How to Use Email and SMS Marketing from the same Database and get superior results.

Written by Rick Rakauskas

Do you ask forrepparttar email address of everyone you meet? And their permission to send them your stuff on a regular basis?

If you haven't ingrained this habit yet you are missing out on heaps of $$$!

And spam issues aside, email marketing is still a killer application. Teamed up with SMS, it is very hard to beat forrepparttar 109519 price.

Let's see how really switched on businesses use both to make a motzah.

The original email/SMS system was created around 5 years ago to servicerepparttar 109520 dance party market in Southern California. Then, ravers had to stay one step ahead of authorities, so party notifications were very time sensitive, often being just a couple of hours before start time.

Email and SMS was used fromrepparttar 109521 one database.

Fast forward to now, and is to my knowledge stillrepparttar 109522 only bundled email/sms provider that can construct campaigns using a common (web based) database.

Here are some applications to getrepparttar 109523 juices flowing.


Say you operate a restaurant. You have been diligently collecting names and contact details for your VIP Club.

Tonight looks like it's going to be a bit slow. It's 3:00 pm on Tuesday afternoon. You go torepparttar 109524 computer and create an SMS message "Special VIP deal, tonight only, book by 6:00 or miss out - every booking gets a free bottle of wine worth $20. Go on, give her a surprise."

You create a list of 50 VIP's and sendrepparttar 109525 message out. As long as their mobile phone is on, they will getrepparttar 109526 note within 30 seconds ofrepparttar 109527 send. It will be delivered, becauserepparttar 109528 network guarantees delivery.

By 5:00 you are booked out. Cost?

5 minutes of your time, $6.75 for 50 SMS messages, plusrepparttar 109529 wholesale cost of each bottle of wine.


Does Your Email Reputation System Have a Bad Rep?

Written by CipherTrust

The recent spike inrepparttar volume of spam traveling acrossrepparttar 109518 Internet, combined withrepparttar 109519 dangers of phishing and virus attacks that frequently accompany these messages, has forced enterprises to reconsider how they determine which messages will be allowed into their network. The latest advances in anti-spam technology have been enabled in part byrepparttar 109520 use of reputation services which determinerepparttar 109521 “good” and “bad” senders. There are several approaches to determining a sender’s reputation; some more effective than others.

In order to determine whether senders are “good” or “bad”, organizations must haverepparttar 109522 ability to accurately identifyrepparttar 109523 sender of an email. Spammers and their ilk would prefer to hide their identities – especially for those that are engaged in open fraud such as phishing attacks. They modify email headers in an attempt to fool recipients into thinkingrepparttar 109524 email is coming from a legitimate source. This practice, called “spoofing”, is a common tactic used by spammers to obfuscate their true identities.

To confront this issue, Microsoft, CipherTrust and other industry leaders have worked to create standards that allow organizations to determine whether an email is coming from a legitimate sender. To date, there continues to be debate as to which technology will prevail. Microsoft’s Caller ID (now dubbedrepparttar 109525 Sender ID Framework or SIDF) has emerged as a front-runner along with Meng Weng’s Sender Policy Framework (SPF) .

Unfortunately, merely knowing who is sending an email doesn’t necessarily stop spam. As it turns out, spammers have been early adopters ofrepparttar 109526 new standards, they are better about applying for sender authentication technologies than normal corporations, and they are eager to participate!

Regardless of how many spammers adopt “honest” emailing practices,repparttar 109527 technology to identify email senders is quickly being adopted by major ISPs and corporations. Armed with that knowledge, reputation-based filtering can have a significant impact onrepparttar 109528 level of spam in everyone’s inbox.

There are a number of methods companies use to determine whether a given email sender has a “good” reputation. Some ofrepparttar 109529 most common tactics are:

By farrepparttar 109530 most costly method in terms of human resources, In-house lists require IT staff to maintain whitelists and blacklists in order to cut down onrepparttar 109531 spam problem. The difficulty with these programs is that they require thatrepparttar 109532 IT staff become knowledgeable about a host of email security and spam issues, andrepparttar 109533 investment is rarely sufficient to overcomerepparttar 109534 thousands of variations of nuisances and threats posed by spammers, phishers, and other dubious email senders. Byrepparttar 109535 timerepparttar 109536 administrator becomes aware of a new spam attack,repparttar 109537 spam has already gotten ontorepparttar 109538 network, and into users inboxes.

These whitelists and blacklists are built and maintained by third party organizations forrepparttar 109539 benefit of subscribers. These lists are subject to many ofrepparttar 109540 same problems faced by in-house administrators. In addition, some blacklists are maintained by vigilante groups that are quick to penalize an organization for spam; sometimes without due diligence and without giving that organization time to respond to spam charges. There is also a time-lag between when a spammer starts sending spam from a particular IP address and whenrepparttar 109541 address gets added torepparttar 109542 blacklist. Byrepparttar 109543 timerepparttar 109544 services become aware of a spammers activities,repparttar 109545 spammer has already sent millions of messages.

Cont'd on page 2 ==> © 2005
Terms of Use