News

News

  • October 27, 2005 27 Oct'05

    Best Practice #3: Keeping e-mail in perspective

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #3: Keeping e-mail in perspective.

  • October 27, 2005 27 Oct'05

    Best Practice #4: Configuring server hardware for disaster recovery

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #4: Configuring server hardware for disaster recovery.

  • October 27, 2005 27 Oct'05

    Best Practice #5: Configuring Exchange for disaster recovery

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #5: Configuring Exchange for disaster recovery.

  • October 27, 2005 27 Oct'05

    Best Practice #2: Building your plan around the technology at hand

    Best Practices Checklist: Exchange Server disaster recovery planning, Best Practice #2: Building your plan around the technology at hand.

  • October 27, 2005 27 Oct'05

    Symantec making waves in mobile device security

    Symantec's pairing with Nokia and purchase of Sygate indicates that the security company is continuing to look for ways to protect devices and networks.

  • Sponsored News

    • Discovering the Business Value of Streaming Analytics

      With streaming analytics you can solve business problems in new ways and seize new revenue opportunities. You can reduce costs and increase efficiency while improving the safety of employees and the security of assets and intellectual property. See More

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Three Use Cases for Interactive Data Discovery and Predictive Analytics

      Interactive data discovery and predictive analytics technologies allow business users and analysts to identify important trends and relationships in data sets and drill down into questions from any angle. They also allow business users to collaborate with specialists to create, refine and select the best predictive models. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    View All Sponsored News
  • October 24, 2005 24 Oct'05

    Competing regulations clog road to compliance

    It's difficult for companies to cope with today's multitude of compliance regulations, but an expert at Information Security Decisions said security frameworks may be the answer.

  • October 24, 2005 24 Oct'05

    Five compliance questions to ask your CEO

    To avoid SOX trouble, every CIO should ask these five questions -- and every CEO should answer them.

  • October 17, 2005 17 Oct'05

    Symantec fixes 'critical' Veritas flaw

    Attackers could launch malicious code by exploiting a security hole in Veritas NetBackup servers and clients. But Symantec has released a fix.

  • October 13, 2005 13 Oct'05

    Managing recipients with Global Settings

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn to manage Exchange global settings, including internet messaging, Exchange Rich-Text format, message text word wrap, and mobile services ...

  • October 13, 2005 13 Oct'05

    Exchange Recipient Update Service and proxy addresses

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn about the primary functions of the Recipient Update Service and how to control the update Interval for a RUS instance.

  • October 13, 2005 13 Oct'05

    Managing recipients with system policies

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll strengthen your Exchange administrative skills by learning how to manage Exchange 2003 system policies in the Exchange System Manager.

  • October 13, 2005 13 Oct'05

    The Exchange server mailbox management service

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll discover the must-have Exchange mailbox management service cleans up users' folders for you. Follow these steps to set up recipient policies and automate ...

  • October 13, 2005 13 Oct'05

    Exchange security groups

    In the following tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn the ins and outs of Exchange security groups: why they're used, how to use them, and issues with mail-enabled Security groups. You'll also ...

  • October 13, 2005 13 Oct'05

    Exchange 2003 Query-Based Distribution Groups

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll learn everything you need to know about Query-based groups (QDGs), the new group type introduced by Exchange 2003.

  • October 13, 2005 13 Oct'05

    Exchange mail retention

    In this tip from "15 tips in 15 minutes: Managing recipients and distribution lists," you'll gain essential information on Exchange email retention, saving you a great deal of time. Learn how to recover a deleted mailbox, a deleted user ...

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close