Browse Definitions :
Definition

voicemail

Contributor(s): Stan Gibilisco

Voicemail is a method of storing voice messages electronically for later retrieval by intended recipients. Callers leave short messages that are stored on digital media (or, in some older systems, on analog recording tape).

Originally, voicemail was developed for telephony as a means to prevent missed calls, and also to facilitate call screening. In recent years, voicemail has become integrated with the Internet, allowing users to receive incoming messages on traditional computers as well as on tablets and mobile phones.

Microsoft Exchange is a popular platform for voicemail with desktop and notebook computers. Users can play their voicemail messages either as audio (Mp3) or as text. In order to play a voicemail or read it as text, the user simply clicks on an inbox item, just as would be done with an ordinary e-mail message.

One particularly interesting development is the integration of voicemail with e-mail. Google Voice, for example, can translate voice messages into text for viewing on mobile and tablet devices. Google Voice also allows free or low-cost worldwide texting. Users can set up custom greetings for various callers. Address books can be shared across multiple platforms such as e-mail, a landline phone, and a mobile phone. Google Voice and similar applications work in effect like voice-enabled e-mail in reverse.

Proponents of voicemail-to-text, voice-enabled e-mail, and unified messaging assert that these applications have largely dissolved the barriers between data networks and traditional voice networks.

This was last updated in December 2012

Continue Reading About voicemail

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

i received strange voice mail
aumsejtania@gmail.com
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close