Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
EmailReports
1 - 25 of 234 Matches Previous Page  | Next Page
Keep Up With the Evolving Threat Landscape to Protect Email
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.
Posted: 20 Aug 2014 | Published: 01 Jun 2013

Cisco Systems, Inc.

Developing an Information Governance Strategy
sponsored by Rand Secure Data
WHITE PAPER: Find out how developing an information governance strategy can help you manage unstructured data – and prevent trouble in the future.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

Rand Secure Data

CIO Need to Know Guide: How CIOs Can Reduce Costs and Lower Risks by Driving Improved Information Economics
sponsored by IBM
WHITE PAPER: This CIO Need to Know guide explains how you can reduce costs and lower risks by driving improved information economics.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

Archiving- The First Logical Step for Microsoft Exchange Upgrades
sponsored by Rand Secure Data
WHITE PAPER: Learn how creating an email archiving process before committing to a Microsoft Exchange upgrade can eliminate the common problems that accompany an upgrade.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

Rand Secure Data

License to Kill Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video details the hidden threat personal storage files present and offers a free software trial that will help you locate, migrate and eliminate these files.
Posted: 11 Jul 2014 | Premiered: 12 May 2014

C2C Systems

Product Demo: Locate and Manage Your Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video features a full demonstration of a product that can locate personal storage files and allow you to take action against them.
Posted: 10 Jul 2014 | Premiered: 19 Mar 2014

C2C Systems

Consulting Firm Locates, Migrates and Eliminates PST Files
sponsored by C2C Systems
VIDEO: This important video details the personal storage file migration solution one company used for a simple process.
Posted: 10 Jul 2014 | Premiered: 28 Apr 2014

C2C Systems

PST Enterprise Explained in 60 Seconds
sponsored by C2C Systems
VIDEO: This brief video details a solution that can help you locate, migrate and manage the personal storage files in your network.
Posted: 09 Jul 2014 | Premiered: 22 May 2014

C2C Systems

The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

The Business Value of In-Person Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper explores the effects of businesses' increasing reliance on email, phone, and web conferencing communications, as well as the potential results of incorporating more in-person collaboration into organizations' day-to-day work.
Posted: 08 Jul 2014 | Published: 31 Dec 2012

Cisco Systems, Inc.

PST Enterprise vs. PST Capture Feature Comparison
sponsored by C2C Systems
WHITE PAPER: This exclusive whitepaper compares two personal storage file management solutions.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

C2C Systems

How to Incorporate New PST Files into Your Existing Email System
sponsored by C2C Systems
CASE STUDY: This exclusive case study details the solution one company chose to incorporate new personal storage files into their existing email system.
Posted: 08 Jul 2014 | Published: 09 Jul 2013

C2C Systems

City of Manchester Solves Personal Storage File Problems
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how the city of Manchester, New Hampshire went about solving their personal storage file problem.
Posted: 07 Jul 2014 | Published: 10 Jul 2013

C2C Systems

City of Manassas Takes Control of Personal Storage Files
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how one city government took control of its personal storage files.
Posted: 07 Jul 2014 | Published: 02 Jul 2013

C2C Systems

Choosing the Best PST Migration Tool
sponsored by C2C Systems
WHITE PAPER: This exclusive whitepaper details how to select a personal storage file migration strategy, identify a method and pick a solution.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

C2C Systems

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Cloud-based Email Q&A: Pros, Cons, and Tips for Success
sponsored by Mimecast
WEBCAST: In this webcast, uncover survey results on cloud-based email, including discussions on migration, benefits, and deployment.
Posted: 11 Jun 2014 | Premiered: Jun 11, 2014

Mimecast

Infographic: Dangerous File Sharing
sponsored by GlobalScape
WHITE PAPER: Uncover little known facts about how many employees are using consumer-grade file-sharing solutions to send business data, and what critical risk this puts organizations in.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

GlobalScape

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
1 - 25 of 234 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement