Mail - News, Features, and Slideshows
Google is making progress developing a user-friendly tool for fully encrypting people's messages on their computers, with coding help from Yahoo and a transition to GitHub.
By Zach Miners | 17 December, 2014 10:07
As Office 365 continues to gain customers, migration tools to help them move into the cloud are becoming more popular. SkyKick already has a comprehensive service that consultants and resellers can use to manage all the steps of a migration, from estimating licence costs and choosing from the many different Office 365 plans to tracking down PST files on user PCs and moving data from file shares and old email systems into the cloud.
By Mary Branscombe | 19 November, 2014 00:02
Nearly all of Facebook's outbound notification emails are now encrypted while traveling the Internet, a collaborative feat that comes from the technology industry's push to thwart the NSA's spying programs.
By Jeremy Kirk | 20 August, 2014 03:03
Australians can now have digital messages from myGov forwarded to an Australia Post digital mailbox under a trial by the Department of Human Services.
By Adam Bender | 18 August, 2014 15:32
If you're one of Gmail's 193 million users worldwide, you probably rely on the service -- and its add-ons -- every day. Popular among users for its customization features, Google constantly adds to its arsenal of Labs and brings new features mainstream to simplify processes and save users time.
By Kristin Burnham | 25 January, 2011 07:36
Back in November 2010, Facebook announced plans for a "social inbox" -- a space that would serve as a hub for all communications that people use online or via mobile phones, ranging from text messages and chat messages to e-mail messages, too.
By Kristin Burnham | 12 January, 2011 10:25
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This whitepaper discusses the challenge of BYOD and how best-practice deployments help deliver on the business promise of mobility with integrated protection throughout the workplace. • Flexible, end-to-end security enables enterprises to speed adoption of transformative technologies for a competitive edge • If employees feel that security policies impede productivity or encroach on personal data, they look for work-arounds • Integrated solutions that avoid overlapping functionality and streamline management can help organizations maintain tight security and ensure compliance
- North Korea wants joint probe into Sony hack, warns of consequences if not
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack