Browse Definitions :

Email and messaging

Terms related to email and messaging, including definitions about instant messenger and words and phrases about email servers, storage, spam and mobile access.

.TE - FOR

  • .Tel - .Tel is a top-level domain (TLD) intended for universal text naming and navigation in Internet-based communications.
  • 2D barcode (two-dimensional barcode) - A 2D (two-dimensional) barcode is a graphical image that stores information both horizontally -- as one-dimensional bar codes do -- and vertically.
  • A2P messaging (application to person messaging) - A2P messaging (application to person messaging), also known as enterprise or business SMS, is a type of SMS messaging technique where a text is sent from a software application run by an enterprise to a consumer's device.
  • acceptable spam report rate - An acceptable spam report rate is a metric set for how many of a company's marketing or status emails are reported as spam, also known as "junk mail," or unsolicited bulk messages sent through email.
  • anonymous email - Anonymous e-mail is e-mail that has been directed to a recipient through a third-party server that does not identify the originator of the message.
  • ArchiveSink - In a Windows environment, ArchiveSink is code that is activated through a defined trigger, such as the receipt of a new e-mail message, in order to archive messages coming in and out of an Exchange 2000 Server.
  • at sign (address sign or @) - On the Internet, @ (pronounced "at" or "at sign" or "address sign") is the symbol in an e-mail address that separates the name of the user from the user's Internet address, as in this hypothetical e-mail address example: msmuffet@tuffet.
  • auto attendant (automated attendant) - An automated attendant (AA) is a telephony system that transfers incoming calls to various extensions as specified by callers, without the intervention of a human operator.
  • Automatic Private IP Addressing (APIPA) - Automatic Private IP Addressing (APIPA) is a feature of Windows-based operating systems (included in Windows 98, ME, 2000, and XP) that enables a computer to automatically assign itself an IP address when there is no Dynamic Host Configuration Protocol (DHCP) server available to perform that function.
  • backscatter spam - Backscatter spam, also called misdirected bounce spam or NDR spam, is a strategy for sending unsolicited email messages that takes advantage of the fact that certain types of mail transfer agent (MTA) programs return the entire message to the sender when a recipient's email address is invalid.
  • bacn - Bacn (pronounced as "bacon") is Internet slang for email that a user wants to read, but not right away.
  • Bayesian filter - A Bayesian filter is a program that uses Bayesian logic, also called Bayesian analysis, to evaluate the header and content of an incoming e-mail message and determine the probability that it constitutes spam.
  • Bcc (blind carbon copy or blind courtesy copy) - In Eudora and perhaps other email facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • BlackBerry Enterprise Server (BES) - BlackBerry Enterprise Server (BES) is a middleware program that allows BlackBerry devices to access corporate messaging and collaboration software such as Microsoft Exchange, Lotus Domino and Novell GroupWise.
  • blackhole list (blacklist) - A blackhole list, sometimes simply referred to as a blacklist, is the publication of a group of ISP addresses known to be sources of spam, a type of e-mail more formally known as unsolicited commercial e-mail (UCE).
  • bluesnarfing - Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection.
  • bookmarklet - A bookmarklet is a JavaScript applet that runs directly in the browser.
  • bounce email (bounce mail) - Bounce e-mail (sometimes referred to as bounce mail) is electronic mail that is returned to the sender because it cannot be delivered for some reason.
  • buddy list - In instant messaging (IM) applications on a personal computer (PC), or on a cellular telephone with text display, a buddy list is a list of people a user wants to keep track of.
  • call to action - A call to action in marketing is an image, a line of text or a combination of the two that is aimed at encouraging readers, listeners or viewers to take the next step.
  • call tree - A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an event.
  • Canadian anti-spam legislation (CASL) - Canadian anti-spam legislation (CASL) is enacted regulations that require marketers and fundraisers that communicate through email, text messages or social media to obtain permission from recipients in that country.
  • CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) - A CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart) is a type of challenge-response system designed to differentiate humans from robotic software programs.
