Explore 362 terms covering deliverability, authentication, compliance, engagement, and everything else you need to know about email.
Showing 6 of 19
A/B testing (split testing) compares two versions of an email to learn what drives more opens, clicks, or replies. Learn how to run email A/B tests correctly and avoid common mistakes.
An abandoned cart email is an automated message sent when a shopper adds items to a cart but leaves without buying. Learn how it works and how to improve conversions without sounding spammy.
Above the fold is the first visible section before scrolling. Learn why it matters for email clicks, landing pages, and conversions.
Accept-all domains accept mail for any address at the domain. Learn why they exist and how they affect bounce risk.
Email acceptance rate measures how many messages were accepted by receiving servers (not bounced). Learn how acceptance rate differs from inbox placement and deliverability.
An email alias is an alternate address that routes mail to your main inbox. Learn why businesses use aliases and how they help with organization and privacy.
Showing 6 of 11
Backscatter is unwanted bounce mail sent to forged sender addresses. Learn why it happens and how to prevent your domain from being involved.
Base64 converts binary files into text so they can travel through email safely. Learn how Base64 affects email size and deliverability.
BCC (blind carbon copy) lets you send an email to multiple recipients without revealing their addresses to each other. Learn best practices and common pitfalls.
Behavioral emails are triggered by actions like visits, clicks, or purchases. Learn common examples and how to keep them helpful, not creepy.
BIMI lets brands display a verified logo next to emails in supporting inboxes. Learn what BIMI is, prerequisites like DMARC, and why it matters.
A VMC is a certificate used to verify brand ownership for BIMI. Learn what it does and why it’s often required.
Showing 6 of 22
A call to action (CTA) tells the reader what to do next. Learn how to write email CTAs that improve clicks, replies, and conversions.
CAN-SPAM is a U.S. law that sets requirements for commercial email. Learn what CAN-SPAM requires and how to stay compliant when sending outreach.
Canned responses (templates) speed up replies, but they can feel robotic if misused. Learn how to write flexible templates that still feel personal.
CASL is Canada’s anti-spam legislation and one of the strictest email marketing laws. Learn consent requirements and compliance basics.
A catch-all domain accepts mail for any address, even if it doesn’t exist. Learn why catch-all matters for email verification and bounces.
Catch-all domains accept any recipient address, complicating verification. Learn how catch-all detection works and what it means.
Showing 6 of 22
DANE uses DNSSEC to publish TLS certificates for SMTP. Learn how it works and where it’s used.
Dark mode can alter background colors, text colors, and images. Learn how to design emails that look good in dark mode.
A dedicated IP is an IP address used only by your sender. Learn when a dedicated IP helps deliverability and when a shared IP is better.
Email deliverability is your ability to land emails in the inbox instead of spam. Learn the factors that influence deliverability and how to improve it.
Deliverability monitoring tracks bounces, complaints, placement, and authentication. Learn what to monitor and why it matters.
Delivery means accepted by servers; deliverability means reaching the inbox. Learn why the difference matters for campaigns.
Showing 6 of 97
Access control prevents the wrong people from seeing sensitive emails. Learn roles, permissions, and best practices for limiting access without blocking support workflows.
Approval workflows reduce risk for legal, billing, and sensitive emails. Learn how to set up review steps, roles, and audit trails for outbound communication.
Email assignment routes incoming messages to the right owner based on rules or AI classification. Learn common routing strategies and setup examples.
Assignment ensures every message has an owner. Learn assignment strategies by topic, customer tier, language, and workload balancing for shared inboxes.
Attachments can introduce risk and compliance issues. Learn safe handling workflows, scanning best practices, and how automation helps teams.
An email audit trail records who did what in a shared inbox. Learn what to track, why it matters, and how audit logs improve teamwork and compliance.
Showing 2 of 2
Feedback loops share complaint signals from mailbox providers back to senders. Learn how FBLs work and how to use them to protect deliverability.
The From Name is the sender label recipients see in their inbox. Learn best practices for From Names that improve recognition and reduce spam complaints.
Showing 3 of 3
Gmail aliases can use plus addressing and dot variations in the local part. Learn how Gmail normalization works and what it means for signups and hygiene.
In Gmail, dots in the local part are ignored. Learn what dot normalization means and when it matters for duplicates.
Greylisting is an anti-spam technique where servers temporarily reject mail from unknown senders. Learn how greylisting works and how it affects delivery timing.
Showing 4 of 4
A hard bounce is a permanent delivery failure, often due to an invalid address. Learn common causes of hard bounces and how to handle them.
Headers can span multiple lines using folding rules. Learn how to unfold headers correctly when building analyzers.
HELO/EHLO are SMTP greetings that identify the sending server. Learn how misconfigured HELO/EHLO can trigger spam filters.
Honeypot fields are hidden form inputs that bots often fill. Learn how honeypots reduce spam signups without hurting UX.
