Notes
Slide Show
Outline
1
Table of Contents
  • Product features
2
ROI and UTMS.
  • The UTMS product has been designed and implemented as a sophisticated tool to plan and deploy Integrated Targeted Communications Campaigns – Multi-Channel Campaign Manager  - and to provide “out of the box solution” to various technical and legal issues modern direct communicators are facing in their work.
  • The major potential users of this product are List Managers / Brokers, Publishers, Catalog Managers, Internal Marketing Departments, Government Departments, Universities. It can also be effectively used by any mass communicators – telecommunications carriers, banks, insurance companies, government departments, professional associations, charities – anyone who would like to target and avoid keeping and maintaining multiple mailing lists based on various demographic attributes of the same or multiple addressee lists.
  • Return On Investment is a major factor when deciding to purchase or develop a software product. The questions are many:
    • Why do we need this product?
    • Will the use in this product considerably increase productivity of our staff, so they can do more of what they do faster? Or better? Or more secure?
    • How much flexibility will my organization gain?
    • How much operational support for this product should be provided?
    • How much money can be saved in the long run (Total Cost of Ownership) by using this product instead of my current arrangements?
    • How scalable is this product?
    • How good are technological foundations this product is built upon?
    • How overall beneficial this product is to what we do?
    • The Universal Targeted Messaging Solutions product has the answers.
3
UTMS Functionality and Benefits it produces.

  • The answers you are after:


4
Budgetary Control
  • UTMS product allows controlling and keeping track of communications budgets:
    • A budget can be allocated on a Campaign Level. (By default, all Campaigns are created as Budget Controlled.)
    • A budget is allocated to each Communication. When Communications reach budgetary limit specified on a Campaign level, no more Communications can be associated with a Campaign, unless the budget limit is increased. The UTMS Administration and Security model allows you to set up roles and responsibilities in such a way that budgets are allocated and spent by different people. It is all about controls…
  • As a result, it is possible to see how your communications budget is being spent:
    • By communications types,
    • Within a time period,
    • Allocated versus spent,
    • Compared across multiple periods and more
  • In terms of statistical analysis of your budget spending, various reporting is supported including:
    • Average cost of contact by communication type,
    • Average cost of delivered click-throughs (e-mail),
    • Average cost of increased/decreased addressee base.
5
Integrated Multi-Channel Communications Delivery

  • UTMS allows you to plan and deploy your targeted communications using multiple delivery channels – email, fax, land mail, telephone, SMS, WAP.  So you can optimize spending of your communications budgets by cutting delivery costs of your  campaigns.


  • UTMS automatically extracts all required personalized data from addressee lists. Communications / Messages can then be deployed via each delivery channel using in-house systems or passed for actual deployment to a third party specialists.


  • With UTMS you can optimize your communications by specific targeting and cost effective delivery, at the same time.
6
Communications with Addressees from Multiple Lists
  • UTMS allows you to create and deploy communications, that target Addressees from multiple lists by associating multiple Selections. In simple terms, if you have 20 lists that include people you would like to target in just one communication, it can be easily done through UTMS user interface.
  • This functionality improves productivity by simplifying communications’ creation and deployment, with better, more flexible targeting / segmentation of Addressees.
7
List Groups Advantage
  • Each Addressee List can be associated with one or many List Groups.
  • The access to a list data is assigned through association with relevant list group.
  • You can associate each list group with dedicated System Addressee lists – Seeds, Testers, etc – to test and validate accuracy of your communications. All that using user-friendly on-line screens.
8
Flexible Addressee List Structure
  • UTMS allows loading of lists with completely flexible structures. There is no need for a “standardized” list structure. Each list structure is defined to the system via an easy to use User Interface and all data access and manipulation within UTMS is based on these list definitions – Meta Data. A number of sophisticated algorithms are built into the UTMS database software, that allow the end user to work with lists with different structures with the same ease.
  • This functionality allows for rapid list acquisition from various sources and their immediate incorporation into the UTMS without any extra costs associated with list structure “standardization”.
  • In practical terms this functionality allows expansion of list utilization capabilities fast and without running huge “development” projects.
  • The UTMS-DBA built-in functionality allows for a Database Administrator who looks after your databases, to define and to load lists fast by automating 90% of tasks, so even less experienced DBA (or even non-technical person with minimal training) can do this job.
  • You can tell the system which attributes on your lists can be retrieved by desktop data download mechanisms.
9
SPAM control
  • Preventing unsolicited mail is one of most challenging issues mass communicators are facing today.
  • UTMS provides multiple functionality designed to prevent SPAM complaints. The system maintains and keeps track about personal preferences of each addressee loaded into the system with respect to what type of communications he/she would/would not like to receive. And all Selections take into account this information when counting/targeting is performed.


  • UTMS product includes SPAM control functionality:
    • Opt-In / Opt-Out  On-line Forms
    • Frequency Monitoring
    • Advanced Booking of Addressees & Availability Projection
    • Domain and Individual Email Address Kill Lists
10
Opt-In / Opt-Out  On-line Forms
  • Email delivered messages may include Unsubscribe links to an on-line built-in form, where they can specify their preferences to be updated in real time. The built-in security mechanism ensures authenticity of addressees making it impossible for tampering with personal URLs to occur.
  • The same functionality is applicable to Fax and Land Mail communications by including a printed reference to the Web address.
11
Frequency Monitoring
  • UTMS allows specification of how often Addressees on any given list can be contacted via Communications. List Owners can specify contact frequency for each individual list based on their privacy agreement with list addressees.
  • This functionality allows keeping list quality high by preventing communications being perceived as SPAM, which reduces responses from list addressees. The result is better list quality which is directly translated into the price that can be charged for its use, making for increased profitability of business operations.
12
Advanced Booking of Addressees & Availability Projection
  • UTMS implements Booking functionality, which is logically based on Frequency Monitoring. When a List is queried by the Selection mechanism, the count returned tells how many addressees on a list fit Selection Criteria at the time of Selection execution only. This number is just estimated figure. How many addressees will be actually available for deployment at a particular point in time in the future greatly depends on Frequency Monitoring application and how many among qualified addressees will have “Opted In” positive at the time.
  • The UTMS includes Availability Projection functionality, which takes into account Frequency Monitoring, so on  the phone with a client, who may have a budget for a communication to be sent to 10000 people, say, just before Christmas, you can define Communication / Selection and project availability numbers over range of dates, and see how many addressees are actually available, advise your client about best date, and actually book selected addressees for future deployment. And all this, while on a phone – long before you have actual Message to be communicated, tested, approved, etc.
13
Domain and Individual Email Address Kill Lists
  • To protect your business against vigilantes and email SPAM complaints, the UTMS includes additional functionality of Domain and Individual email addresses Kill list. Every email communication mailing list is filtered against these two lists at the time of deployment.
14
List Owner Communications Approval mechanism
  • UTMS incorporates “Communication Approval” functionality, which allows implementation of control over Communications’ Content by List Owners or dedicated personnel.
  • To simplify communication’s approval in cases where communications creator and contents approver is the same person, this person can use “Self approve” feature, that allows immediate approval of communications while at the same time keeps record of self approval event.


15
Selection Engine
  • Selection functionality of UTMS allows you to use demographics data (dimensions) stored in addressee list records, to precisely identify/target desired audience of your communications.
  • You can use multiple dimensions and their respective values in the same Selection. The system automatically re-calculates the number of addressees who fit the criteria every time you modify selection. It takes into account:
      • Delivery channel of Selection (people who have mobile phone for SMS, for example),
      • Selection criteria based on chosen dimensions and their values (include/exclude),
      • Only addressees who have Opt-In positive recorded for a chosen communication type are counted.
  • Selections can be searched for, copied (create new from existing one), viewed, deleted. Authorized users can desktop download Selection identified mailing list and list data records.
  • If you maintain delivery price lists for various delivery channels, the system calculates on a fly actual delivery cost.
16
Communication Engine
  • Communication mechanism allows you to bring together all associated components – message (actual contents) and targeted audience (selections).
  • Communications can be searched for, copied (create new from existing one), viewed, deleted, cancelled. You can record actual costs against each communication. You can control maximum number of addressees to be used when associated selections identify greater number than you plan for.
  • When a communication is defined with multiple (normal case), you can specify priority for each selection, so the system will use that order to identify and use addressees accordingly.
  • “Suppress against” functionality allows you to be highly sophisticated in your campaign management (see below).
  • The system keeps track on every state communication goes through and displays all related counts – number of candidates initially selected, number of candidates after application of frequency monitoring rules, how many left after de-duplication mechanisms and filtering through “Kill” lists, how many have been deployed and more.
  • The system automatically detects all approved communications and deploy them at specified date and time.
17
Suppression against Deployed Communications
  • Imagine the scenario where you would like to communicate a message to a certain population of recipients. You know, that some of these recipients already have (or have been planned to receive) another message(s), and you may not want them, to receive the currently planned communication.
  • UTMS includes a “Suppress against Communications” functionality to do just that, executed at the time of Communication Deployment.
  • UTMS users can create and deploy more sophisticated communication campaigns.
18
Purchase & Delivery On-line Costing
  • When you perform targeting of addressees using UTMS Selection & Communication mechanisms, you can see in real time:
    • Purchase price of selected addressees’ mailing list,
    • Estimated communication delivery cost according to its delivery channel.
  • This functionality gives immediate answers about costing and saves plenty of time on “negotiations and verifications”
19
Security and Administration
  • UTMS implements certain security and administration mechanisms, that allow streamlining work practices and access control to the various parts of the UTMS functionality/features and related data. List Groups, User Groups, UTMS Roles and UTMS Tasks are the major building blocks for establishing and implementing security and user administration within the product.
  • Each UTMS user is defined within the system in association with a set of accessible list groups and tasks, and from the moment of Login the system knows exactly what UI parts are visible and can be presented to the user. An authorized Administrator can use no-nonsense dedicated screens to define a User profile on-line. We implemented best practices in user access management and system administration appropriate to the level of UTMS product sophistication.
  • You can plan and define specific UTMS roles – Selector (to prepare selections based on demographic data), Content Specialist (to prepare actual Messages from presentation point of view), Campaign Manager (who designs, plans and defines promotion campaigns) and so on – so your staff can specialize in certain tasks and become highly productive in what they do.
20
Built-In Personalization
    • The UTMS uses addressee personal information and incorporates it into every communication.