  • certified e-mail (authenticated e-mail or stamped e-mail) - Certified e-mail, also known as authenticated e-mail or stamped e-mail, is a system in which senders of commercial e-mail messages pay a small fee to ensure that their messages will bypass spam filters to reach intended recipients.
  • challenge-response authentication - In information security, challenge-response authentication is a type of authentication protocol where one entity presents a challenge or question, and another entity provides a valid response to be authenticated.
  • chat room - A chat room is a Web site, part of a Web site, or part of an online service such as America Online, that provides a venue for communities of users with a common interest to communicate in real time.
  • cleartext - Cleartext is transmitted or stored text that has not been subjected to encryption and is not meant to be encrypted.
  • Client Access Server (CAS) - The Client Access Server (CAS) is a server role for end user connectivity within the Exchange environment.
  • cloud telephony (cloud calling) - Cloud telephony, also known as cloud calling, is a type of Unified Communications as a Service (UCaaS) that offers voice communication services and connects through a third party host in the cloud.
  • cluster - In a computer system, a cluster is a group of servers and other resources that act like a single system and enable high availability and, in some cases, load balancing and parallel processing.
  • collaborative browsing (co-browsing) - Collaborative browsing (also known as co-browsing) is a software-enabled technique that allows someone in an enterprise contact center to interact with a customer by using the customer's Web browser to show them something.
  • commercial electronic message (CEM) - A commercial electronic message (CEM) is a communication soliciting business, funding or support for something that is sent through any electronic channel, including email, social media, voicemail, text and instant messages.
  • common short code (CSC) - Common short codes (CSC) are short telephone numbers, usually consisting of five digits, that are used to address SMS and MMS messages from cellular telephones.
  • communication portal - A communication portal is a service that allows individuals, businesses, schools and government agencies to share information from diverse sources using unified communications (UC) media.
  • communications-enabled business processes (CEBP) - Communications-enabled business processes (CEBP) is the integration of communications capabilities into software-enabled business procedures, applications and technologies.
  • contact center - A contact center -- also referred to as a customer interaction center or e-contact center -- is a central point from which all customer contacts are managed.
  • corporate email policy - A corporate email policy is a form of management that outlines how employees can use email and other electronic communication tools, such as instant messaging, in a corporate environment.
  • CrackBerry - CrackBerry is a nickname for the BlackBerry handheld device.
  • Cupertino effect - The Cupertino effect is an erroneous suggestion or replacement by a spellchecker, auto-correct program or smartphone predictive text feature.
  • cutover migration - The cutover Exchange migration process transfers data and mailboxes from one Exchange server to another in a single batch.
  • cyberbullying - Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter to harass, threaten or intimidate someone.
  • database availability group (DAG) - A database availability group (DAG) is a high availability (HA) and data recovery feature of Exchange Server 2010.
  • DCPromo (Domain Controller Promoter) - DCPromo (Domain Controller Promoter) is a tool in Active Directory that installs and removes Active Directory Domain Services and promotes domain controllers.
  • desktop search (integrated search) - Desktop search (sometimes called integrated search) is the ability to simultaneously search hard drives and removable storage on the user's computer.
  • DidTheyReadIt - DidTheyReadIt is an e-mail nonrepudiation program that uses a Web bug to determine whether the recipient of an HTML e-mail message has viewed it and report information back to the sender, typically without the recipient's knowledge.
  • direct digital marketing (DDM) - Direct digital marketing (DDM) is the electronic delivery of relevant communications to specific recipients.
  • direct email marketing - Direct email marketing is a format for email-based campaigns in which standalone advertisements are sent to a targeted list of recipients.
  • DirSync (Windows Azure Active Directory Sync) - DirSync (Directory Synchronization) is a tool for making copies of a local directory in a hybrid cloud deployment of Microsoft Exchange.
  • disappearing e-mail - Disappearing e-mail is a message sent using a type of distribution management tool for e-mail.
  • discovery mailbox - A discovery mailbox is used to perform e-discovery searches for Exchange Server and Exchange Online environments.
  • discussion board (discussion group, message board, online forum) - A discussion board (known also by various other names such as discussion group, discussion forum, message board, and online forum) is a general term for any online "bulletin board" where you can leave and expect to see responses to messages you have left.
  • disposable email - What is a disposable email?Disposable email is a service that allows a registered user to receive email at a temporary address that expires after a certain time period elapses.
  • distribution list - In e-mail applications, a distribution list is a group of mail recipients that is addressed as a single recipient.
  • Domain-based Message Authentication, Reporting and Conformance (DMARC) - Domain-based Message Authentication, Reporting and Conformance (DMARC) is an email authentication and reporting protocol designed to help ensure the authenticity of the sender’s identity.
  • drive-by spamming - Drive-by spamming is a variation of drive-by hacking in which the perpetrators gain access to a vulnerable wireless local area network (WLAN) and use that access to send huge volumes of spam.
  • e-mail (electronic mail or email) - E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication.
  • e-mail archive - E-mail archiving is a systematic approach to saving and protecting the data contained in e-mail messages so it can be accessed quickly at a later date.
  • e-mail postage (sender pays) - E-mail postage (sometimes referred to as sender pays) is a proposed system that would involve charging senders a very small amount of money (sometimes called a micropayment) for the delivery of each e-mail message sent.
  • e-mail reflector - An e-mail reflector is a program that acts as the forwarding broadcaster of e-mail messages to the names on a distribution list.
  • E2K (Exchange 2000) - E2K stands for the Exchange 2000 messaging and collaboration server product from Microsoft.
  • eavesdropping - Eavesdropping is the unauthorized real-time interception of a private communication, such as a phone call, instant message, videoconference or fax transmission.
  • edge transport server - Edge transport server is an Exchange Server 2010 role that helps route Internet email as well as protect the Exchange organization from viruses and spam.
  • Elm - Elm is a popular e-mail program for users of UNIX-based operating systems.
  • email archiving - Email archiving (also spelled e-mail archiving) is a systematic approach to saving and protecting the data contained in email messages to enable fast retrieval.
  • email bankruptcy - Email bankruptcy is an acknowledgement that your email has become unmanageable and the decision to either purge your inbox and start afresh or, more radically, to renounce email altogether.
  • email governance - Email governance is a way for organizations to manage and monitor email in a corporate setting.
  • email management - Email management is a systematic approach to maximizing the efficiency of email practices and minimizing the negative effects that email handling can have on an individual's productivity and job satisfaction.
  • email response management service (ERMS) - An email response management service (ERMS) is a set of programs that automatically handles email messages and attachments according to user-defined rules.
  • email retention - An e-mail retention policy is list of parameters created by an organization to determine what e-mail and instant messaging records need to be kept for compliance or other business reasons.
  • email security gateway - An email security gateway is a product or service that is designed to prevent the transmission of emails that break company policy, send malware or transfer information with malicious intent.
  • email spam - Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.
  • ESMTP (Extended Simple Mail Transfer Protocol) - ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages.
  • ETRN (Extended Turn) - ETRN (Extended Turn) is an extension to the Simple Mail Transfer Protocol (SMTP) that allows an SMTP server to send a request to another SMTP server to send any e-mail messages it has.
  • event sink (listener) - An event sink, sometimes called a listener, is a piece of coding that specifies how a server or computer is to handle given events.
  • ExBPA (Exchange Best Practices Analyzer) - The Exchange Best Practices Analyzer (ExBPA) is a tool that helps administrators to gauge the health of their Exchange Server environment.
  • Exchange 2013 data loss prevention (Exchange 2013 DLP) - Exchange 2013 data loss prevention is a feature in Exchange Server 2013 that allows administrators to manually enforce message content rules within their Exchange 2013 organization.
  • Exchange Administration Center (EAC) - The Exchange Administration Center (EAC) is a Web-based management console for managing Exchange Server 2013 environments.
  • Exchange Autodiscover service - The Exchange Autodiscover service helps Exchange administrators set up and sustain server settings for computers that run Microsoft Outlook, as well as settings for supported mobile devices.
  • Exchange Deployment Assistant - The Exchange Deployment Assistant is a Web-based tool that helps administrators plan Exchange Server upgrades and installations.
  • Exchange Management Console (EMC) - The Exchange Management Console (EMC) is a graphical user interface that allows administrators to manage the configuration of their Exchange organizations.
  • Exchange Online - Exchange Online is the hosted version of Microsoft's Exchange Server messaging platform that organizations can obtain as a stand-alone service or via an Office 365 subscription.
  • Exchange Remote Connectivity Analyzer (ExRCA) - The Exchange Remote Connectivity Analyzer (ExRCA) is a Web-based tool that helps Exchange administrators identify and troubleshoot connectivity issues in their deployments.
  • Exchange Server 2013 Service Pack 1 (SP1) - Exchange Server 2013 SP1 is a service pack for Exchange Server 2013 that includes a number of new and updated Exchange Server 2013 features and capabilities.
  • Exchange staged migration - The staged Exchange migration process transfers data and mailboxes from one Exchange server to another, either on-premises or in the cloud.
  • Exchange transaction log - In Microsoft Exchange, a transaction log is a file that contains a record of the changes that were made to an Exchange database.
  • Exchange Web Services (EWS) - Exchange Web Services (EWS) is an application program interface (API) that allows programmers to access Exchange items such as calendars, contacts and email in Exchange Server 2007 and higher.
  • Exim - Exim is an open source mail transfer agent (MTA), which is a program responsible for receiving, routing, and delivering e-mail messages (this type of program is sometimes referred to as an Internet mailer, or a mail server program).
  • express consent - Express consent is permission for something that is given specifically, either verbally or in writing.
  • Fcc - In Eudora and perhaps other e-mail facilities, you'll see the abbreviations "Fcc" and "Bcc".
  • Federal Rules of Civil Procedure (FRCP) - The Federal Rules of Civil Procedure (FRCP) are rules that specify procedures for civil legal suits within United States federal courts.
  • federated presence management (FPM) - Federated presence management (FPM), also called unified presence management, is a technology that allows device users to control all aspects of their communications with other users, regardless of the make or platform of the devices.
  • Fennec - Fennec is a version of the Firefox browser adapted for mobile phones and other small computing devices.
  • file allocation table (FAT) - A file allocation table (FAT) is a table that an operating system maintains on a hard disk that provides a map of the clusters (the basic units of logical storage on a hard disk) that a file has been stored in.
  • FIX protocol (Financial Information Exchange protocol) - The Financial Information Exchange (FIX) protocol is an open specification intended to streamline electronic communications in the financial securities industry.
  • flaming - On the Internet, flaming is giving someone a verbal lashing in public.
  • flash rob (flash robbery) - A flash rob (or flash robbery) is a crime in which a large group of people - usually teenagers - converges to steal items from a store and then disperses as suddenly as they gathered.
  • FOPE (Forefront Online Protection for Exchange) - FOPE (Forefront Online Protection for Exchange) is a discontinued cloud service for organizations using Exchange Server or Exchange Online.

-ADS BY GOOGLE

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • spyware

    Spyware is a type of malicious software -- or malware -- that is installed on a computing device without the end user's knowledge.

  • application whitelisting

    Application whitelisting is the practice of specifying an index of approved software applications or executable files that are ...

  • botnet

    A botnet is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • DRAM (dynamic random access memory)

    Dynamic random access memory (DRAM) is a type of semiconductor memory that is typically used for the data or program code needed ...

  • RAID 10 (RAID 1+0)

    RAID 10, also known as RAID 1+0, is a RAID configuration that combines disk mirroring and disk striping to protect data.

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

Close