Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
EmailReports
201 - 225 of 240 Matches Previous Page  | Next Page
eGuide: Expert Tips for Deploying Secure Messaging Technologies
sponsored by SearchSecurity.com
WHITE PAPER: This eGuide discusses the critical importance of securing these messaging systems and looks at various methods for protecting the information that is transmitted via these technologies.
Posted: 24 Oct 2008 | Published: 22 Oct 2008

SearchSecurity.com

Exchange 2007: In-house vs. Hosted - 5 Myths Debunked
sponsored by Intermedia
WEBCAST: In this Webinar, we explore the details of an Exchange 2007 migration and some of its most common ecosystem components, and how that deployment differs between an on-premise and a hosted solution.
Posted: 16 Dec 2008 | Premiered: Dec 16, 2008

Intermedia

Web Security Solutions
sponsored by Websense, Inc.
WHITE PAPER: Read this whitepaper to learn ways to implement industry-leading URL filtering with extensive security capabilities that continuously watch the organization's assets for malicious activity and prevent them from being used in fraudulent attacks.
Posted: 19 Nov 2008 | Published: 19 Nov 2008

Websense, Inc.

Security Threat Report: July 2008
sponsored by Sophos, Inc.
WHITE PAPER: This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today's increasingly covert threats.
Posted: 13 Nov 2008 | Published: 13 Nov 2008

Sophos, Inc.

Total E-mail Security
sponsored by Sunbelt Software
WHITE PAPER: Malware is becoming ever more sophisticated every day. Only through effective tools that incorporate fast responses against all categories of malware will organizations be able to maintain the health of their critical business systems.
Posted: 11 Nov 2008 | Published: 11 Nov 2008

Sunbelt Software

Podcast: Cutting Infrastructure Costs by Stopping Unwanted Mail at the Perimeter: Introduction to Stopping Unwanted Mail
sponsored by Sendmail, Inc.
PODCAST: This new Ask the Expert podcast series focuses on how businesses can significantly cut costs by modernizing their messaging infrastructure and stopping unwanted mail from ever touching it.
Posted: 03 Nov 2008 | Premiered: Oct 31, 2008

Sendmail, Inc.

An Architectural Framework for Enterprise Email Infrastructure & Security: Getting It Right Today, Getting Ready for Tomorrow
sponsored by Sendmail, Inc.
WHITE PAPER: This white paper examines the architecture limitations prevalent in today's large-enterprise email networks.
Posted: 22 Oct 2008 | Published: 22 Oct 2008

Sendmail, Inc.

Siemens Mobile UC - Where UC Meets Enterprise Mobility
sponsored by Siemens Enterprise Communications
WHITE PAPER: In response to increased employee mobility, companies are developing Unified Communications (UC) strategies and implementing UC solutions to enable a global work focus and ease employee communications problems.
Posted: 14 Oct 2008 | Published: 14 Oct 2008

Siemens Enterprise Communications

Seven Email Marketing Refreshes
sponsored by Bronto Software
WHITE PAPER: This whitepaper will detail seven key points that will help you quickly enhance your email-marketing program. You may also find some low hanging opportunities that you weren't aware you were missing.
Posted: 06 Oct 2008 | Published: 04 Oct 2008

Bronto Software

Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Juniper Networks, Inc.

Storage and Virtualization: Options for Smaller Environments
sponsored by Dell, Inc.
WHITE PAPER: This document is based on a Dell/TechTarget webcast entitled "Storage and Virtualization: Options for Smaller Environments."
Posted: 03 Oct 2008 | Published: 03 Oct 2008

Dell, Inc.

BlackBerry Device Software v4.5
sponsored by BlackBerry
TRIAL SOFTWARE: Upgrading to BlackBerry® Device Software v4.5 opens up a whole new world of features and functionality.
Posted: 01 Oct 2008 | Premiered: 01 Oct 2008

BlackBerry

Managing the Chargeback Life Cycle
sponsored by SAP America, Inc.
PRODUCT LITERATURE: The SAP Paybacks and Chargebacks application by Vistex allows manufacturers and distributors to manage the entire chargeback process life cycle, from claim initiation and receipt through adjudication, accrual, settlement, and post settlement adjustment.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Mobility as a Service: Best Practices for Managing Mobile Work
sponsored by Fiberlink Communications
WHITE PAPER: Fiberlink Communications studied the challenges of mobile computing as well as the best practices for the management, control and operations of a mobile platform.
Posted: 15 Sep 2008 | Published: 15 Mar 2008

