Browse Definitions :
Definition

MAPI (Messaging Application Program Interface)

Contributor(s): Maureen Bonnes

MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note. Applications that take advantage of MAPI include word processors, spreadsheets, and graphics applications. MAPI-compatible applications typically include a Send Mail or Send in the File pulldown menu of the application. Selecting one of these sends a request to a MAPI server.

MAPI consists of a standard set of C language functions that are stored in a program library known as a dynamic link library (DLL). Developers who are using Microsoft's Active Server Page (ASP) technology access the MAPI library by using Microsoft's Collaboration Data Objects (CDO). The CDO library comes with Microsoft's Internet Information Server (IIS). MAPI functions can be accessed by Visual Basic developers through a Basic-to-C translation layer.

Eudora, one of the most popular e-mail programs, includes a MAPI server. To activate the Eudora MAPI server, select Options from the Tools pulldown menu and then double-click on MAPI and specify whether MAPI should always be active or whether it should be active only when Eudora is running. Microsoft Exchange and possibly some other programs may require that you turn the MAPI server off when they are in use.

This was last updated in September 2005

Continue Reading About MAPI (Messaging Application Program Interface)

Join the conversation

3 comments

Send me notifications when other members comment.

Please create a username to comment.

Thanks for this app
Cancel
Microsoft Windows provides messaging functions sending receiving addresses along with storing messages
Cancel
Is there any java code for MAPI protocol through which we can connect to Exchange server?
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close