Standards  >   Messaging Protocols  >  

Post Office Protocol

RSS Feed   
Post Office Protocol Reports
 
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Bringing System Management to Messaging & Collaboration
sponsored by ComputerWeekly.com
ANALYST REPORT: The fast growing interaction between email, collaboration and social media is creating new management pressures. Analysts Bernt Ostergaard and Clive Longbottom offer answers in this paper from Quocirca.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

ComputerWeekly.com

The Open Group - Cloud Computing guide to interoperability and portability
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide from the Open Group offers advice to businesses on how to avoid supplier "lock-in" when you move data into the cloud.
Posted: 05 Jul 2013 | Published: 05 Jul 2013

ComputerWeekly.com

Virtualization Roadmap: Twists, Turns, and Key Considerations
sponsored by Dell, Inc. and Intel®
PRESENTATION TRANSCRIPT: This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Dell, Inc. and Intel®

Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER: This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996

Texas Instruments, Inc.

IT Decision Checklist: Antimalware
sponsored by ESET
EGUIDE: Companies face complicated buying decisions when it comes to buying host-based antimalware, starting with whether to purchase a protection suite, and what to include in that all-in-one package. Read this paper to find out more.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

ESET

Application Discovery Tool
sponsored by Sophos
TRIAL SOFTWARE: With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.
Posted: 16 Apr 2009 | Published: 29 Feb 2008

Sophos

From Development to Production: Streamlining SharePoint Deployment with DocAve® Deployment Manager
sponsored by AvePoint, Inc.
WHITE PAPER: This document examines the capabilities of DocAve Deployment Manager and offers tips and guidance to help streamline the SharePoint deployment process while maintaining the integrity of all SharePoint staging instances.
Posted: 06 Mar 2009 | Published: 06 Mar 2009

AvePoint, Inc.

Demystifying IT Network Cabling Specifications from 5e to 7A
sponsored by Siemon Company
WHITE PAPER: This paper discusses the current state of copper-based network cabling standards as defined by ISO and TIA. Learn the difference between category 5e, 6, 6A, 7 and 7A and Class D, E, EA, F and FA.
Posted: 20 Aug 2007 | Published: 01 Aug 2007

Siemon Company

Presentation Transcript: Microsoft Exchange Server: To Host or Not to Host?
sponsored by Intermedia
PRESENTATION TRANSCRIPT: This webcast presentation transcript reviews the pros and cons of a hosted messaging approach for an Exchange environment. Hosted offerings can help shrink IT budgets, but there are many things to consider for optimal results for your unique company.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Intermedia
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info