Fiberlink Communications

Seven Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: Read this paper to learn the seven secrets to 24x7, disaster-tolerant Exchange and get step-by-step tips on how to implement an Exchange environment with zero lost data and continuous application availability.
Posted: 10 Sep 2008 | Published: 10 Sep 2008

Marathon Technologies

Blackberry Enterprise Server v4.1 Service Pack 6
sponsored by BlackBerry
WEBCAST: The BlackBerry Enterprise Solution provides push-based access to email; calendar, contacts, tasks and notes; instant messaging; web-based applications and services and enterprise applications.
Posted: 25 Aug 2008 | Premiered: Aug 25, 2008

BlackBerry

How Do You Score? Silverpop's Benchmark Study of B2B Lead Management Practices
sponsored by Vtrenz, Inc
WEBCAST: Listen to this webinar and learn how to grab a peek at your competitors marketing results. It also discusses lead growth, form completion rate, email performance metrics, channels, and best practices.
Posted: 20 Aug 2008 | Premiered: Aug 20, 2008

Vtrenz, Inc

From Cold to Hot: Lead Nurturing Programs That Generate Sales
sponsored by Vtrenz, Inc
WHITE PAPER: This white paper explains the importance of lead nurturing–in the lead management process. It discusses best practices for nurturing leads in today's competitive business environment, and offers advice for implementing a lead-nurturing program.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Vtrenz, Inc

Why Most Organizations Miss User Response Monitoring - and What to Do about It
sponsored by Nimsoft, Inc.
WHITE PAPER: This guide explains the challenges of user response monitoring and how to overcome these challenges. It also teaches you how to get a real handle on infrastructure performance and shows you how it will impact user experience.
Posted: 15 Aug 2008 | Published: 15 Aug 2008

Nimsoft, Inc.

8 Seconds to Capture Attention: Silverpop's Landing Page Report
sponsored by Silverpop Systems Inc.
WHITE PAPER: It's estimated that up to 50 percent of visitors to landing pages will bail in the first eight seconds. This evaluation explains how putting more effort on nurturing recipients once they hit those landing pages would be time and money well spent.
Posted: 08 Aug 2008 | Published: 01 Jan 2007

Silverpop Systems Inc.

That Was Then This Is Now: The New Rules of Email Marketing
sponsored by Silverpop Systems Inc.
WHITE PAPER: In this new era of CAN-SPAM legislation, overflowing inboxes and ever-increasing customer expectations, many of the practices that worked for emailers in the past simply won't work anymore. This paper reviews the new rules of email marketing.
Posted: 08 Aug 2008 | Published: 01 Jan 2004

Silverpop Systems Inc.

Cost-effective Data Protection for Microsoft Windows Environments
sponsored by Zmanda Inc.
WHITE PAPER: This whitepaper discusses the challenges of protecting Microsoft Windows files, databases, and email applications within a heterogeneous IT environment; and demonstrates how Amanda Enterprise, combined with its clients and agents.
Posted: 01 Aug 2008 | Published: 01 Aug 2008

Zmanda Inc.

Protecting Essential Information: Securing the Foundation of the Internet Business Platform
sponsored by Websense, Inc.
WHITE PAPER: Today's threats use Web 2.0 to integrate daily operations which has changed the requirements for web security, email security and data loss prevention. Download this white paper to learn more.
Posted: 31 Jul 2008 | Published: 01 Jul 2008

Websense, Inc.

Telephone Reliability for Alarm Notification: Where Have All the Landlines Gone?
sponsored by Sensaphone
WHITE PAPER: This paper discusses why timely and reliable alarm notification is part of a successful remote monitoring program and discusses the factors to consider when selecting a remote monitoring system.
Posted: 17 Jun 2008 | Published: 17 Jun 2008

Sensaphone

e-Book: Chapter 3 - Litigation Holds: How Windows Shops Can Reduce Risk with a Successful Litigation Hold Process
sponsored by Symantec Corporation
BOOK: The creation of an effective litigation hold process and procedures provides the foundation for a prepared approach to e-discovery and litigation readiness.
Posted: 09 Jun 2008 | Published: 07 Jun 2008

Symantec Corporation
201 - 225 of 240 Matches Previous Page    7 8 9 10    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement