Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
EmailReports
1 - 25 of 236 Matches Previous Page  | Next Page
Keep Up With the Evolving Threat Landscape to Protect Email
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to mitigate risk associated with email within your organization and take on the challenge of the evolving threat landscape.
Posted: 20 Aug 2014 | Published: 01 Jun 2013

Cisco Systems, Inc.

Developing an Information Governance Strategy
sponsored by Rand Secure Data
WHITE PAPER: Find out how developing an information governance strategy can help you manage unstructured data – and prevent trouble in the future.
Posted: 01 Aug 2014 | Published: 28 Feb 2014

Rand Secure Data

CIO Need to Know Guide: How CIOs Can Reduce Costs and Lower Risks by Driving Improved Information Economics
sponsored by IBM
WHITE PAPER: This CIO Need to Know guide explains how you can reduce costs and lower risks by driving improved information economics.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

IBM

Archiving- The First Logical Step for Microsoft Exchange Upgrades
sponsored by Rand Secure Data
WHITE PAPER: Learn how creating an email archiving process before committing to a Microsoft Exchange upgrade can eliminate the common problems that accompany an upgrade.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

Rand Secure Data

License to Kill Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video details the hidden threat personal storage files present and offers a free software trial that will help you locate, migrate and eliminate these files.
Posted: 11 Jul 2014 | Premiered: 12 May 2014

C2C Systems

Product Demo: Locate and Manage Your Personal Storage Files
sponsored by C2C Systems
VIDEO: This exclusive video features a full demonstration of a product that can locate personal storage files and allow you to take action against them.
Posted: 10 Jul 2014 | Premiered: 19 Mar 2014

C2C Systems

Consulting Firm Locates, Migrates and Eliminates PST Files
sponsored by C2C Systems
VIDEO: This important video details the personal storage file migration solution one company used for a simple process.
Posted: 10 Jul 2014 | Premiered: 28 Apr 2014

C2C Systems

PST Enterprise Explained in 60 Seconds
sponsored by C2C Systems
VIDEO: This brief video details a solution that can help you locate, migrate and manage the personal storage files in your network.
Posted: 09 Jul 2014 | Premiered: 22 May 2014

C2C Systems

The 7 Perils of PST Files
sponsored by C2C Systems
WHITE PAPER: This whitepaper details seven perils of personal storage files.
Posted: 09 Jul 2014 | Published: 09 Jul 2014

C2C Systems

The Business Value of In-Person Collaboration
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper explores the effects of businesses' increasing reliance on email, phone, and web conferencing communications, as well as the potential results of incorporating more in-person collaboration into organizations' day-to-day work.
Posted: 08 Jul 2014 | Published: 31 Dec 2012

Cisco Systems, Inc.

PST Enterprise vs. PST Capture Feature Comparison
sponsored by C2C Systems
WHITE PAPER: This exclusive whitepaper compares two personal storage file management solutions.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

C2C Systems

How to Incorporate New PST Files into Your Existing Email System
sponsored by C2C Systems
CASE STUDY: This exclusive case study details the solution one company chose to incorporate new personal storage files into their existing email system.
Posted: 08 Jul 2014 | Published: 09 Jul 2013

C2C Systems

City of Manchester Solves Personal Storage File Problems
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how the city of Manchester, New Hampshire went about solving their personal storage file problem.
Posted: 07 Jul 2014 | Published: 10 Jul 2013

C2C Systems

City of Manassas Takes Control of Personal Storage Files
sponsored by C2C Systems
CASE STUDY: This exclusive case study details how one city government took control of its personal storage files.
Posted: 07 Jul 2014 | Published: 02 Jul 2013

C2C Systems

Choosing the Best PST Migration Tool
sponsored by C2C Systems
WHITE PAPER: This exclusive whitepaper details how to select a personal storage file migration strategy, identify a method and pick a solution.
Posted: 03 Jul 2014 | Published: 03 Jul 2014

C2C Systems

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Cloud-based Email Q&A: Pros, Cons, and Tips for Success
sponsored by Mimecast
WEBCAST: In this webcast, uncover survey results on cloud-based email, including discussions on migration, benefits, and deployment.
Posted: 11 Jun 2014 | Premiered: Jun 11, 2014

Mimecast

Infographic: Dangerous File Sharing
sponsored by GlobalScape
WHITE PAPER: Uncover little known facts about how many employees are using consumer-grade file-sharing solutions to send business data, and what critical risk this puts organizations in.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

GlobalScape

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

Case Study: Connecting Consultants and Customers Securely at Arthur D. Little
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Improving Collaboration by Adding Social Capabilities to Email
sponsored by IBM
WHITE PAPER: The following white paper explores the importance of integrating current collaboration tools with social technology to bridge the gap between traditional business processes and the new socially-enabled work environment. Learn about the various challenges that must be overcome, technology to consider, and more.
Posted: 19 May 2014 | Published: 19 May 2014

IBM

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.
1 - 25 of 236 Matches Previous Page    1 2 3 4    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement