Always Use Your Signature Files

Must Read

An Introduction To Home Equity Line Of Credit

More and more financial lenders are offering a home equity line of credit. What is a home equity line...

Mortgage Loans Refinance – Home Loan Tips

Home is where the heart is. Home is where you hang your hat. Home... well, you get the picture....

Simple Steps to Find a College Loan

With the demand for a college education as well as the cost of college tuition continually on the rise...

MPEG Industry Forum (MPEGIF)

Moving Pictures Expert Group Industry Forum (MPEGIF) is an advocacy group for standards-based DTV technologies. The group is an...

Unsecured Debt Consolidation Loan – No Assets Required At All

For the people who are in need of money to settle their debts may not require any assets to...

Using IronPython for Administration Tasks

Understanding the Command Line The command line is a text-based environment that some users never even see. You type a...

As discussed previously, signature files are a great marketing tool. Always attach your signature file to your online communication. See later in this chapter for information on signature files. Remember to be sure that the signature files are right for the intended audience.

Discerning Use of Attachments

If you are sending a fairly large amount of data, you might want to send it as an attached file to your email message. However, only include an email attachment if the recipient is expecting it. You would never consider going to someone’s
home, letting yourself in, finding your way into their living room, and then leaving your brochure on the coffee table. However, people do the online equivalent of this when they send an unsolicited attachment. The attachment is sent across the Internet to the recipient’s computer and is downloaded and stored on the computer’s hard drive. This is considered quite rude and, in most cases, is unwanted.

Also, unless the recipient of your email is aware of the file size and is expecting it, don’t send an attachment that is larger than 50K. Although your Internet connection might be a cable modem or a T1 line, and a 3 MB file is sent in seconds, the person who is receiving your message and attachment might be using an old 56 Kbps modem and a slow machine. If you send a 3 MB file, it might take the person with the 56 Kbps modem awhile to download the file. Needless to say, he or she won’t be too pleased. Yes, there are still people on dial-up.

Another factor to consider when sending an unsolicited attachment is that the attachment you are sending might be incompatible with the operating system or the software on the recipient’s system. You might be using a different platform (Mac/PC) or different operating system, and the recipient might not be able to open and read your file. Even PC to PC or Mac to Mac, the recipient might not be able to open and view the attachment if that particular program is not installed on his or her machine. Someone using an old version of Corel WordPerfect might not be able to read a Microsoft Word 2007 document sent as an attachment. Thus, you have wasted your time sending the file and the recipient’s time downloading the file.

Finally, it is a well-known fact that email attachments can act as carriers for computer viruses. Many people will not open anything with an attachment, even if it is from someone they know, unless they have specifically requested a file. You
might unknowingly send someone an attachment with a virus, and even if the file you send is virusfree, you could still receive blame if recipients find a virus on their system, just because you sent them an attachment. Basically, avoid sending email attachments of any type unless you have the recipient’s permission. Be mindful of the size of the file you intend to send, compatibility with other platforms, and computer viruses. One alternative to sending a large attachment is to post the file on a Web server, and in your email message direct users to a URL from which they can download the file.

A software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer.


Previous articleA Call to Action
Next articleEmail Marketing Tips

Latest News

Digital Marketing for Beginners

Digital marketing for starter, Let to basic learning about connecting with your audience in the right place at the...

What are 7 things poor people do that the rich don’t?

1. poor people watch TV in which people read books how many hours you spend in front of the TV and when was the...

Top 18 best small business ideas for beginners starting

A small business can be frightening and requires plenty of careful planning there are many small business ideas which can be beneficial as well...

Summer that makes you happy

We saw were already here I've been thinking about some of the things. I used to do with my husband even though he had...

4 Point to helpful tips specifically for caregivers

What you need to take a vacation. I know it sounds impossible creative and try to make it work for you almost everyone needs...

More Articles Like This