Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
101 - 125 of 254 Matches Previous Page  |  Next Page
Maximizing Business Email Security in Gmail
sponsored by SearchSecurity.com
EGUIDE: This e-guide examines the security risks associated with users forwarding their corporate email to personal Gmail accounts. Discover expert strategies for addressing today's growing email security challenges and learn about Google's latest email scandal and the issues it created surrounding cloud security.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

SearchSecurity.com

Microsoft announces new office 365 offerings
sponsored by ComputerWeekly.com
ANALYST REPORT: Analyst group, Nucleus Research assesses Microsoft's plans to  update to its Office 365 cloud services, including enhanced social capabilities with SharePoint and Yammer.
Posted: 15 Mar 2013 | Published: 15 Mar 2013

ComputerWeekly.com

Integrating and monitoring business-to-business (B2B) value chains
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Rob Bamforth offer advice on putting in place an effective, integrated, overall B2B solution.
Posted: 14 Jan 2013 | Published: 04 Sep 2012

ComputerWeekly.com

Effective B2B Integration
sponsored by ComputerWeekly.com
ANALYST REPORT: Date Vile identifies 6 key factors to help businesses integrate their supply and demand chains more effectively.
Posted: 29 Nov 2012 | Published: 21 Sep 2012

ComputerWeekly.com

Best Practices for E-Mail Management
sponsored by SearchDataCenter.com
EGUIDE: Access this expert e-guide to discover best practices for managing your organization's email and email servers.
Posted: 24 Oct 2012 | Published: 24 Oct 2012

SearchDataCenter.com

Can BYOD Best Practices Help Mobile UC Mature in the Enterprise?
sponsored by SearchSecurity.com
EGUIDE: Discover why combining bring your own device (BYOD) with enterprise-grade unified communications (UC) applications is such a challenge for organizations and vendors alike and learn about an alternative that can help your organization enjoy the benefits of BYOD and UC simultaneously.
Posted: 22 Oct 2012 | Published: 22 Oct 2012

SearchSecurity.com

Understanding Advanced Persistent Threats
sponsored by Dell SecureWorks
WEBCAST: This webcast explores the types of malware and advanced persistent threats that your company may be already be exposed to. It also discusses some of the common attributes of Advanced Persistent Threats and what you should be on the look out for.
Posted: 10 Oct 2012 | Premiered: Oct 10, 2012

Dell SecureWorks

Market trends: The Future of E-mail
sponsored by SearchSecurity.com
EGUIDE: Access this expert e-guide to discover the two major trends being used to fight email spam and other threats to the security of your inter-organizational communications.
Posted: 17 Sep 2012 | Published: 17 Sep 2012

SearchSecurity.com

Exchange Insider E-Zine Vol. 14: Securing Mobile Devices and Exchange
sponsored by SearchSecurity.com
EZINE: This essential e-zine reviews key BYOD concerns and considerations for Exchange admins, and offers tips for addressing the technical logistics of delivering secure email access to mobile devices. Learn how to leverage PowerShell scripts, ActiveSync data, and more.
Posted: 19 Jul 2012 | Published: 19 Jul 2012

SearchSecurity.com

The Future of Email and Applications is Social
sponsored by IBM
WHITE PAPER: The workplace is evolving – is your email application keeping pace? This resource details why the future of email and applications is social and details the many benefits a socially relevant email experience provides.
Posted: 05 Apr 2013 | Published: 28 Feb 2013

IBM

Email Security Technical Guide
sponsored by SearchSecurity.com
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

SearchSecurity.com

Top 10 Steps to Ensure a Successful Migration to Exchange 2013
sponsored by Dell Software
EGUIDE: Whether you're upgrading a legacy environment or undertaking a consolidation project, the question is not whether to migrate to Exchange 2013, but how to do it with minimum disruption and downtime. Look no further... Our experts have laid out the top ten steps to ensure a successful Exchange migration. Read the White Paper >>
Posted: 28 Jan 2013 | Published: 28 Jan 2013

Dell Software

Six Email Security Best Practices for Email SaaS
sponsored by Symantec Corporation
EGUIDE: Uncover the 6 best practices for email security when evaluating solution providers, and explore the capabilities available with cloud-based email security services – read on now to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

