Browse Definitions :

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

2D - MIC

  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information horizontally as one-dimensional barcodes do, as well as vertically.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • acceptable spam report rate - An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: [email protected]
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • call to action - A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.
  • call tree - A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate recovery, if necessary.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • challenge-response authentication - In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, programs or activities.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of unified communications as a service (UCaaS) that offers voice communication services through a third-party host.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • corporate email policy - A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment.
  • CUSeeMe - CUseeMe is a low-cost product for Internet videoconferencing.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Active Directory Domain Services and promotes domain controllers.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • DirSync (Windows Azure Active Directory Sync) - DirSync (Directory Synchronization) is a tool for making copies of a local directory in a hybrid cloud deployment of Microsoft Exchange.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • discovery mailbox - A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distribution list - In e-mail applications, a distribution list is a group of mail recipients that is addressed as a single recipient.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • e-mail reflector - An e-mail reflector is a program that acts as the forwarding broadcaster of e-mail messages to the names on a distribution list.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • edge transport server - Edge transport server is an Exchange Server 2010 role that helps route Internet email as well as protect the Exchange organization from viruses and spam.
  • email - Email (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • email archiving - Email archiving is a systematic approach to saving and protecting the data contained in emails to enable fast retrieval.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, also known as junk email, refers to unsolicited email messages, usually sent in bulk to a large list of recipients.
  • email virus - An email virus consists of malicious code distributed in email messages to infect one or more devices.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • file allocation table (FAT) - A file allocation table (FAT) is a table that an operating system maintains on a hard disk that provides a map of the clusters (the basic units of logical storage on a hard disk) that a file has been stored in.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • flash rob (flash robbery) - A flash rob (or flash robbery) is a crime in which a large group of people - usually teenagers - converges to steal items from a store and then disperses as suddenly as they gathered.
  • freemail - Freemail is a service that provides free e-mail delivery to anyone in exchange for exposure to advertising on the site where you request your e-mail and, in some cases, for some personal information.
  • geo-marketing - Geo-marketing is a tool that uses geographic, or location-based, information to help companies put together marketing strategies and campaigns.
  • Gmail - Gmail (pronounced Gee-mail) is a free Web-based e-mail service that provides users with a gigabyte of storage for messages and provides the ability to search for specific messages.
  • Google+ (Google Plus) - Google+ (pronounced Google plus) is Google's social networking platform.
  • grawlix - A grawlix is a sequence of typographical symbols used to represent a non-specific, profane word or phrase.
  • greylist (or graylist) - A greylist (also spelled graylist) is a list of e-mail addresses or domain names that a spam filter uses to identify suspected spam.
  • Group Policy - Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers.
  • Groupon - Groupon is a marketing service that offers its subscribers daily discount coupons by email, Facebook and Twitter feeds.
  • hard bounce - A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid.
  • HipChat - Atlassian HipChat allows employees to collaborate, work as teams and manage goals, all in real time, whether they work in the same office building or are located around the world.
  • hub transport server (HT server) - Hub transport server is an Exchange Server role that handles all mail flow within an Exchange organization.
  • IceWarp - IceWarp is email and collaboration software that combines email, SMS, instant messaging (IM), voice and video communications into one package secured with 256bit AES encryption.
  • ILOVEYOU virus - The ILOVEYOU virus comes in an email with 'ILOVEYOU' in the subject line and contains an attachment that, when opened, results in the message being re-sent to everyone in the recipient's Microsoft Outlook address book.
  • IMAP (Internet Message Access Protocol) - Internet Message Access Protocol, or IMAP, is a standard email retrieval (incoming) protocol.
  • IMAP migration (Internet Message Access Protocol migration) - IMAP migration transfers mailbox content from an existing Exchange server to later versions of Exchange, Exchange Online and Office 365.
  • IMHO (in my humble opinion) - Like FYI (for your information), IMHO (in my humble opinion) is an abbreviation for a phrase sometimes used in online chatting and e-mail.
  • impact-based advertising - What is impact-based advertising?Impact-based advertising is a form of advertising designed to have a lasting psychological effect on viewers so they will remember the product or vendor.
  • implied consent - Implied consent is an assumption of permission to do something that is inferred from an individual's actions rather than explicitly provided.
  • inbound call - An inbound call is one that a customer initiates to a call center or contact center.
  • Inbox Zero - Inbox Zero is a rigorous approach to email management aimed at keeping the inbox empty -- or almost empty -- at all times.
  • initialization vector (IV) - An initialization vector (IV) is an arbitrary number that can be used along with a secret key for data encryption.
  • instant messaging - Instant messaging, often shortened to IM or IM'ing, is the exchange of near real-time messages through a standalone application or embedded software.
  • interconnection - Interconnection is a strategy for ensuring that businesses can privately, securely and directly exchange digital information.
  • list server (mailing list server) - A list server (mailing list server) is a program that handles subscription requests for a mailing list and distributes new messages, newsletters, or other postings from the list's members to the entire list of subscribers as they occur or are scheduled.
  • mail bomb - A mail bomb is the sending of a massive amount of e-mail to a specific person or system.
  • mail server (mail transfer/transport agent, MTA, mail router, internet mailer) - A mail server -- also known as a mail transfer agent, or MTA; mail transport agent; mail router; or internet mailer -- is an application that receives incoming email from local users and remote senders and forwards outgoing messages for delivery.
  • Majordomo - Like listserv, Majordomo (from Latin: "master of the house") is a small program that automatically redistributes e-mail to names on a mailing list.
  • MAPI (Messaging Application Program Interface) - MAPI (Messaging Application Program Interface) is a Microsoft Windows program interface that enables you to send e-mail from within a Windows application and attach the document you are working on to the e-mail note.
  • MAPI over HTTP (Messaging Application Programming Interface over HTTP) - MAPI over HTTP is the default transport protocol to connect clients to Microsoft Exchange and Exchange Online.
  • messaging - In general, messaging (also called electronic messaging) is the creation, storage, exchange, and management of text, images, voice, telex, fax, e-mail, paging, and Electronic Data Interchange (EDI) over a communications network.
  • messaging server - A messaging server is a middleware program that handles messages that are sent for use by other programs using a messaging application program interface (API).
SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
Close