When a user opens a web page or e-mail message containing a web beacon
, regardless of whether it's from a computer or mobile device, a request is sent back to the server, where a record of that request will be stored.
Most Web beacons
are so small as to be effectively invisible, but when an end-user opens or even previews an e-mail containing a Web beacon
, it sends its signal back to the spammer, indicating that a valid e-mail address has been reached.
One can hardly visit a Web site today without encountering, knowingly or not, cookie or Web beacon
By preparing the campaign in DoubleClick's DART(R) for Advertisers, mOne was able to add an additional web beacon
to each ad unit that corresponded to a Nielsen//NetRatings cookie, and match those back to members of Nielsen//NetRatings' permission-based MegaPanel of more than 100,000 members.
Mirror Image's Web computing and content delivery solutions include Global Content Caching, Managed Content Targeting, Web Beacon
and Java Executive Environment offerings, which help Poindexter address growing content delivery, targeting, optimization and measurement requirements while maximizing campaign profitability, enhancing site performance and improving client satisfaction.
enables businesses to cost-effectively evaluate
com/ ), the leader in outsourced Web analytics, today applauded the creation of new Web beacon
guidelines as a critical step in balancing the privacy of consumers with the needs of businesses.
The Web beacon
may be controlled by the organization that is responsible for the Web site being visited, or by another party that has been given permission to place the Web beacon
on the site.
The NAI's web beacon
program will respond to consumer privacy concerns through the development standards for the use of web beacons
Physical Web beacons
can be programmed to link to rich, dynamic web-based content and functionality.
com allows internet users to anonymously test websites for web beacons
, and other tracking mechanisms simply and securely.
Privacy topics covered include telemarketing, email marketing, cookies and web beacons
, phishing, children's privacy, information security, identity theft, use of social security numbers, fax marketing and international law.