Showing 6 of 7
IDN domains use non-Latin characters. Learn how they work in email, risks like homographs, and operational considerations.
IMAP is a protocol that keeps email on the server and syncs across devices. Learn how IMAP works and how it differs from POP.
In-Reply-To links a reply to a previous Message-ID. Learn how it drives threading in clients like Gmail.
Inbox placement is where your emails land after delivery. Learn what influences inbox placement and how to improve it.
Inbox Zero is a method for keeping your inbox under control by processing messages intentionally. Learn what Inbox Zero means and practical ways to apply it.
IP reputation is a score assigned to the server IP sending email. Learn how it impacts filtering and how to protect it.
Showing 6 of 8
Jittered retries spread retry attempts over time to avoid synchronized traffic spikes and repeated failures.
JTBD framing helps build workflows based on what users are trying to accomplish, not just features.
Join logic defines entry rules, suppression rules, and exit conditions for automated sequences.
Journey-based segmentation groups users by stage, not just demographics, to power smarter automation.
JWTs help services authenticate requests between systems for webhooks, sync, and APIs.
Junk folder signals are patterns providers use to classify mail as unwanted or risky.
Showing 6 of 7
Kanban-style inboxes use stages like To Reply, Waiting, Done to reduce chaos and improve accountability.
Key rotation replaces old DKIM keys with new ones on a schedule to reduce long-term risk.
Keyword collision happens when automation triggers on words that appear in unrelated contexts.
Hybrid routing uses deterministic keywords plus intent detection to improve accuracy and control.
KB snippets are saved replies linked to help docs, used for faster responses and consistent support.
Knowledge gap alerts identify repeated questions that aren’t answered well by existing snippets or docs.
Showing 6 of 11
Email line length and wrapping rules impact readability and parsing. Learn why 78 characters appears so often.
Link shorteners can trigger spam filters and user distrust. Learn when they hurt and how to avoid problems.
List-Archive points recipients to message archives. Learn how it’s used and why it matters for communities.
List fatigue happens when subscribers stop engaging due to over-mailing or low relevance. Learn how to detect fatigue and reduce churn.
List-Help points subscribers to help resources or contact addresses. Learn why it’s useful for support and compliance.
List-ID identifies a mailing list uniquely. Learn why it helps filtering, unsubscribing, and organization.
Showing 6 of 12
Mail merge sends personalized emails to many recipients using variables from a list. Learn how mail merge works and how to avoid deliverability mistakes.
Mailing lists often rewrite headers and bodies, breaking DKIM. Learn why and what to do about it.
A mailto link opens the user’s email client with pre-filled fields. Learn how mailto links work and what to consider for encoding and compatibility.
MDN is a standard used for disposition notifications like read receipts. Learn what it is and why it’s inconsistent.
Message authentication confirms an email is really from the domain it claims. Learn the roles of SPF, DKIM, and DMARC.
Message-ID uniquely identifies an email message. Learn how it’s used for threading, de-duplication, and troubleshooting.
Showing 6 of 9
Nap-time automation pauses follow-ups during weekends, holidays, outages, or customer escalations.
Narrowcasting targets smaller, more relevant groups to improve engagement and reduce complaints.
Negative keywords block rules when specific phrases indicate the email is not the intended category.
Next best action suggests what to do next: reply, schedule, assign, follow up, or log to CRM.
A non-delivery report is a bounce message explaining why an email didn’t reach the recipient.
Normalization removes prefixes and formatting to group conversations and measure subject performance accurately.
Showing 4 of 4
OAuth enables delegated email access without storing passwords. Learn how OAuth works for Gmail and Outlook integrations.
One-click unsubscribe lets recipients opt out instantly. Learn how it reduces complaints and supports compliance.
Open rate measures how often emails are opened, but privacy features can make it unreliable. Learn what open rate means and which metrics to prioritize.
Open tracking often uses pixels and can be distorted by privacy protections. Learn what open tracking means and how to interpret it.
Showing 6 of 11
Password reset emails must be fast, reliable, and secure. Learn what to include and how to reduce abuse.
Permission marketing relies on consent-based email. Learn why permission improves engagement and reduces spam complaints.
Phishing is a fraud tactic that tricks recipients into sharing sensitive information. Learn how phishing works, common signs, and how authentication reduces spoofing.
Phishing simulations are controlled tests to educate employees. Learn best practices and what to avoid.
Plain text emails contain only text without HTML formatting. Learn when plain text is best and how it affects deliverability and readability.
Plain-text fallback improves accessibility and deliverability. Learn how to write a good text version of an email.
Showing 2 of 2
DMARC quarantine tells receivers to treat failing mail as suspicious, often sending it to spam. Learn when to use quarantine and how to roll it out safely.
Quoted-printable preserves readable text while safely encoding special characters. Learn how it works in emails.
Showing 6 of 14
Rate limiting controls how many requests a user can make in a time window. Learn why rate limiting prevents abuse and protects deliverability and infrastructure.
Rate limiting restricts how fast you can send to a provider. Learn how throttling works and how to reduce deferrals.
RBLs (blocklists) flag IPs or domains associated with spam. Learn how RBLs work, how checks are done, and what to do if you’re listed.
Reactivation sequences target inactive recipients with a clear reason to re-engage. Learn best practices to avoid complaints.
Received headers show the path an email took across servers. Learn how to read them and identify sender IPs.
References stores a chain of Message-IDs in a thread. Learn how it differs from In-Reply-To and why it matters.
Showing 6 of 36
Some inboxes support structured markup for actions like RSVP or package tracking. Learn what email schema is and where it works.
A seed list is a set of test inboxes used to check inbox vs spam placement across providers. Learn how seed tests work and their limitations.
Sender identity is the combination of From, authentication, and reputation signals. Learn what shapes sender identity.
Sender reputation is a trust score based on your domain, IP, and behavior. Learn what affects reputation and how to improve inbox placement.
A shared inbox lets teams manage customer or business email together with assignments, notes, and status. Learn best practices and common shared inbox workflows.
Shared inbox workflows prevent duplicate replies, missed messages, and slow response times. Learn assignment, tags, SLAs, and best practices for a clean team inbox.
Showing 6 of 7
Threading groups related emails into conversations. Learn what influences threading in Gmail and other clients.
Throttling is when mail servers limit how quickly you can send or deliver messages. Learn why throttling happens and how to reduce it.
TLS encrypts email connections between servers and clients. Learn how TLS works for SMTP and why it matters for security and trust.
TLS-RPT provides reports about TLS delivery problems. Learn how it complements MTA-STS.
A tracking pixel is a tiny image used to measure opens and engagement. Learn how email tracking pixels work and how privacy changes affect them.
Transactional emails are triggered by user actions like purchases, password resets, and receipts. Learn what transactional emails are and how to optimize them.
Showing 6 of 15
Unified inbox routing assigns incoming emails to the correct user, label, or workflow based on rules and intent.
Unified thread view groups replies, forwards, and related messages into a single readable timeline.
Unread suppression pauses automations until a human has viewed or triaged the message.
Unsubscribe links let recipients opt out of future emails. Learn how unsubscribe links affect complaints, compliance, and deliverability.
A preference center lets subscribers control frequency and topics. Learn why it reduces churn and spam complaints.
Unsubscribe rate measures how often recipients opt out after receiving emails. Learn what unsubscribe rate indicates and how to reduce unwanted churn.
Showing 6 of 10
Validation checks syntax and domains; verification attempts deeper deliverability signals like SMTP responses.
Variable substitution inserts fields like name, company, and context into email templates consistently.
Variant testing measures performance differences between email drafts, subject lines, or CTAs.
Velocity limits cap how fast you send to protect reputation and reduce throttling.
Vendor lock-in happens when workflows, tracking, or templates can’t easily move to another system.
Verified identity confirms a sender can use an address or domain, improving trust and deliverability.
Showing 6 of 13
A waiting state marks conversations pending customer reply, internal approval, or external action.
A warm ramp slowly increases sending volume to build reputation and avoid spam placement.
Warm intro workflows streamline introductions with templates, context capture, and follow-up reminders.
A warmup schedule is a plan for gradually increasing sending volume to build reputation. Learn how to structure a warmup schedule and avoid common mistakes.
Webhooks send real-time events between systems (like opens, clicks, or replies). Learn what webhooks are and how they power automation.
Replay protection stops the same webhook event from triggering automation multiple times.
Showing 6 of 6
X-axis reporting is time-based charting that highlights trends like deliverability and reply rates.
X-headers store custom fields in email messages to support routing, analytics, and automation.
Some users search 'XML DKIM record' by mistake; the real requirement is a TXT record with DKIM keys.
An XML sitemap helps search engines index your email help docs and glossary pages efficiently.
X-ray debugging shows the trigger, matching conditions, and actions for a specific email event.
Dynamic template fields can introduce XSS-like risks if HTML is not sanitized properly.
Showing 5 of 5
Y-axis metrics define the scale for charts like opens, replies, and bounce rate so trends are clear.
Yahoo and related providers apply stricter requirements and filtering behavior for bulk senders.
Yahoo postmaster-style insights help bulk senders diagnose reputation and filtering issues.
YAML is a readable format for defining workflows, conditions, and actions in automation systems.
Yield management balances volume, timing, and list quality to maximize outcomes safely.
Showing 5 of 5
Z-scores help identify abnormal spikes in bounces, complaints, or reply drops compared to baseline.
A zero inbox queue is a workflow where emails are triaged into actionable states until cleared.
Zero-shot classification labels emails into categories using general language understanding without custom training.
A zombie thread is an inactive conversation that resurfaces, confusing routing, ownership, or automations.
Zone-based sending schedules messages to land during working hours in the recipient’s local time.
Gmailo lets you automate your entire email workflow for free. No credit card required.
Get started free