Business of Information Technology  >   Business Processes  >   Business Communications  >   Email  >  

Email Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Email Administration, e-Mail Management, Email Response Management, Mailbox Management, e-Mail Response Management, Electronic Mail Management, e-Mail Administration
DEFINITION: Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether. The origins of email bankruptcy as a term are not clear. One of the earliest examples of the practice, whether identified as such or not, was by Stanford computer science professor Donald E. Knuth. Knuth was an  … 
Definition continues below.
Email Management Reports
76 - 100 of 302 Matches Previous Page  |  Next Page
Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

Unifying Avaya Aura Messaging
sponsored by Global Knowledge
WHITE PAPER: Explore an advanced tool for streamlining message management by integrating voice and email access and storage. Discover how this platform integrates your voice messages directly into your Exchange environment on a single interface reducing IT and end user frustrations alike.
Posted: 13 Mar 2013 | Published: 13 Mar 2013

Global Knowledge

Exchange Server: E-mail Archiving and Security
sponsored by SearchSecurity.com
WHITE PAPER: Review today's best (and worst) practices for email archiving inside this Exchange e-guide. Gain expert tips and tricks for managing and monitoring your Exchange servers along with six commonly overlooked security vulnerabilities to look out for.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

SearchSecurity.com

Optimizing Microsoft Exchange for the Enterprise: Hub Transport Server and Lync-SharePoint Integration
sponsored by Global Knowledge
WHITE PAPER: In part two of this Exchange optimization series, we'll discuss techniques for enhancing your Hub Transport server and integrating Lync and SharePoint. Discover simple tips for utilizing the advanced features of Exchange Server 2010 to enhance your messaging environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

Optimizing Microsoft Exchange in the Enterprise: Optimizing the Mailbox Server Role and the Client Access Server
sponsored by Global Knowledge
WHITE PAPER: Access part one in a two part series on optimizing Exchange Server 2010 in the enterprise. Uncover details about the advanced features of the mailbox and client access servers along with simple tips and tricks for improving your Exchange environment.
Posted: 31 Jan 2013 | Published: 31 Jan 2013

Global Knowledge

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Best Practices for E-Mail Management
sponsored by SearchDataCenter.com
EGUIDE: Access this expert e-guide to discover best practices for managing your organization's email and email servers.
Posted: 24 Oct 2012 | Published: 24 Oct 2012

SearchDataCenter.com

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
sponsored by SearchSecurity.com
EZINE: This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

SearchSecurity.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky Lab
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky Lab

Reap the benefits of Microsoft® Exchange sooner with Dell solutions
sponsored by Dell and Microsoft
WHITE PAPER: This resource discusses the system requirements for running Exchange 2010 and offers advice to help you evaluate your existing infrastructure. Learn more about advanced system solutions that can maximize the advantages of this latest Exchange upgrade.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Dell and Microsoft

Microsoft Exchange 2010 on Dell Systems Simple Distributed Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This architectural reference guide provides nine sample hardware configurations for Exchange 2010 specifically designed for enterprises who want to leverage the native high-availability and disaster recovery features of this latest Exchange upgrade while simplifying operations and management.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

Microsoft® Exchange Server 2010 on Dell™ Systems Agile Consolidated Configurations
sponsored by Dell and Microsoft
WHITE PAPER: This informative paper provides configuration guides for consolidating and standardizing your Exchange Server 2010 environment to increase efficiency and productivity while reducing costs.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Dell and Microsoft

General Introduction to Microsoft® Exchange Server 2010 Sizing
sponsored by Dell and Microsoft
WHITE PAPER: Review this white paper to explore the latest architectural improvements in Exchange Server 2010 along with the sizing and server role considerations for this upgrade. In addition, learn more about deployment models and example hardware options.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Dell and Microsoft

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

Exchange Server 2013: What you can do to prepare
sponsored by F5 Networks
EGUIDE: Review this expert guide for an Exchange 2013 preparation checklist and uncover 10 pre-migration recommendations for ensuring a smooth transition. Learn more about how PowerShell can help administrators during the process and examine the top features of this latest Exchange upgrade.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

F5 Networks

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software

Ontrack PowerControls: Email Management in Today's Regulatory Environment
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This white paper presents a way to more easily restore individual messages, mailboxes, attachments, and contacts from a previous full backup or snapshot without modifying your Exchange environment or normal backup procedures. Learn how to overcome the biggest Exchange backup problems you've been struggling with.
Posted: 10 Jul 2012 | Published: 31 Dec 2011

Kroll Ontrack, Inc.

Email archiving in Exchange: How to beat its limitations with a successful strategy
sponsored by Metalogix
EGUIDE: Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Metalogix

Eliminating End Users and Application Downtime
sponsored by Neverfail
WHITE PAPER: This essential resource examines critical gaps in the ability of platform-level virtualization technologies to protect mission-critical business applications in mixed physical and virtual environments. Read on to find out how to address these gaps and avoid costly downtime with affordable data protection and DR solutions.
Posted: 12 Jun 2012 | Published: 12 Jun 2012

Neverfail
76 - 100 of 302 Matches Previous Page    2 3 4 5 6 7    Next Page
 
EMAIL MANAGEMENT DEFINITION (continued): …  early adopter of email, in 1975. However, he gave it up 15 years later. Quoted in an article in The Washington Post, Knuth explained "I'd get to work and start answering e-mail -- three hours later, I'd say, 'Oh, what was I supposed to do today?'" He took the extreme route and simply stopped using email and has never regretted his decision, proclaiming that "I have been a happy man since Jan. 1 , 1990."Creative Commons founder, law professor and Wired columnist Larry Lessig popularized the term and concept when he officially declared email bankruptcy in a mass email. In 2004, … 
Email Management definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement