Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Administration, e-Mail Management, Email Response Management, Mailbox Management, e-Mail Response Management, Electronic Mail Management, e-Mail Administration
DEFINITION: Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether. The origins of email bankruptcy as a term are not clear. One of the earliest examples of the practice, whether identified as such or not, was by Stanford computer science professor Donald E. Knuth. Knuth was an  … 
Definition continues below.
Email ManagementReports
51 - 75 of 275 Matches Previous Page  | Next Page
Unifying Avaya Aura Messaging
sponsored by Global Knowledge
WHITE PAPER: Explore an advanced tool for streamlining message management by integrating voice and email access and storage. Discover how this platform integrates your voice messages directly into your Exchange environment on a single interface reducing IT and end user frustrations alike.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Global Knowledge

Optimizing Microsoft Exchange for the Enterprise: Hub Transport Server and Lync-SharePoint Integration
sponsored by Global Knowledge
WHITE PAPER: In part two of this Exchange optimization series, we'll discuss techniques for enhancing your Hub Transport server and integrating Lync and SharePoint. Discover simple tips for utilizing the advanced features of Exchange Server 2010 to enhance your messaging environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

Optimizing Microsoft Exchange in the Enterprise: Optimizing the Mailbox Server Role and the Client Access Server
sponsored by Global Knowledge
WHITE PAPER: Access part one in a two part series on optimizing Exchange Server 2010 in the enterprise. Uncover details about the advanced features of the mailbox and client access servers along with simple tips and tricks for improving your Exchange environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Are you ready to make the move to Exchange 2013? Good idea - it delivers improved administration, better security, reduced operating costs and much more. This new white paper discusses the changes in Exchange 2013, how they'll affect your company, and offers best practices for a successful, low-impact migration.
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Organizational development's influence on the e-discovery process
sponsored by SearchCompliance.com
VIRTUAL SEMINAR: In this tip, learn how organizational culture and structure influences e-discovery process.
Posted: 14 Nov 2012 | Premiered: 06 Nov 2012

SearchCompliance.com

Understanding Advanced Persistent Threats and Complex Malware
sponsored by Dell SecureWorks UK
WEBCAST: Learn more about the types of malware and advanced persistent threats that your company may be exposed to by viewing this webcast. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks UK

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Reap the benefits of Microsoft® Exchange sooner with Dell solutions
sponsored by Dell and Microsoft
WHITE PAPER: This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Microsoft® Exchange Server 2010 on Dell™ Systems Agile Consolidated Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This informative paper provides configuration guides for consolidating and standardizing your Exchange Server 2010 environment to increase efficiency and productivity while reducing costs.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

Maximizing Business Email Security in Gmail
sponsored by Mimecast
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

Mimecast

Exchange Server: E-mail Archiving and Security
sponsored by Mimecast
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

Mimecast

Exchange Server 2013: What you can do to prepare
sponsored by F5 Networks
EGUIDE: Review this expert guide for an Exchange 2013 preparation checklist and uncover 10 pre-migration recommendations for ensuring a smooth transition. Learn more about how PowerShell can help administrators during the process and examine the top features of this latest Exchange upgrade.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

F5 Networks

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software

Ontrack PowerControls: Email Management in Today's Regulatory Environment
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This white paper presents a way to more easily restore individual messages, mailboxes, attachments, and contacts from a previous full backup or snapshot without modifying your Exchange environment or normal backup procedures. Learn how to overcome the biggest Exchange backup problems you've been struggling with.
Posted: 10 Jul 2012 | Published: 31 Dec 2011

Kroll Ontrack, Inc.

Email archiving in Exchange: How to beat its limitations with a successful strategy
sponsored by Metalogix
EGUIDE: Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Metalogix

Eliminating End Users and Application Downtime
sponsored by Neverfail
WHITE PAPER: This essential resource examines critical gaps in the ability of platform-level virtualization technologies to protect mission-critical business applications in mixed physical and virtual environments. Read on to find out how to address these gaps and avoid costly downtime with affordable data protection and DR solutions.
Posted: 12 Jun 2012 | Published: 12 Jun 2012

Neverfail

About to Buy Guide: Spam/virus protection for Exchange
sponsored by Mimecast
EGUIDE: This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.
Posted: 05 Jun 2012 | Published: 05 Jun 2012

Mimecast
51 - 75 of 275 Matches Previous Page    1 2 3 4 5 6    Next Page
 
EMAIL MANAGEMENT DEFINITION (continued): …  early adopter of email, in 1975. However, he gave it up 15 years later. Quoted in an article in The Washington Post, Knuth explained "I'd get to work and start answering e-mail -- three hours later, I'd say, 'Oh, what was I supposed to do today?'" He took the extreme route and simply stopped using email and has never regretted his decision, proclaiming that "I have been a happy man since Jan. 1 , 1990."Creative Commons founder, law professor and Wired columnist Larry Lessig popularized the term and concept when he officially declared email bankruptcy in a mass email. In 2004, … 
Email Management definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement