Business of Information Technology  >   Business Processes  >   Business Communications  >  

Email

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: e-Mail (Communications), Email (Communications), e-mail, Electronic Mail, Electronic Mail (Communications)
DEFINITION: E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. (Some publications spell it email; we prefer the currently more established spelling of e-mail.) E-mail messages are usually encoded in ASCII text. However, you can also send non-text files, such as graphic images and sound files, as attachments sent in binary streams. E-mail was one of the first uses of  … 
Definition continues below.
Email Reports
51 - 75 of 262 Matches Previous Page  |  Next Page
Microsoft Office 365: Strengthening Security, Compliance, and Control
sponsored by Mimecast
WHITE PAPER: This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
Posted: 12 Jun 2014 | Published: 20 Feb 2014

Mimecast

Prevent Data Breaches with Stronger Email Security
sponsored by Threat Track Security
WHITE PAPER: This white paper outlines the importance of implementing email security within your company.  Educating employees and maintaining security measures will help fight cybercrime.
Posted: 05 Jun 2014 | Published: 05 Jun 2014

Threat Track Security

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Take Control of Your PST Problem
sponsored by Dell Software
WHITE PAPER: Find out best practices for migrating PST file data to a more secure Exchange or Office 365 environment, and get suggestions for tools that can help ensure your migration is successful. Read the White Paper >>
Posted: 06 May 2014 | Published: 07 May 2013

Dell Software

Mastering Exchange Migrations: Controlling the Top 10 Critical Issues
sponsored by Dell Software
WHITE PAPER: This whitepaper details the top 10 Microsoft Exchange migration pain points and how you can avoid them.
Posted: 05 May 2014 | Published: 09 May 2013

Dell Software

Mobile App Demo: Securely Sharing Information on the Go
sponsored by CommVault
VIDEO: Check out this brief webcast to find out how this mobile app can help you take your work anywhere.
Posted: 06 Feb 2014 | Premiered: 29 Jul 2013

CommVault

Boosting storage performance: From Local Hard Drive to ioMemory
sponsored by Dell, Inc. and Fusion-io
CASE STUDY: This case study shows how a leading French web-hosting company  implemented ioMemory and scaled email services to support up to 10 million emails daily – quadrupling what they had before.
Posted: 28 May 2014 | Published: 28 May 2014

Dell, Inc. and Fusion-io

Consultants: How Can You Secure Your Information with Customers?
sponsored by GlobalScape
WHITE PAPER: This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.
Posted: 22 May 2014 | Published: 22 May 2014

GlobalScape

8 Point Plan to Eliminate PST Files
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores the importance of properly managing PST files when it comes to the majority of data-based IT projects. Gain insight on topics such as what causes PST file issues and an 8-step plan for PST elimination.
Posted: 20 May 2014 | Published: 20 May 2014

C2C Systems UK

A Guide to PST Files - How Managing PSTS will Benefit Your Business
sponsored by C2C Systems UK
WHITE PAPER: This whitepaper provides a complete guide to personal storage files.
Posted: 20 May 2014 | Published: 08 May 2013

C2C Systems UK

Product Review - C2C PST Enterprise
sponsored by C2C Systems UK
WHITE PAPER: The following white paper explores a solution that allows for businesses to bring the value of historical PST files back to the forefront within the Exchange or Office 365 environment. Learn how to configure and deploy this solution, how to avoid obstacles, and more.
Posted: 19 May 2014 | Published: 19 May 2014

C2C Systems UK

What to Know About Exchange 2013 and Load Balancing
sponsored by KEMP Technologies
WHITE PAPER: This whitepaper examines the changes in Exchange 2013, mainly focusing on load balancing and reverse proxy capabilities.
Posted: 14 May 2014 | Published: 14 May 2014

KEMP Technologies

Top 5 Reasons Why Focusing on Email is the Key to Successfully Enabling BYOD
sponsored by ZixCorp
WHITE PAPER: This expert resource details five reasons why you must include corporate email access to enable an effective BYOD policy.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

ZixCorp

Cloud Efficiencies and Hosted Email
sponsored by Apptix
EGUIDE: This whitepaper covers some information about cloud computing and dispels some myths about hosted Exchange email.
Posted: 25 Apr 2014 | Published: 25 Apr 2014

Apptix

Cisco Email Security
sponsored by Cisco
WHITE PAPER: This informative resource discusses how you can ensure the safety and security of your corporate email environment, detailing threats you should prepare for and tools you can use to mitigate them.
Posted: 23 Apr 2014 | Published: 22 Apr 2014

Cisco

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Cisco

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Mitigating Email Virus Attacks
sponsored by Cisco
WHITE PAPER: Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.
Posted: 01 Apr 2014 | Published: 30 Jun 2013

Cisco

The Many Paths to Exchange 2013
sponsored by SearchExchange.com
EBOOK: While the benefits are appealing, an upgrade to the latest version of Exchange is a big step. The complexity of that migration will depend on your starting point and the thoroughness of your plan.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

SearchExchange.com

The Case for Hosted Exchange
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper details the value of outsourcing your email and Exchange and guide you through picking a partner.
Posted: 05 Mar 2014 | Published: 20 Oct 2013

Intermedia.Net

Discover How Mail Express Solves 2 of Your Biggest IT Headaches
sponsored by GlobalScape
WHITE PAPER: Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.
Posted: 04 Mar 2014 | Published: 31 Dec 2012

GlobalScape

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

24 Questions to Take the Migraine Out of Email Migration
sponsored by Intermedia.Net
WHITE PAPER: This whitepaper features 24 questions you should ask as you try to select a service provider to execute your Exchange migration to the cloud.
Posted: 10 Feb 2014 | Published: 10 Feb 2014

Intermedia.Net

The Master List of Email Delivery Terminology
sponsored by Dyn
WHITE PAPER: Email may seem simple – create content and send to your list – but there are many elements that go into a good email program. The Master List of Email Terminology helps shed light on the terms that you should know and what you should be implementing in your own program.
Posted: 07 Jan 2014 | Published: 31 Dec 2013

Dyn

Who’s Snooping on Your Email?
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos, Inc.
51 - 75 of 262 Matches Previous Page    1 2 3 4 5 6    Next Page
 
EMAIL DEFINITION (continued): …  the Internet and is still the most popular use. A large percentage of the total traffic over the Internet is e-mail. E-mail can also be exchanged between online service provider users and in networks other than the Internet, both public and private. E-mail can be distributed to lists of people as well as to individuals. A shared distribution list can be managed by using an e-mail reflector. Some mailing lists allow you to subscribe by sending a request to the mailing list administrator. A mailing list that is administered automatically is called a list server.E-mail is one of the protocols … 
Email definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement