Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Administration, e-Mail Management, Email Response Management, Mailbox Management, e-Mail Response Management, Electronic Mail Management, e-Mail Administration
DEFINITION: Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether. The origins of email bankruptcy as a term are not clear. One of the earliest examples of the practice, whether identified as such or not, was by Stanford computer science professor Donald E. Knuth. Knuth was an  … 
Definition continues below.
Email Management Reports
76 - 100 of 305 Matches Previous Page  |  Next Page
Improving Enterprise Email Security: Systems and Tips
sponsored by SearchSecurity.com
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchSecurity.com

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Best Practices for E-Mail Management
sponsored by SearchDataCenter.com
EGUIDE: Access this expert e-guide to discover best practices for managing your organization's email and email servers.
Posted: 24 Oct 2012 | Published: 24 Oct 2012

SearchDataCenter.com

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
sponsored by SearchSecurity.com
EZINE: This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

SearchSecurity.com

Cisco UCS C-Series Rack Servers with Intelligent Intel Xeon Processors for Microsoft Exchange Server
sponsored by Insight
WHITE PAPER: This solution brief details the features and benefits of an innovative rack server series and discusses the benefits of running Exchange on this architecture. Read on to determine if this is an optimal hardware for your messaging and collaboration environment.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Insight

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

How Cisco IT Deployed Enterprise Messaging on Cisco UCS
sponsored by Insight
CASE STUDY: Access this case study to examine how one organization leveraged consolidation in their Exchange environment to optimally support the latest Exchange upgrade. Learn more about the results realized, lessons learned and next steps towards effective Exchange operations.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Insight

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Reap the benefits of Microsoft® Exchange sooner with Dell solutions
sponsored by Dell and Microsoft
WHITE PAPER: This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Microsoft® Exchange Server 2010 on Dell™ Systems Agile Consolidated Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This informative paper provides configuration guides for consolidating and standardizing your Exchange Server 2010 environment to increase efficiency and productivity while reducing costs.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

Exchange Server 2013: What you can do to prepare
sponsored by F5 Networks
EGUIDE: Review this expert guide for an Exchange 2013 preparation checklist and uncover 10 pre-migration recommendations for ensuring a smooth transition. Learn more about how PowerShell can help administrators during the process and examine the top features of this latest Exchange upgrade.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

F5 Networks

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software
76 - 100 of 305 Matches Previous Page    2 3 4 5 6 7    Next Page
 
EMAIL MANAGEMENT DEFINITION (continued): …  early adopter of email, in 1975. However, he gave it up 15 years later. Quoted in an article in The Washington Post, Knuth explained "I'd get to work and start answering e-mail -- three hours later, I'd say, 'Oh, what was I supposed to do today?'" He took the extreme route and simply stopped using email and has never regretted his decision, proclaiming that "I have been a happy man since Jan. 1 , 1990."Creative Commons founder, law professor and Wired columnist Larry Lessig popularized the term and concept when he officially declared email bankruptcy in a mass email. In 2004, … 
Email Management definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement