Frequently Asked Questions
+What are web push notifications?

Web Push Notifications are clickable messages sent to the browsers of users' devices – mobile, tablet, and desktop. The notifications will be sent only to the users who have subscribed for the notifications. Once a user subscribes for the web push, he will start receiving the notifications. It's not necessary for users to be on the website to receive web push. The core proposition of web push notifications is to bring back users to the website.

+How do web push notifications work?

When a user visits your website, he receives an opt-in notification requesting his permission to send him notifications in future. When he clicks 'Allow', he is added to the list, and at the backend, the browser id gets automatically captured.
Once the visitor becomes a subscriber, you can start pushing him web push notifications based on the browser id. When web push notification is served to the user, who is in or out of your website, sees the notification, clicks on it, and is redirected to the landing page.

+Which all browsers do support web push notifications?

Currently, web push notification technology supports all major browsers such as Chrome, Mozilla Firefox, Opera, and Safari, which have around 80% of internet users.

+Do web push notification work on incognito mode?

No, web push notifications don't work in incognito mode.

+How Long Do Cookies Last?

Cookies last for a maximum lifetime. When a web server sends a cookie, it asks your browser to keep that particular cookie till lifetime, so that website visitor won't get web push subscription popup again and won't be distracted.

+Will the recent Chrome v61 Update Impact my Browser Push subscriptions?

Chromev61 update will affect only websites in HTTP protocol and not the HTTPS websites. As per latest update shared by Google, HTTP Websites will not be able to display the default browser subscription box directly without the permission of the user. So the custom subscription request have to be displayed first and once the users clicks on the allow button, the default box will be displayed and the regular subscription process follows. iCubesPro Browser push notification subscriptions already follows the above mentioned approach for all HTTP websites, and our customers will not be affected by the mentioned update.

Frequently Asked Questions
+How can we bring price parity in recommendation products?

We can do in 3 different ways.

  • Set a fixed price range
    We can set a fixed price range for each set of customers. But if a person has a mind set of buying only the items which fall under the category of 1000 and above and we are recommending him/her low cost products then there is a possibility of losing a sale .

  • Setting price range based on history data
    As you know we can analyse the data such as browsing history / cart abandonment / order history, etc and track the product which has maximum value. So that all the items which come under the tracked value can be recommended.

  • Sorting based on price
    Sort the items in ascending / descending order over the price.

+How system serves details in a recommendation mail?

The system will take image and description (Name, Price etc..) from the Google Product Feed.

+Is there any specification for Google Product feed?

Yes. It should be rss2.0 UTF 8 encoded format in xml according to scores assigned on each activity

+Up to how many products can we display in a recommendation campaign?

There is no limit in the no of product recommendations. We can display products according to HTML size.

+Can we design templates with background images and themes?

Yes. Very much possible.

Frequently Asked Questions
+What is cMecury List Builder Platform?

Simplest way to grow your subscriber list organically in real-time. Provide your website visitors an ineluctable offer (Offering a special deal in exchange for an email address)through an HTML or image popup, when the website is fully loaded or when the visitor is detected about to leave the website.

+Which all browsers do support cMecury List Builder?

Android, Mac, Ubuntu,Windows, Linux, iPhone.

+Do cMecury List Builder work on incognito mode?

Yes, cMecury List Builder works on Incgnito mode.

+What are the steps involved for implementing cMecury List Builder in any website?

We have to insert single Java script code in the admin panel of the website. Once the code is inserted in the web site , we can create 'n' number of pop ups in multiple pages.

+Is there any custom coding required for implementing different pop ups in multiple pages?

No, there is no custom coding required for implementing different pop ups in multiple pages. But the domain used for creating Java script and the domain used for creating other pop ups should be same.

+What is the main advantage of cMecury List Builder?

There is no precise audience. We can serve pop ups to the complete organic users who are coming to the website.

+What are the applications of cMecury List Builder?

  • Grow subscribers list

  • Reduce cart & browser abandonment

  • Promote Social media

  • Get customer feedback

  • Retain transacted users

  • Upsell & cross sell

  • Make urgency (Timers)

+When this cMecury List Builder can be served?

  • Website is fully loaded

  • Visitor is detected about to leave the website

  • Mouse freezing for a long time period

  • Page scrolling

  • Check out page

  • Customized user action

  • Make urgency (Timers)

Frequently Asked Questions
+What is Email Deliverability?

In simpler terms Email deliverability refers to delivering the mails directly to the inbox as intended rather than delivering them to Spam/Junk folder (Deliverability failure).

+What are different types of Bounces?

The major types of Bounces are soft bounces and hard bounces.

+What are hard bounces?

Email bounces are treated as hard when the addresses are,

  • Entered incorrectly (Typo Errors)

  • No longer in use

  • Acquired from a website by scraping or

  • Purchased from a list service provider

It is perfectly fine to have some hard bounces while bulk mailing is done. However, if the hard bounce ratio is very high Email Deliverability and Inbox placement will start getting affected. Remove hard bounced ids from the mailing list to prevent future delivery attempts and to protect your sending reputation.

+How can hard bounces be reduced?

Hard bounces can be reduced using the following methods.

  • Implement Opt-in process (Single opt-in or Double opt-in)

  • Suppress/ Remove less engaging subscribers.

  • Analyze Subscriber list for Duplicates before mailing and Verify subscribers are opted in.

+What are Soft bounces?

Soft bounces occur when a recipient is not available or the mail is getting blocked at the recipient's end. The mailbox provider or ISP will return a bounce code back to the sender. Soft bounces are a usually indicator of message content quality and relevance.

Normally Soft bounces occurs for,

  • Spammy content

  • Irrelevant Content

  • High number of spam complaints

  • Busy receiving mail server

  • Full or over quota mailbox

+Why users report my mails as spam?

Major reasons people may complain about your messages are:

  • Irrelevant content or the content which the user is expecting is not served.

  • It is easier than finding the unsubscribe URL which is buried in the footer of the email.

  • The recipient trusts the ISP user interface over the unsubscribe URL

  • Too many mails received

+How to Reduce Spam Complaints?

The Spam complaint rate can be reduced by,

  • Keeping content relevant

  • Placing an easily accessible unsubscribe URL

  • Implementing a double opt-in process

  • Purging unengaged users

Email Deliverability can be improved by configuring SPF and DKIM

+What is SPF?

In simpler words, SPF or Sender Policy Framework is a security mechanism created to prevent someone from sending mails in your name. The Mechanism is all about the communication between DNS Servers.

Through SPF, a domain may explicitly authorize the hosts that are allowed to use its domain name. SPF works by publishing DNS resource records that declare which hosts are allowed to use a domain name. The receiving mail server checks the SPF records from the domain identified as sending the email to verify that the source IP which the email originated from is authorized to send email from that domain.

An SPF record is of the form:
v=spf1 +mx a:xog.example.com/28 ~all
Each qualifier has its own meaning.

  • "v" indicates the version of spf being used. Other qualifiers verifies the legitimacy of the email.

  • "mx" and "a" are resource records that are compared between spf record and email to decide whether to accept the mail or not.

  • The mechanisms are combined with qualifiers to determine how to handle a match.

  • + (which is implied if omitted) and -, resulting in a pass or a fail

  • There is also ? for a neutral result and ~ for a softfail.

So the example SPF Record can be decoded as that it uses version 1, passes email if the domain has an MX record matching the sender's address, passes email if the domain has an address record matching xog.example.com/28, and fails all others.

+What is DKIM?

Domain Keys Identified Mail (DKIM) standard has been created for the same reason as SPF: to prevent the bad guys from impersonating you as an email sender. It's a way to additionally sign your emails in a way that will allow the recipient's server check if the sender was really you or not.

With DKIM, a signer can cryptographically sign an email message for a domain, claiming responsibility for its authenticity. The recipient verifies the signature by querying the signing domain for the public key to confirm that the signature was encrypted by the appropriate private key. DKIM-Signatures are generated by code which the signer adds to the appropriate agent.

+How to set a DKIM Record?

The whole idea is based on encrypting and decrypting the additional signature, put in the header of your message. To make that possible, you need to have two keys:

  • Private key (which is unique to your domain and available exclusively to you. It allows you to encrypt your signature in the header of your messages.)

  • Public key (which you add to your DNS records using DKIM standard, in order to allow your recipient's server retrieve it and decrypt your hidden signature from the header of your message).Setting DKIM is just putting the information about the public key into your server's records. It is also a txt record that needs to be put in the right place.

Once you have set that up, each time someone gets an email from you, the receiver's server will try to decrypt your hidden signature using the public key. If it succeeds, this will additionally authenticate your message and in result increase the deliverability of all your emails.

Frequently Asked Questions
+Why marketers prefer Caspar Short Messaging Solutions?

We partner strictly with the Industry best technology partners with a proven track record, ensuring a direct relationship with the leading network operators and trusted local partners helping our customers to deliver messages glitch free."