Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
EmailReports
26 - 50 of 208 Matches Previous Page  | Next Page
CommVault Edge™ Mobile App Demo: Sharing on the Go
sponsored by CommVault Systems, Inc.
WEBCAST: Check out this brief webcast to find out how this mobile app can help you take your work anywhere.
Posted: 06 Feb 2014 | Premiered: Jul 29, 2013

CommVault Systems, Inc.

Build your Sender Reputation in Four Steps
sponsored by Dyn
WHITE PAPER: Having trouble reaching your customers' inboxes? You might have a poor sender reputation. Similar to a credit score, sender reputations reflect how good or bad your sending habits are. If your reputation is lower than you'd like just follow these 4 easy steps to start hitting the inbox.
Posted: 07 Jan 2014 | Published: 31 Dec 2013

Dyn

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.

Technology Industry Survey 2014
sponsored by ComputerWeekly.com
RESOURCE: From CTOs to Software Developers, Enterprise Architects to digital entrepreneurs, this extensive report captures the opinions of people at the forefront of shaping what is next for our industry.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

You Can't Overlook End User Response Monitoring
sponsored by CA Nimsoft
WHITE PAPER: What is it that organizations are missing when trying to pinpoint network issues? Find out more in this resourceful white paper that unveils the importance of end user response monitoring.
Posted: 30 Sep 2013 | Published: 30 Sep 2012

CA Nimsoft

The Importance of Continuity in Office 365 Environments
sponsored by Mimecast
WHITE PAPER: Email downtime can translate to big losses for your business, especially in Microsoft Office 365 environments. This valuable report explains how implementing a continuity strategy can enable your users to continue working even when service is unavailable.
Posted: 14 Aug 2013 | Published: 30 Apr 2013

Mimecast

Business Reimagined
sponsored by ComputerWeekly.com
BOOK: Reimagining business is about waking up to a new environment based on technology that liberates rather than constrains, writes Dave Coplin.
Posted: 26 Jun 2013 | Published: 28 Jun 2013

ComputerWeekly.com

Information Security Breaches Survey 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Security breaches cost large businesses an average of £850,000, the 2013 Information Security Breaches Survey reveals.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

24 Questions to Take the Migraine Out of Email Migration
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper features 24 questions you should ask as you try to select a service provider to execute your Exchange migration to the cloud.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Intermedia.Net

The Master List of Email Delivery Terminology
sponsored by Dyn
WHITE PAPER: Email may seem simple – create content and send to your list – but there are many elements that go into a good email program. The Master List of Email Terminology helps shed light on the terms that you should know and what you should be implementing in your own program.
Posted: 07 Jan 2014 | Published: 31 Dec 2013

Dyn

Creating and Enforcing Email Security Policies
sponsored by OpenText
EGUIDE: This expert guide examines effective methods of instituting and enforcing email security policies, such as putting the rules in writing and creating penalties for policy violation.
Posted: 02 Dec 2013 | Published: 02 Dec 2013

OpenText

Bloomberg Personal Vault
sponsored by Bloomberg
WHITE PAPER: Access this white paper for an e-mail archiving solution that offers powerful search capabilities and improved archiving functions to reduce time spent trying to find specific historical messages.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

Bloomberg

Longline Phishing: A New Class of Advanced Phishing Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER: In this white paper, gain valuable information about longlining, the newest method in phishing attacks, and key recommendations for how to enhance your email security defense.
Posted: 28 Oct 2013 | Published: 31 Dec 2012

Proofpoint, Inc.

Best Practices: Dell Compellent Storage Center Microsoft Exchange Server 2010
sponsored by Dell, Inc.
WHITE PAPER: This comprehensive whitepaper serves as a best practice guideline when configuring and using Microsoft Exchange Server 2010.
Posted: 22 Oct 2013 | Published: 26 Jan 2012

Dell, Inc.

Marel guarantees MS Lync & SharePoint performances to reduce travel costs
sponsored by IPANEMA TECHNOLOGIES
WHITE PAPER: This case study take an in-depth look at how one manufacturing company was able to enhance their Microsoft Lync and SharePoint solutions to improve user experience and cut travel costs.
Posted: 27 Sep 2013 | Published: 27 Sep 2013

IPANEMA TECHNOLOGIES

BEYOND CLOUD...THE AGE OF THE CUSTOMER How the convergence of key tech trends is changing business forever
sponsored by IBM
EGUIDE: Explore how you can move your business beyond the cloud and into the way of future IT.
Posted: 13 Sep 2013 | Published: 13 Sep 2013

IBM

How Fax and Email Orders are Holding Your Business Back
sponsored by Esker Inc.
EBOOK: To avoidissues caused by fax and email sales orders, many savvy companies are turning to automation technologies for help. In this resource, discover how an automated order processing platform works, and discover the benefits you could experience from paperless order processing.
Posted: 28 Aug 2013 | Published: 28 Aug 2013

Esker Inc.

The New Phishing Attack: How to Avoid Taking the Bait
sponsored by Websense
WHITE PAPER: Can you tell the difference between legitimate emails and phishing attempts? Unfortunately, new phishing strategies can circumvent traditional email security defenses. This guide details where traditional approaches fall short, and outlines recommendations for email security success.
Posted: 13 Aug 2013 | Published: 07 Jun 2012

Websense

SMART Guidance for Notes Migrations Webinar
sponsored by BinaryTree
PRESENTATION: Watch this video to discover more about e-mail migration and what you can do in order to make your transition a success. Inside you’ll learn about managing migration, impacts of non-integration, and more.
Posted: 01 Aug 2013 | Published: 01 Aug 2013

BinaryTree

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
sponsored by IBM
CASE STUDY: This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

Case Study: US Airways
sponsored by Message Systems
CASE STUDY: In this case study, find out how US Airways maintained high levels of customer satisfaction with an automated messaging system.
Posted: 14 Jun 2013 | Published: 31 Mar 2013

Message Systems

Solution Overview: EMC VSPEX Proven Infrastructure for Virtualized Microsoft Exchange 2010
sponsored by FusionStorm
WHITE PAPER: This informative resource details how a consolidated and virtualized Exchange environment can satisfy the needs of a geographically distributed and mobile workforce.
Posted: 30 May 2013 | Published: 30 May 2013

FusionStorm

Understanding Hosted Exchange Options
sponsored by SearchExchange.com
EGUIDE: This expert handbook examines the pros and cons of on-premise vs. off-premise Exchange environments. Learn more about how to weigh hosted Exchange options, the key security considerations and why new Office 365 versions are emphasizing subscriptions.
Posted: 09 May 2013 | Published: 09 May 2013

SearchExchange.com

Comparing email archiving software with general archiving software
sponsored by Hewlett-Packard Company
EGUIDE: This expert E-Guide from SearchDataBackup.com differentiates between email-specific and general archiving solutions and explores features and benefits unique to each.
Posted: 02 May 2013 | Published: 02 May 2013

Hewlett-Packard Company

Mobile Security: Email is Your Biggest Risk
sponsored by TITUS
WHITE PAPER: In this white paper, you'll learn why proactive, purpose based mobile security solutions that focus on keeping e-mail secure are essential for your organization, and discover how you can start improving your own security posture today.
Posted: 02 May 2013 | Published: 31 Dec 2012

TITUS
26 - 50 of 208 Matches Previous Page    1 2 3 4 5    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement