Browse Definitions:
Reference

Messaging and Email Learning Guides

We've gathered a collection of our learning guides and tutorials on messaging and email-related topics. You'll find administration tips, and information about application integration, backup and recovery, and dealing with spam -- among other topics. Then see below, our messaging and email-related quizzes and our larger collection of resources.

Need more basic information before you get started? See our definitions for email, instant messaging, malware and spam.

 

Messaging and Email Learning Guides:

  • 30 LotusScript Tips -- These 30 tips came from a presentation by Bill Buchan, CEO of HADSL. HADSL develops best-practice tools for Lotus Notes and Domino.

  • @DBLookup Lessons -- This resource explains @DBLookup capabilities and common errors. Also included: how to code faster lookups for Lotus Notes and Domino.

  • Ajax for Lotus Notes Domino -- This collection of resources will help you learn to work effectively with Ajax in a Domino environment.

  • Digital certificates for Lotus Notes and Domino -- These resources show how Lotus Notes certificates and Internet certificates work in a Domino Server environment. Also included: Managing certificates and certificate authorities for the best security and validation.

  • Domino Directory Management Tips and Tutorials -- Topics include configuring and customizing the Domino Directory, backing it up and synchronizing it with another directory.

  • Domino Domain Monitoring -- These resources will help you understand DDM architecture and functionality and evaluate it as a Notes/Domino monitoring and administration tool.

  • Domino, Java and J2EE -- See this Domino, Java and J2EE Developer University section to learn about all three.

  • Domino and WebSphere Integration -- Get a fast reference on using Domino and WebSphere together.

  • Exchange Backup and Recovery -- Use this collection of resources to expand your knowledge of Exchange Server backup and recovery.

  • Exchange Public folders -- These resources explain Exchange public folder management and troubleshooting.

  • Fighting Spam on Exchange Server -- This learning guide helps arm you to combat unsolicited email in your Exchange Server environment.

  • Exchange Server Email Compliance -- Get the essentials of Sarbanes-Oxley Act (SOX), HIPAA and other important federal regulations and learn how to plan and set up archiving policies and shop for and implement email-compliance tools.

  • Exchange Server Performance -- This guide covers Exchange Server performance, best practices and pitfalls and also provides troubleshooting help and advice.

  • Exchange Migration -- This collection of resources offers articles, tutorials, tips, tools, white papers, expert advice on Exchange Server migration.

  • Formula Language -- These resources include Formula language articles, tutorials, tips, tools, white papers, as well as expert advice.

  • How to install Lotus Notes on Linux CentOS-4 -- It may be a little complex but this guide will walk you through the process.

  • Importing Data into Notes -- Learn how to import data into Lotus Notes -- without programming.

  • iNotes and Domino Web Access Administration Guide -- This guide offers help for Lotus Notes/Domino administrators trying to manage and troubleshoot iNotes and DWA.

  • Instant Messaging in the Enterprise -- IM in the enterprise can be a blessing or a curse. Learn to manage it with this guide.

  • Lotus Formula Language Coding Primer -- This guide explains the basics of the Formula language -- from retrieving lists of values in a Lotus Notes database, through processing documents to opening a database and starting an agent.

  • Lotus Notes .ini Tips and Tutorials -- This collection of resources explains management of Domino server tasks and parameters through the notes.ini file.

  • Lotus Notes Domino 8 -- These resources describe elements of ND8.

  • Lotus Notes Domino Access Control Lists (ACLs) -- Use these resources to enhance your Lotus Notes Domino ACL knowledge and learn how to secure user permissions in the Notes/Domino environment.

  • Lotus Notes Domino Server Backup and Recovery -- Included here are best practices and methods for simplifying and improving backup and recovery operations. Also: how to troubleshoot common issues.

  • Lotus Notes Domino Server Clustering -- These resources offer best practices for running a Lotus Domino server cluster.

  • Lotus Sametime 7.5 -- Learn about Lotus Sametime 7.5 collaboration capabilities. Also: How to build Sametime plug-ins using the Eclipse framework.

  • Notes.ini Tips and Tutorials -- Learn how to handle Domino server tasks and parameters through the notes.ini file.

  • Outlook Web Access Administration -- This guide was designed to help Exchange Server administrators manage and troubleshoot OWA. Includes: mailbox management and security, password management and authentication.

  • Project Guide: Email Security -- This guide covers how to implement various email security options, securing systems against malware and choosing among email security appliances.

  • SharePoint & Exchange 2007 -- This guide explains enabling Exchange email for SharePoint document libraries and lists and relaying reports and alerts by email from SharePoint to Exchange. Also includes a solid overview of the Exchange Server 2007 architecture and outline important server-role topology deployment requirements and scenarios.

  • Spam and E-mail Marketing -- Learn how spam affects email marketing campaigns and get advice to ensure that your messages aren't considered junk email. 

  • Project Guide: Unified Threat Management -- Become an expert on UTM implementation, device management, vendors and products.

 

Want more messaging and email-specific info? See our messaging and email quizzes, our messaging and email-related definitions or the resources on SearchExchange.com

We've got lots more information for you! Check out the full collection of Learning Guides and Tutorials to learn essential information on a wide range of subjects. You'll find guides and tutorials about networking, backup and recovery, and a wide range of other topics, including databases, business intelligence, programming and much more. Also see: Our Favorite Cheat Sheets

Would you like to test your knowledge of other IT topics? See our huge collection of quizzes.

This was last updated in June 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

Extensions de fichiers et formats de fichiers

Motorisé par:

SearchCompliance

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

  • conduct risk

    Conduct risk is the prospect of financial loss to an organization that is caused by the actions of an organization's ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

  • telemedicine

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close