    • Personalization increases communication’s effectiveness.
21
Extract and Desktop Download of Addressee List data - New List Engineering
  • UTMS allows for an authorized user to extract and desktop download addressee list data and mailing lists of deployed communications, or just individual selections. This functionality opens the ability to mix and match list data to construct new, specialized lists – new list engineering so to speak. The newly constructed lists can be subsequently loaded into the UTMS system and utilized.
  • This functionality provides competitive advantage in list engineering to further improve targeted marketing results.
  • You can ask to “spice” extracted data with “seeds” to ensure proper list usage (if you are in a business of renting lists).
22
De-duplication, Data Cleansing, Validation & Maintenance
  • UTMS provides functionality designed to ensure that list data (which may come from multiple sources) can be easily maintained – paving the way for implementation of Super Lists functionality (multiple lists viewed and processed as one list) in coming UTMS releases.
  • The De-duplication functionality ensures that addressees never receive the same message more than once.
23
Reporting
  • The UTMS product includes a number of standard reports covering various levels of interest – Budgetary, Operational, Comparison and Historical.
  • All built-in reports can be viewed on screen on-line, and report data can be extracted and desktop downloaded for further graphical enhancements for presentation, distribution, etc.
  • The Email delivery component of the UTMS provides all the Internet enabled automated functionality and “tracking features” matching those of multiple competing email products -  URL tracking, click-though, HTML openings, communication related Opt-Outs, etc.
  • We understand the importance of reporting and therefore the UTMS product has been built on the assumption, that every user will ask for something else that is not already built-in. And this something else may be of utmost importance to this particular user.
  • Also, the UTMS system accumulates over time a lot of historical data, that can be analyzed and presented under different angles of view. The UTMS is – first and foremost - a database product. The philosophy of Open Database Structure has been implemented within the UTMS. It means that all database entities have absolutely meaningful, clearly formulated business names. The accompanied database documentation clearly explains all the relationships between them. Having all that openness, the UTMS users can define and produce their own reports by writing straight SQL, or by employing pluggable third party reporting and analysis tools of their choice.
  • By implementing this philosophy, the UTMS product eliminates any shade of dependency between its vendors and users, allowing full customization of reporting to be creatively implemented and modified according to specifics of every user well beyond standard reports.
24
On-line List Demographics Numbers Presentation – Q-Cards
  • Addressee lists include demographic data (Dimensions) to support targeting of recipients using Selections mechanism. List Analysts can review on-line and desktop download a report showing count of Addressees for each Dimension/Value combination – a Q-Card. For example, if a list includes State/Province dimension, the Q-Card will show how many Addressees are in each State/Province, if there is a Country dimension defined, the Q-Card will show how many Addressees are from each country and so on.
  • This powerful functionality makes your staff to better understand list data distribution among multiple lists, and, as a result, better and faster quality services to your clients.
  • You can allow your clients to view Q-Cards on-line, so they can better understand what data is available and communicate to your staff their preferences.
25
On-line Content  Management of Communications
  • Communication Contents creation functionality has been deliberately left  to the experts, however, UTMS integrates Communication Contents – Email Messages (Text and HTML formats), Fax and Printed materials (any format and size), SMS, WAP – into its database.  Each content file can be previewed using a browser.
  • When Contents are ready, they are easily, using UI screens, incorporated into the UTMS database allowing simple deployment, review, search by keywords and reuse.


  • This functionality would save your staff a lot of time and effort while increasing their productivity.
26
Customer Support
  • UTMS includes built-in functionality to timely react to addressee complaints covering:


    • On-line Addressee identification
    • On-line Handling subscribes/un-subscribes over the phone
    • On-line Contacts history investigation
    • On-line modification of customer contact information


    • This set of functionality allows you to protect your business operations against SPAM complaints.
27
Integrated Accounting & Billing modules.
      • UTMS includes functionality to on-line set up and maintain General and List Owner specific price lists for each Delivery Channel.
      • If you run a list brokerage business, this functionality allows you easy integration with your accounting and billing systems.
28
On-line Documentation and Screen based Help
  • The UTMS product integrates On-line manuals for its Business Users, Security Administrators and Database Administrators. Every screen includes a specific related Help topic that can be viewed in a pop-up window.
29
UTMS Foundations.
  • The UTMS is a database driven software solution. The core of the product is in its database engine – the database objects and associated database code.
  • The database has been designed and implemented according to the best world standards. It is fully scalable and distributable. Each list data can reside anywhere in a world – on a local machine or 10000 miles away. It can be relocated with ease. All the definitions of what and where and how to get there are kept in the UTMS Control database.
  • The UTMS User Interface implementation is based on the latest Web technology from Microsoft - .NET Framework - utilizing VB/ASP.NET in conjunction with ADO.NET. This is server centric Web enabled technology, that implements mainframe central processing philosophy and browser based user interface without heavy associated cost of deployment and administration.
  • The UTMS product has been designed and implemented as a software package, which can be managed and administered by its business users with absolutely minimal intervention and support of IT personnel. This philosophy has been applied to drastically reduce long term cost of ownership.
  • To finalize, the UTMS product is built on a solid, scalable, and relatively inexpensive foundation. Your investment in the UTMS is sound for many years to come.
30
Technical Info
  • Operating System
    • MS Windows 2003 Server with IIS 6.0
  • Database
    • MS SQL Server 2000 (Standard addition and up).
  • User Interface
    • Web browser. Tested with MS IE 5.0 and higher.
  • Screen resolution
    • 1600x1200 dpi for best viewing experience.
  • Hardware
    • The product is built to run on Intel based machines. Actual hardware configuration is adjusted to support required number of active users, actual network traffic, volumes of addressee lists, generated communications and associated contents. Also availability and backup requirements.
31
User Interface
  • The UTMS product has been built and tested using latest version of Microsoft Internet Explorer (version 5.5 and higher, free download from www.Microsoft.com).
  • The recommended UI computer screen for optimal viewing and use should have 1600X1200 dpi resolution.
  • The current version of UTMS includes 100+ functional user screens.
  • UTMS users can use practically any web browsers, that support HTML standards (running on any platform). There is no cost of deploying UTMS product (or its future upgrades) on user machines.
32
"G.S.S"
  • G.S.S. Consulting Pty. Ltd.
    70 Howitt Road, Caulfield North, Victoria 3161, AUSTRALIA
    Tel...: +61.3.9528.7179, Mobile: +61.(0)412.506.245
    Email.: greg_shadur@hotmail.com
  • We Custom Build Commercial, Database Driven .NET software for your Competitive Advantage.
  • Every product or service we offer is designed to create a tangible return on investment by focusing on the real customer – the end user. We are passionate about customers and it is their needs that drive us to develop solutions that will become their sound and reliable business tools for today and tomorrow.
  • We achieve our objectives by utilizing a no-nonsense concepts:
  • - Our products must address real needs of their end-users, enabling them to be highly productive in what they do.
  • - Our products must be “out of the box” solutions to be used - and administered – by actual users,
  • - Our products’ operations must be highly automated to be able (ideally) to eliminate any dependence on programming support.
  • - Every product must include comprehensive user documentation with easy to understand contents.
  • - We build (not develop) our software products engaging highly qualified, exceptionally trained, very experienced and highly paid professionals only.
  • We believe that if you engage services of a Network Administrator and part time Database Administrator, it should be enough to operate our products in a very long time.


  • Potential investors and marketing partners are welcome