Which is Better: Person's Name or Company for Send-From Address? Paid Members Public
Our goal as marketers is to develop a ‘relationship’ with our audience. Generally speaking, people respond to people better than they respond to ‘things’ – like your company. Based on our split testing, we’ve found that in most cases, you’ll see better results by using a specific contact person
Can I have different 'senders' for each campaign? Paid Members Public
Yes. When you set up a campaign and then again when the campaign is sent out, you are asked to provide the sender information and the ‘reply-to’ information. Pinpointe will then send the email out with the From and Reply-To headers set to your preference. Here’s an excellent use
If an Email is Forwarded, Are Click and Open Stats Tracked? Paid Members Public
There are two ways one of your campaigns can get forwarded. The first is simply that an excited recipient thinks your email is useful, they forward it directly onward. In this case, the entire original email along with the trackable links and embedded ‘beacon’ image that is used to track
The Ideal Email Subject Line Length Paid Members Public
We ran multiple experiments on subject lines and summarized one particular case study example in our recent webinar: “Use Split Testing to Improve Email Responses (you can download the slides and view the on-demand version). Here are the email subject variations: 1: %%First%% – [Webinar] Split Test Case Studies (Feb 4)
Email Authentication - DKIM and SPF: Which ISP's are Checking? Paid Members Public
At Pinpointe, we’ve been using DKIM and SPF for nearly a year for our customers – at no extra charge. If you want to know more about which ISP’s are presently using Authentication and/or Authorization to verify the validity of your email (and thereby decide whether to deliver
Will DKIM Reduce Phishing and other Email 'Spoofing' Attacks? Paid Members Public
DKIM is an email ‘authentication’ method that organizations and ESPs like Pinpointe use to verify to the recipient that the email is coming from a valid email server, and is not being ‘spoofed’ by a spammer. In an interview, Mark Risher, the anti-abuse product manager for Yahoo Mail gives his
DKIM / Authentication Advantages and Disadvantages Paid Members Public
We cover an explanation of DKIM Email Authentication in our blog entry DKIM Email Authentication. Here we’ll summarize some the top advantages and disadvantages. DKIM Authentication – Advantages If you have a very large list, your campaigns are more likely to get blocked or “throttled” by major ISPs like AOL,
Deploying DKIM Authentication in 4 Simple Steps Paid Members Public
DKIM is an emerging e-mail authentication standard supported by Yahoo, Google and others ISPs, as well as a growing number of Email Service Providers like Pinpointe and that was developed by the Internet Engineering Task Force. DKIM allows an organization to cryptographically sign outgoing e-mail to verify that it sent