Browse Definitions :
Definition

voicemail

Contributor(s): Stan Gibilisco

Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients. Callers leave short messages that are stored on digital media (or, in some older systems, on analog recording tape).

Originally, voicemail was developed for telephony as a means to prevent missed calls, and also to facilitate call screening. In recent years, voicemail has become integrated with the Internet, allowing users to receive incoming messages on traditional computers as well as on tablets and mobile phones.

Microsoft Exchange is a popular platform for voicemail with desktop and notebook computers. Users can play their voicemail messages either as audio (MP3) or as text. In order to play a voicemail or read it as text, the user simply clicks on an inbox item, just as would be done with an ordinary e-mail message.

One particularly interesting development is the integration of voicemail with e-mail. Google Voice, for example, can translate voice messages into text for viewing on mobile and tablet devices. Google Voice also allows free or low-cost worldwide texting. Users can set up custom greetings for various callers. Address books can be shared across multiple platforms such as e-mail, a landline phone, and a mobile phone. Google Voice and similar applications work in effect like voice-enabled e-mail in reverse.

Proponents of voicemail-to-text, voice-enabled e-mail, and unified messaging assert that these applications have largely dissolved the barriers between data networks and traditional voice networks.

This was last updated in December 2012

Continue Reading About voicemail

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

i received strange voice mail
aumsejtania@gmail.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • California Consumer Privacy Act (CCPA)

    The California Consumer Privacy Act (CCPA) is legislation in the state of California that supports an individual's right to ...

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

SearchSecurity

  • endpoint detection and response (EDR)

    Endpoint detection and response (EDR) is a category of tools and technology used for protecting computer hardware devices–called ...

  • ransomware

    Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is ...

  • single sign-on (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits an end user to enter one set of login credentials ...

SearchHealthIT

SearchDisasterRecovery

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

SearchStorage

  • blockchain storage

    Blockchain storage is a way of saving data in a decentralized network which utilizes the unused hard disk space of users across ...

  • disk mirroring (RAID 1)

    RAID 1 is one of the most common RAID levels and the most reliable. Data is written to two places simultaneously, so if one disk ...

  • RAID controller

    A RAID controller is a hardware device or software program used to manage hard disk drives (HDDs) or solid-state drives (SSDs) in...

Close