Browse Definitions :
Definition

Gmail

Gmail (pronounced Gee-mail) is a free Web-based e-mail service that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages. The Gmail program also automatically organizes successively related messages into a conversational thread.

According to Google co-founder and president Larry Page, the company was inspired to create Gmail because of a user's letter complaining about problems with existing Web e-mail services, such as the constant need to delete messages to stay within storage limits, and the lack of any searching ability. The two largest Web e-mail providers, Yahoo and Microsoft, allow users four megabytes and two megabytes, respectively, for storing messages. Both services charge a fee for additional storage. Yahoo Mail provides a search capability; Microsoft's Hotmail service does not.

To make Gmail profitable, Google will sell advertising and deliver it to targeted users. The company's software will parse users' messages to determine advertising matches and will occasionally insert appropriate ads in e-mail messages. Some have raised concerns about privacy issues, and the intrusiveness of the ads. However, in a recent interview, Page insisted that there would be strict safeguards in place to protect user information, and that the ads would not be "annoying." Furthermore, although there will be some advertising within messages, the program will be free of more traditional advertising, such as banners or pop-up ads.

This was last updated in September 2005

Continue Reading About Gmail

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • identity provider

    An identity provider (IdP) is a system component that provides an end user or internet-connected device with a single set of ...

  • remote access

    Remote access is the ability for an authorized person to access a computer or network from a geographical distance through a ...

  • malware

    Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

SearchHealthIT
SearchDisasterRecovery
  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

SearchStorage
  • cold storage

    Cold storage is a computer system or mode of operation designed for the retention of inactive data.

  • tiered storage

    Tiered storage is a method for assigning different categories of data to various types of storage media to reduce overall storage...

  • secondary storage

    Secondary storage is persistent storage for noncritical data that doesn't need to be accessed as frequently as data in primary ...

Close