Mailing List Studio can import recipients from SQL Server or directly from Microsoft Office applications like MS Outlook, MS Access and MS Excel. As well as from MS Office, you can also import data from Windows Mail or Outlook email marketing voodoo Express address book and even from simple text files such as .txt or .csv
This installation is compatible with all operating systems Microsoft® email marketing voodoo Windows®.
With few clicks, you can also import recipients from other software Windows compatible. In addition to the registry are email marketing voodoo available ten fields to store additional information which is generally not used. Also the functions of search and filter.
In addition to these classical results Mailing email marketing voodoo List Studio allows you to check whether the messages were opened and read by recipients.
It is possible to create messages with a comprehensive text formatting, images, animations and audio. Images can be included in the message or connected to external files on the Web, all that to allow greater lightness and speed in sending a message. It email marketing voodoo is also possible to include attachments.
You can also import HTML pages created with other editors.
Importation HTML pages from files or internet sites. Possibility to include images in the messages or to connect them to images in the internet. Pre-formulated templates, ready to be used. Use of database mailing areas to personalize messages with the receivers' data. Removal of double recipients in a group email marketing voodoo or in the whole mailing list.
Installation and use of mailing list studio on more PCs. Shared database from more PCs at the same email marketing voodoo time. Real time result about sent / failed / left / and read e-mail. Automatic Subscriptions/Remove management.
Maybe some of your friends/suppliers/customers have included you in their web platform for some mailing.
Mailing List Studio is installed on your computer. email marketing voodoo Your data are safe and they'll remain in your computer forever . Nobody can steal and reuse them.