Standards  >   Messaging Protocols  >  

Internet Mail Extensions

RSS Feed   
Internet Mail Extensions Reports
 
The Banking Industry Architecture Network and TOGAF
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This paper from the Open Group reveals how banks can benefit from combining complementary industry frameworks on enterprise architecture.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

ComputerWeekly.com

Communications Transformation as a Competitive Advantage
sponsored by Vonage
ANALYST REPORT: Every business is seeking more effective ways to compete in an increasingly global marketplace. One of the most prominent obstacles today is the manual process of communicating with customers, partners, and colleagues. In this Frost & Sullivan report, learn how an advanced communication technology can help give you a competitive advantage.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Vonage

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

Bringing System Management to Messaging & Collaboration
sponsored by ComputerWeekly.com
ANALYST REPORT: The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

ComputerWeekly.com

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Mobile Social Networking and the Next Generation of Handheld Devices
sponsored by BlackBerry
WHITE PAPER: This paper explains how social networking and the next generation of handheld devices will improve business decision-making through efficient, unified communications and location awareness.
Posted: 25 Feb 2009 | Published: 25 Feb 2009

BlackBerry

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Premiered: 29 Feb 2008

Sophos

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Presentation Transcript: Microsoft Exchange Server: To Host or Not to Host?
sponsored by Intermedia
PRESENTATION TRANSCRIPT: This webcast presentation transcript reviews the pros and cons of a hosted messaging approach for an Exchange environment. Hosted offerings can help shrink IT budgets, but there are many things to consider for optimal results for your unique company.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Intermedia
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info