mass mail

Results 1 - 12 of 12Sort Results By: Published Date | Title | Company Name
Published By: Adobe     Published Date: Mar 26, 2018
At 12:33 EDT on May 3, 1978, Gary Thuerk sent an email that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass email inviting recipients to one of two West Coast product demos for a new line of computers.1
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
Am 3. Mai 1978 um 12.33 Uhr New Yorker Ortszeit verschickte Gary Thuerk eine „Massen-E-Mail“, die ihn später als „Vater des Spam“ berühmt machen sollte – aus verständlichen Gründen bevorzugt er selbst eine Würdigung als „Vater des E-Marketing“.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 21, 2017
On 3 May 1978, Gary Thuerk sent an e-mail that later earned him the title “Father of Spam” (although understandably, he prefers to be called the “Father of E-marketing”). Thuerk, then a marketing manager for computer company Digital Equipment Corporation, sent a mass e-mail inviting recipients to one of two West Coast product demos for a new line of computers.
Tags : 
    
Adobe
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Published By: Gild     Published Date: Jun 10, 2015
Increase response rates, build relationships, and restore trust with candidates.
Tags : 
mass communications, recruiting email, candidates, response rates, relationship building, restore trust, human resources
    
Gild
Published By: Trend Micro     Published Date: May 03, 2018
Skills and resources — these are the two elements that make up an attacker’s arsenal. An attacker, however, cannot set out to break security or even perform sophisticated attacks without finding weak points in a system first. Massive malware attacks, email-borne heists, hacked devices, and disrupted services — all of these require a vulnerability in the network, whether in the form of technology or people, in order to be pulled off. Trend Micro has looked into the current and emerging threats, as well as the security approaches tailored for the landscape. Read on to find out how to make informed decisions with regard to the security focus areas that will figure prominently in 2018.
Tags : 
    
Trend Micro
Published By: Symantec.cloud     Published Date: Sep 28, 2010
Recently, a new worm, commonly known as "here you have" used old mass-mailer techniques to spread rapidly across the Internet, effectively shutting down the email servers of many large companies.
Tags : 
messagelabs, symantec hosted services, embedded links, worm, security, malware
    
Symantec.cloud
Published By: IBM     Published Date: Sep 10, 2009
You feel the same pressures to secure your data as a massive corporation does, but without the massive budget. This white paper gives an overview of next-generation data protection and recovery options designed and priced for small and mid-sized business.
Tags : 
ibm, data protection and recovery options, disaster recovery, application protection and recovery, e-mail object recovery, business continuity and resiliency
    
IBM
Published By: Sigstr     Published Date: Oct 18, 2017
The average American worker sends more than 10,000 emails each year - for a company of 500, that's more than 5 million emails sent from your domain. That's 5 million brand impressions and clickable calls-to-action you could be missing out on. Employee email signatures are a massive marketing channel you've been missing out on. Here are 28 creative email signature examples used by some of the world's leading brands.
Tags : 
    
Sigstr
Published By: Cisco     Published Date: Jan 16, 2014
With email at the heart of businesses, security is a top priority. Mass spam and malware campaigns are no longer the only email security concern. Today, they are one part of a complex picture that includes other inbound threats and outbound risks.
Tags : 
cisco, security, virus attacks, email security, malware
    
Cisco
Published By: Neolane, Inc.     Published Date: Sep 23, 2010
Mass mailing, mass emails or SMS blasts - ask any business to consumer(B2C) marketing professional what they think of them and they will probably tell you there's been a shift away from such indiscriminate approaches in favor of more targeted campaigns. And they'll tell you that the main reason for this shift is that customers are more demanding; asking to be recognized as individuals and expecting communications to be relevant to their unique lifestyles, wants and needs.
Tags : 
neolane, marketing fatigue, b2c, sms, email, mass mail, marketing
    
Neolane, Inc.
Published By: 4Retail     Published Date: Nov 19, 2009
If you find yourself under the burden of mass emails and wasting valuable time sifting through volumes of unnecessary information, read on to find out why you are not alone and how you can change your working practices by looking to alternative ways of communicating.
Tags : 
email overload, communication, document management, problem of spam, project management, global sourcing, global sourcing management, on demand collaboration solution
    
4Retail
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.