Tips

How to use email marketing to get more website traffic, Part 2


Last week I discussed some of the basics of email marketing: choosing an email marketing service, getting subscribers, and creating HTML emails. Today I’ll wrap it up with tips on subject lines, email content, and scheduling.

Subject lines need to be short, especially when they’re being read on mobile devices.

Subject lines

The first step in writing a subject line is knowing what not to do. Internet Service Providers and email clients have spam filters that detect certain words, phrases, punctuation, and formatting styles that suggest an email is spam. Using the following tactics won’t automatically land your email in a recipient’s spam folder, but when you’re writing a subject line try to avoid:

  • A heavy emphasis on money/price
  • ALL CAPS and excessive QUOTATION MARKS!!!!!
  • Making the message sound urgent, eg. CLICK NOW! or DON’T MISS OUT!

Beyond those basic rules, the best practices for creating a subject line is to keep it short and simple.

  1. Short—With more and more people reading email primarily on mobile devices (41 percent and growing!), subject lines need to be extremely concise. For instance, the mail app on an iPhone only displays about 40 characters of a subject line. According to litmus (an email testing service), subject lines with 28-39 characters have the best click rates.
  2. Simple—It may be tempting to get clever with your subject lines, but resist the urge. You’re emailing subscribers (if you’re playing by the rules), so these are people who’ve either volunteered to receive emails from you or purchased your products/services. Use the subject line to tell them exactly what they’re receiving: a monthly newsletter, a discount, a notification about new content, etc.
Read More

Protect your personal information with Whois Privacy


When you purchase a domain name from name.com you’re given the option to add Whois Privacy for $3.99 (for one year). What exactly is Whois Privacy?

First, let me explain the WHOIS (pronounced “Who Is”) database. It’s a list of every domain registered in the world. Whenever a domain is registered, the person buying the domain has to provide personal information, such as a name, phone number, and address, as required by ICANN. That information goes into the Whois database. The database is searchable, so if you own a domain and someone looks up that domain in the Whois database, they can see your personal information.

But not if you have Whois Privacy protection.

When you purchase Whois Privacy, we replace your personal information in the Whois directory with contact information that directs back to name.com. If someone wants to contact you about a domain—regardless of whether it’s a legitimate inquiry—they have to contact name.com first. Here’s an idea of what your Whois information looks like with and without Whois Privacy:

whoiscomparison

Read More

Can I transfer an expired domain from GoDaddy.com? (Part 2)


GoDaddy-Transfer-Cover

Last week I began the process of transferring an expired domain from GoDaddy.com. At the end of that post, I had approved the transfer in my name.com account, and was waiting on GoDaddy to complete the transfer. I received the following email shortly after approving the transfer on the name.com side:

Read More

9 More Accidentally Inappropriate Domain Names


accidental2

Our last post outlining some accidentally inappropriate domains did very well. Since you Name.com’ers love it so much, we thought we’d put together a few additional domain names that people didn’t completely think through. They range from ITScrap, to LesBocages.com, to MasterBaitOnline.com. Check out the list:

Read More

Five questions to help drive successful business strategy


rotmanwinter20131

I recently picked up the Winter 2013 issue of Rotman magazine while wandering the Barnes and Noble in Boulder, Colorado. The Rotman magazine is a periodical from the University of Toronto’s Rotman School of Management. An article that caught my eye discussed five questions that should asked to serve as the framework for any type of business strategy formation. The authors of the piece are clear that the answers to these questions should be answered in the order presented. The questions may seem very simple at first, but once you sit down and try to answer them, you’ll discover that they may be more challenging to answer than you anticipated.

Read More

The 10 Best Accidentally Inappropriate Domain Names


dohmain

Let’s face it, sometimes we love ourselves and our brands so much that we fail to see some obvious mistakes we’ve made. That’s why when you mash a name together to create a domain name, it leads to a terribly funny outcome. We decided to hunt down some people and brands that made some poor domain buying decisions.

Read More

A few awesome uses for URL forwarding


Today we’ve got a video on how to use name.com’s URL forwarding features. In short, URL forwarding allows you to redirect users from your domain to another website.

You might think, “Not too exciting,” right? WELL YOU’RE WRONG. Here are a few useful ways to take advantage of URL forwarding:

Aliases for generated URLs

Bids start at $0.01. Shipping is $11.99. I’m not making this up.

Pretend you have something really cool that you want to sell on eBay, like a mouse-shaped chicken nugget (seriously). Now you want to promote your mouse-nugget auction. Which URL are people more likely to remember?

Option A: http://www.ebay.com/itm/Mouse-Shaped-Chicken-Nugget-One-of-a-Kind-/181097877797?
Option B: www.mousenugget.com

The choice is clear, right? If you purchase a simple domain name and set it to...

Read More

Don’t Get Hacked: Password Lessons from the Flame Broiler


It lasted for over an hour and was so ugly that even their competitors were sending out empathetic Tweets.

mcdonalds empathy burger king

Burger King’s Twitter account had been hacked, and not only were the hackers sending their own racially-charged tweets about Burger King employees “crushing and sniffing Percocet in the bathroom,” but they also changed all the branding from BK to McDonalds. They even went so far as to promote McDonald’s new Fish McBites.

burger king twitter hacked

So with this kind of nightmare playing out in real life in front of the whole world, we thought it was time to contribute a quick, legitimate  piece to the “how to come up with a great password that’s memorable and fun and makes you feel safe” articles that will be swirling around the ‘net...

Read More

The Basics of SEO to Drive Traffic to your Blog or Website | Part 5 of 5 in a “get traffic” series


Get Traffic to your site with these SEO Tips

Every search engine has a basic set of rules they use in determining how to rank your blog or website.  Learn these rules and help the search engines find your content faster as well rank you higher because you are seen as valuable in terms of content for given keywords.  This is all SEO.  Wanna get started on learning these rules?

Actually, if you have been following this “get traffic” series, you already have a head start. We’ve been giving you social media tips, tips on engaging your audience, google service tips, and even a quick rundown of 20 methods to try for traffic...

Read More

Using Engagement Tactics to Drive Traffic to your Blog or Website | Part 3 of 5 in a “get traffic” series


Free Traffic to your site with these Engaging Tips

Engagement.  It’s just a little buzzword for describing how you interact with your online audience, both online and even offline.  It’s also measurable with the ultimate goal of bringing traffic back to you.  It’s funny how the Internet has taken a normal human ability for socialization and has us quantifying our interactions with others, then measuring the outcome of those interactions all in hopes that we can maximize our impact with future interactions.  But that is a philosophical debate for another time. Simply, engagement is no different from brick and mortar stores where they talk to their customers, call up their mentors, visit surrounding businesses, and participate in various business associations...

Read More