Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
51 - 75 of 265 Matches Previous Page  |  Next Page
Best Practices for Migrating Email to Office 365
sponsored by Dell Software
WHITE PAPER: This white paper examines key migration practices that can help ensure a complete, seamless transition to Exchange 2013 and Office 365.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Dell Software

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Key Considerations in Moving to Microsoft Office 365
sponsored by Mimecast
WHITE PAPER: This exclusive white paper offers up four crucial considerations to ensure a smooth transition to Office 365 and to allow for the same level of administration, security, and message hygiene you had with your on-premises implementation.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by Commvault
WHITE PAPER: This resource lists the top seven reasons you may need to worry that your email archiving strategy won't meet your long-term goals.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Commvault

Automating Information Governance - assuring compliance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from AIIM takes an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

ComputerWeekly.com

Top 5 Reasons You Should Dump Your In-House Email Infrastructure
sponsored by Message Bus
EGUIDE: Access this expert e-guide to find 5 reasons why you should dump your in-house email infrastructure.
Posted: 18 Feb 2015 | Published: 18 Feb 2015

Message Bus

Improving the Success of Your Enterprise's Email Marketing Campaigns
sponsored by Teradata
WHITE PAPER: This document outlines some of the standard best practices that can enhance email communications, including: segmentation, personalization, mobile optimization, and landing pages. It also includes mistakes to avoid to increase customer loyalty and nurture incoming leads.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

Teradata

5 Reasons Why Email Archiving is the New Killer App
sponsored by Commvault
WHITE PAPER: Businesses use many applications every day, but one is used most frequently – email. This expert white paper details the top 5 reasons why email archiving is the most important application.
Posted: 31 Dec 2014 | Published: 01 Nov 2013

Commvault

Email Archiving: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Email is not only the primary source of business communication, it also stores valuable data. This white paper details a helpful email archiving buyer's guide checklist.
Posted: 26 Dec 2014 | Published: 26 Dec 2014

Commvault

Secure Mobile Email for the Lean IT Department
sponsored by Shavlik Technologies
WHITE PAPER: This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Shavlik Technologies

Everything You Need to Know about Enterprise Mobility Management
sponsored by CA Technologies.
EBOOK: Enterprise mobility management (EMM) strategies encompass several challenging problems for IT. From meeting the ever-increasing demands of end-users and the mobile devices they own, to security and threat risks, there is a lot to know about EMM.
Posted: 18 Sep 2014 | Published: 11 Sep 2014

CA Technologies.

Improve Enterprise Email Systems with HP Messaging Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.
Posted: 04 Sep 2014 | Published: 30 Apr 2013

Hewlett-Packard Enterprise

Voltage Success Story: Envision Pharmaceutical Services
sponsored by Voltage Security, Inc.
WHITE PAPER: This case study features Envision Pharmaceutical Services' experience with an easy-to-use, low-cost email platform that ensured secure data sharing and helped maintain HIPAA and PCI DSS compliance.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Voltage Security, Inc.

Personally Identifiable Information (PII) and Personal Health Information (PHI)
sponsored by Voltage Security, Inc.
WHITE PAPER: This white paper features an encrypted email solution that eliminates the need for paper-driven information sharing processes, and ensures secure, compliant transfers.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Voltage Security, Inc.

Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

Consultants: How Can You Secure Your Information with Customers?
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

What to Know About Exchange 2013 and Load Balancing
sponsored by KEMP Technologies
WHITE PAPER: This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Find out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.
Posted: 05 May 2014 | Published: 09 May 2013

Dell Software

Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
sponsored by ZixCorp
WHITE PAPER: This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

ZixCorp
51 - 75 of 265 Matches Previous Page    1 2 3 4 5 6    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement