Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Administration, e-Mail Management, Email Response Management, Mailbox Management, e-Mail Response Management, Electronic Mail Management, e-Mail Administration
DEFINITION: Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether. The origins of email bankruptcy as a term are not clear. One of the earliest examples of the practice, whether identified as such or not, was by Stanford computer science professor Donald E. Knuth. Knuth was an  … 
Definition continues below.
Email Management Reports
26 - 50 of 297 Matches Previous Page  |  Next Page
Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Find out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

Creating and Enforcing Email Security Policies
sponsored by SearchSecurity.com
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

SearchSecurity.com

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

C2C PST Enterprise vs. Microsoft PST Capture
sponsored by C2C Systems UK
WHITE PAPER: In this informative resource, compare two PST management and elimination tools -- C2C PST Enterprise and Microsoft PST Capture -- to see which fits best with the needs of your organization.
Posted: 16 May 2014 | Published: 16 May 2014

C2C Systems UK

What to Know About Exchange 2013 and Load Balancing
sponsored by KEMP Technologies
WHITE PAPER: This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.
Posted: 05 May 2014 | Published: 09 May 2013

Dell Software

Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
sponsored by ZixCorp
WHITE PAPER: This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

ZixCorp

Cloud Efficiencies and Hosted Email
sponsored by Apptix
EGUIDE: This whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.
Posted: 25 Apr 2014 | Published: 25 Apr 2014

Apptix

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Ontrack® PowerControls™ 6.0: Managing Data in Server Environments
sponsored by Ontrack® PowerControls™ by Kroll Ontrack
TRIAL SOFTWARE: Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange Server and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results.
Posted: 26 Mar 2014 | Premiered: 15 Mar 2010

Ontrack® PowerControls™ by Kroll Ontrack

The Many Paths to Exchange 2013
sponsored by SearchExchange.com
EBOOK: While the benefits are appealing, an upgrade to the latest version of Exchange is a big step. The complexity of that migration will depend on your starting point and the thoroughness of your plan.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

SearchExchange.com

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

24 Questions to Take the Migraine Out of Email Migration
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper features 24 questions you should ask as you try to select a service provider to execute your Exchange migration to the cloud.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Intermedia.Net

The Master List of Email Delivery Terminology
sponsored by Dyn
WHITE PAPER: Email may seem simple – create content and send to your list – but there are many elements that go into a good email program. The Master List of Email Terminology helps shed light on the terms that you should know and what you should be implementing in your own program.
Posted: 07 Jan 2014 | Published: 31 Dec 2013

Dyn

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.
26 - 50 of 297 Matches Previous Page    1 2 3 4 5    Next Page
 
EMAIL MANAGEMENT DEFINITION (continued): …  early adopter of email, in 1975. However, he gave it up 15 years later. Quoted in an article in The Washington Post, Knuth explained "I'd get to work and start answering e-mail -- three hours later, I'd say, 'Oh, what was I supposed to do today?'" He took the extreme route and simply stopped using email and has never regretted his decision, proclaiming that "I have been a happy man since Jan. 1 , 1990."Creative Commons founder, law professor and Wired columnist Larry Lessig popularized the term and concept when he officially declared email bankruptcy in a mass email. In 2004, … 
Email Management definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement