wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Outlook.com

profile
Abhinash Jha
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Outlook.com is a personal information manager web app from Microsoft consisting of web mail, calendering , contacts,and task services .Founded in 1996 by sabeer bhatia and jack smith as Hotmail ,it was acquired by Microsoft in 1997 for an estimated of $400 million and relaunched as MSN Hotmail ,later rebranded to Windows  Live Hotmail as part of the windows  Live suits of products . Microsoft phased out Hotmail in October 2011,relaunching the service as outlook.com in 2012.

Outlook.com has promised to respect users privacy, specifically targeting gmails privacy practices . outlook.com does not scan email or attachments for advertising information and personal conversations are ad free entirely .

Let's remind Hotmail is free e-mail provider You have a strong email security guaranteed thnks to Microsoft anti viruses and anti spam tools .You can also connect multiple mailboxes from other email supplier account . outlook offers alot of other services such as contact databases, Calendar,task, etc.

 SSL and TSL are both supported as Encryption protocol in Gmail, Hotmail considered as more secure as user email are not scanned to send ads.


Comments ()


Sign in

Read Next

LTE Technology

Blog banner

Python as a tool for data analysis

Blog banner

Banaras

Blog banner

RAID

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

On-Page SEO

Blog banner

GIS Topography

Blog banner

DEVELOPMENTS LEADING TO MODERN OPERATING SYSTEMS

Blog banner

The functions of operating system

Blog banner

OS Evolution Achievements

Blog banner

Linux 94

Blog banner

Facebook marketing

Blog banner

Memory Management

Blog banner

Cloud Computing

Blog banner

Self-love: Being the reason of your own smile

Blog banner

Balance

Blog banner

Understanding - Proof of Work!

Blog banner

Dancing Classes In Mumbai

Blog banner

Steganography

Blog banner

Incorporating Automation into Digital Forensics.

Blog banner

Odoo

Blog banner

The Role of Data Provenance and Lineage in Modern Data Science

Blog banner

Operating system evolution

Blog banner

Disk Management

Blog banner

Memory management

Blog banner

LINUX

Blog banner

"The Benefits of Using GIS in Agriculture"

Blog banner

The art of being alone

Blog banner

Starvation

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

What is M-commerce and how it's work

Blog banner

OS Assignment 3 Deadlock

Blog banner

computer security

Blog banner

Why Are So Many Adults Getting Diagnosed with ADHD?

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

SECURITY VULNERABILITIES COUNTERMEASURES IN A SMART SHIP SYSTEM

Blog banner

“Shot on iPhone” : A campaign by Apple that turned into a prodigy

Blog banner

Service Strategy In ITSM

Blog banner

IT Service Continuity Management

Blog banner

Theads

Blog banner

Explain website hacking issues

Blog banner

MY FIRST BLOG?

Blog banner