at its destination. This is a particularly effective way to communicate with a group because you can broadcast a message or document to everyone in the group at once.. Although different e-mail systems use different formats , there are some emerging standards that are making it possible for users on all systems to exchange messages. In the PC world, an important e-mail standard is MAPI . The CCITT standards organization has developed the X.400 standard, which attempts to provide a universal way of addressing messages. To date, though, the de facto addressing standard is the one used by the Internet system because almost all e-mail systems have an Internet gateway.. Another common spelling for e-mail is email .. Also see Why E-Mails Bounce and Getting Rid of Spam in the Did You Know section of Webopedia..

Well, charity: water took an alternate route. Once someone donates to a charity: water project, her money takes a long journey. Most charities don't tell you about that journey at all -- charity: water uses automated emails to show donors how their money is making an impact over time. With the project timeline and accompanying table, you don't even really need to read the email -- you know immediately where you are in the whole process so you can move onto other things in your inbox.
Email marketing is a simple and proven strategy to promote your business. It attracts new customers and helps maintain close relationships with loyal customers. There's a long list of email marketing services available today and most operate at relatively low prices, with packages to fit every business size and need. It's just a matter of determining which features and tools you need and how much you're willing to spend.
Focus on the reader first. You should always write your emails to address the needs of your subscribers, not yours. Offer ways to solve their problems, don’t simply talk about your products and how great they are. (This is a part that so many companies get wrong.) Ask yourself, what are the biggest pain points/struggles for my subscribers? How can I solve their current problem in this email?
Craig Simpson, a direct marketing consultant, says that he works on hundreds of direct mail campaigns each year and finds the most successful campaigns are those coordinated with other media. For example, if a brand sends a piece of direct mail to a consumer, who then receives an e-mail and retargeted ads as parts of the same campaign, Simpson believes that those campaigns will have the best results. 
It is important for a firm to reach out to consumers and create a two-way communication model, as digital marketing allows consumers to give back feed back to the firm on a community based site or straight directly to the firm via email.[24] Firms should seek this long term communication relationship by using multiple forms of channels and using promotional strategies related to their target consumer as well as word-of mouth marketing.[24]
With brands using the Internet space to reach their target customers; digital marketing has become a beneficial career option as well. At present, companies are more into hiring individuals familiar in implementing digital marketing strategies and this has led the stream to become a preferred choice amongst individuals inspiring institutes to come up and offer professional courses in Digital Marketing.
Using the company logo and clearly identifying the sender is another good way to make an effective business email newsletter. People like to know who they are getting mail from, and once they are familiar with the newsletter, they might be more likely to read it in the future. Your logo can be at the top of the newsletter and included in your professional email signature.
×