Exchange Server administration policy: Managing privileged user access
sponsored by F5 Networks
EGUIDE: Access this expert e-guide produced by the independent team of editors at SearchExchange.com to discover the best ways to equip Exchange administrators with the proper training on protecting their privileged user access.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

F5 Networks

Top 5 Strategies for Getting an Email Archiving Project off the Ground
sponsored by Symantec Corporation
WHITE PAPER: This short white paper explores 5 key strategies for building a solid case for a modern, proactive archiving system. Read now to learn more.
Posted: 06 Sep 2012 | Published: 30 Dec 2011

Symantec Corporation

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

New ShoreTel IP Telephony Solution a Hole in One for Tiger Woods Foundation Headquarters and Learning Center
sponsored by ScanSource & ShoreTel
WHITE PAPER: Discover how one organization replaced their legacy PBX-based telephone system with an IP telephony system which helped increase flexibility, mobility, and productivity.
Posted: 08 Aug 2012 | Published: 31 Dec 2010

ScanSource & ShoreTel

ShoreTel Small Business Edition: Simple Communications That Grow With Your Business
sponsored by ScanSource & ShoreTel
WHITE PAPER: Uncover the details of a unified communications (UC) system that provides powerful, feature-rich, scalable, productivity-boosting UC to small businesses at an affordable price point.
Posted: 07 Aug 2012 | Published: 31 Jul 2012

ScanSource & ShoreTel

ShoreTel Communicator: Transforming the Way People Work With UC
sponsored by ScanSource & ShoreTel
WHITE PAPER: Discover how a powerful unified communications (UC) application can help any employee in any organization connect to people and information – no matter where they are located or what platform they are using.
Posted: 02 Aug 2012 | Published: 29 Apr 2011

ScanSource & ShoreTel

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
sponsored by Dell Software
WHITE PAPER: This essential cost-benefit analysis illustrates through several use cases and examples how businesses can benefit from properly archiving electronic content and email. Discover how much time, money and energy your company should expect to save from implementing sound retention policies and capabilities.
Posted: 23 Jul 2012 | Published: 31 Dec 2011

Dell Software

Making Office 365 More Secure and Compliant
sponsored by Dell Software
WHITE PAPER: This essential resource explores the strengths and weaknesses of Microsoft Office 365, focusing on security and compliance needs. Find out how you can secure this platform and meet key compliance requirements by leveraging a third-party tool.
Posted: 23 Jul 2012 | Published: 23 Jul 2012

Dell Software

The Tod Point Group: IBM Storwize V7000 in an Exchange Environment
sponsored by IBM
WHITE PAPER: The IBM Storwize V7000 Unified storage system, combined with powerful management software from IBM Tivoli, provides an ideal complement to Exchange 2010 deployments by providing a highly virtualized storage infrastructure designed to meet the specific needs of Exchange 2010 environments.
Posted: 19 Jul 2012 | Published: 31 May 2012

IBM

Ontrack PowerControls: Email Management in Today's Regulatory Environment
sponsored by Kroll Ontrack, Inc.
WHITE PAPER: This white paper presents a way to more easily restore individual messages, mailboxes, attachments, and contacts from a previous full backup or snapshot without modifying your Exchange environment or normal backup procedures. Learn how to overcome the biggest Exchange backup problems you've been struggling with.
Posted: 10 Jul 2012 | Published: 31 Dec 2011

Kroll Ontrack, Inc.

Quest Migration Assessment Tool (QMAT)
sponsored by Dell Software
ASSESSMENT TOOL: Take advantage of this exclusive assessment tool to easily compare top messaging platforms so you can determine which one fits your organization's needs.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

Dell Software

Email archiving in Exchange: How to beat its limitations with a successful strategy
sponsored by Metalogix
EGUIDE: Discover how to successfully overcome the limitations of native Exchange 2010 archiving tools in this expert e-guide. Plus, gain insight into the key considerations to keep in mind when creating a smart email retention strategy.
Posted: 14 Jun 2012 | Published: 14 Jun 2012

Metalogix
101 - 125 of 254 Matches Previous Page    3 4 5 6 7 8    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement