e-mail


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Acronyms, Wikipedia.
Related to e-mail: Yahoo Mail

e-mail:

see electronic mailelectronic mail
or e-mail,
the electronic transmission of messages, letters, and documents. In its broadest sense electronic mail includes point-to-point services such as telegraph and facsimile (fax) systems.
..... Click the link for more information.
.

e-mail

[′ē‚māl]
(communications)

e-mail

e-mail

(Electronic-MAIL) The transmission of text messages from sender to recipient. E-mail messages can also be formatted with graphics like a brochure or Web page, an enhancement that many users like, but that creates more spam and a security risk (see HTML e-mail).

Users can send a mail message to a single recipient or to multiple users. In addition, JPEG photos as well as any other type of computer file may be attached to the message (see e-mail attachment). Mail is sent to a simulated mailbox in the organization's mail server until it is downloaded to the "in" mailbox in the user's computer.

The Messaging System and the Client
An e-mail system requires a messaging system, which is primarily a store and forward capability based on the Internet's Simple Mail Transfer Protocol (SMTP). A mail program (e-mail client), such as Windows Mail, Mac Mail, Outlook and Eudora, provides the user interface for mailboxes and send and receive functions. Popular e-mail services such as Gmail and Yahoo Mail are Web based, in which case the Web browser is used as the mail program (see e-mail interfaces).

The Internet Changed It All
The Internet revolutionized e-mail by turning countless incompatible islands into one global system. Initially serving its own users, in the mid-1990s, the Internet began to act as a mail gateway between the major online services such as CompuServe and America Online (AOL). It then became "the" messaging system for the planet. In the U.S., Internet mail is measured in the trillions of messages each year. See e-mail vs. fax, messaging system, instant messaging, read receipt and self-destructing e-mail.


Could They Have Imagined Spam?
When they sent this first message in 1971, could they have imagined the trillions of e-mail messages that would follow in years to come? (Image courtesy of Dan Murphy, www.opost.com/dlm)




The First E-mail on the Internet


In 1971, the first e-mail message was typed into the Teletype terminal connected to the Digital Equipment PDP-10 toward the back of the room in the following picture. The message was transmitted via ARPAnet, the progenitor of the Internet, to the PDP-10 in front. Dan Murphy, a Digital engineer, took this photo in the Bolt, Beranek and Newman datacenter. See ARPAnet.


Could They Have Imagined Spam?
When they sent this first message in 1971, could they have imagined the trillions of e-mail messages that would follow in years to come? (Image courtesy of Dan Murphy, www.opost.com/dlm)
References in periodicals archive ?
Specifically, given that Cornell's marketplace orientation is decidedly nonprofit, the university most likely will not opt for the preferred e-mail format for the time being, Mitrano says.
The third business process that impacts e-mail management is accessibility.
So far though, the camper e-mail system we have described is still pretty basic: text only.
For example, if you wanted to subscribe to the LeaguE-Voice and the President's List and unsubscribe from the Campaign Finance Reform List, you would send an e-mail to lyris@lists.
Managing e-mail communication campaigns requires understanding the legal ramifications, technical and operational considerations, and methods for optimizing the medium.
However, in 2000, only about 50 percent of recipients have e-mail software that can read them.
S/MIME Digital Signatures: Prove You Are A Trusted Sender One of the most time-tested approaches to e-mail authentication is to apply S/MIME digital signatures to outbound e-mail.
Inability to effectively backup critical e-mail messages: The personal archive (PST) folder approach generally allows for a configurable storage location for the archived data, which takes control over the location of this data out of the hands of IT, therefore making backup a catch-as-catch-can procedure.
One element of Source Authentication is that the senders of e-mail are asked to reply to the recipients by simply clicking on "reply" and then "send" Question: Is responding to reply inquiries as much of a problem as spam itself?
The Bonded Sender program provides a valuable tool for legitimate e-mail senders to distinguish their e-mail from spam and has helped MSN better protect our customers' inboxes," said Ryan Hamlin, general manager, MSN.