wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Outlook.com

profile
Abhinash Jha
Aug 26, 2022
0 Likes
0 Discussions
86 Reads

Outlook.com is a personal information manager web app from Microsoft consisting of web mail, calendering , contacts,and task services .Founded in 1996 by sabeer bhatia and jack smith as Hotmail ,it was acquired by Microsoft in 1997 for an estimated of $400 million and relaunched as MSN Hotmail ,later rebranded to Windows  Live Hotmail as part of the windows  Live suits of products . Microsoft phased out Hotmail in October 2011,relaunching the service as outlook.com in 2012.

Outlook.com has promised to respect users privacy, specifically targeting gmails privacy practices . outlook.com does not scan email or attachments for advertising information and personal conversations are ad free entirely .

Let's remind Hotmail is free e-mail provider You have a strong email security guaranteed thnks to Microsoft anti viruses and anti spam tools .You can also connect multiple mailboxes from other email supplier account . outlook offers alot of other services such as contact databases, Calendar,task, etc.

 SSL and TSL are both supported as Encryption protocol in Gmail, Hotmail considered as more secure as user email are not scanned to send ads.


Comments ()


Sign in

Read Next

Segmentation and paging concept

Blog banner

Zero-Click Searches: How To Stay Visible In Google’s New Era

Blog banner

Deadlock

Blog banner

Bulk E-mail software

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Every body is beautiful

Blog banner

New Horizon Europe project ‘EvoLand’ sets off to develop new prototype services.

Blog banner

Flipkart

Blog banner

Different memory allocation strategies

Blog banner

My First Trek - Sondai, Karjat - Shoaib Malik

Blog banner

Windows Operating System

Blog banner

Clarizen

Blog banner

Service Catalogue Management

Blog banner

Direct Memory Access

Blog banner

AI and Data Science: Revolutionizing Industries

Blog banner

Top 5 Tech Innovations of 2018

Blog banner

Deadlocks in Operating Systems

Blog banner

Deadlock and starvation in operating system

Blog banner

Cloud Forensic Tools And Storage :A Review Paper

Blog banner

Dal Bafla Recipe

Blog banner

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Operating system and overviews

Blog banner

What is 'Multi-core and Multi-threading' ?

Blog banner

From Loom to Luxury: How Patola Elevates Modern Wardrobes

Blog banner

SAVE TREES

Blog banner

SQL Injection

Blog banner

Virtual Memory - Explaination, Working, Steps

Blog banner

Consumer to consumer Business model

Blog banner

Next time you click on "Remind me later", think twice!

Blog banner

How Men and Women Process Pain Differently

Blog banner

Jio .....A Revolution ?? ??

Blog banner

Importance of Network Security Risk

Blog banner

Multiple-Processor Scheduling in Operating System

Blog banner

Memory management

Blog banner

Improving the Accuracy of GPS and GNSS

Blog banner

Operating system

Blog banner

The Role of cryptography in cyber security

Blog banner

Deadlock

Blog banner

Memory hierarchy

Blog banner

Deadlock

Blog banner

Binary Search Tree (BST) in Data Structure

Blog banner

Image Steganalysis in Digital Forensics

Blog banner