Clutter is a technology developed by Microsoft for its Outlook email client that helps users automatically organize their Outlook inboxes and prioritize important e-mails by moving lower priority messages to a new Clutter folder.
The Microsoft Clutter technology debuted in late 2014 for Office 365 users, and is now available on Outlook PC and mobile applications as well as the Outlook Web App.
Clutter is designed to learn from a user’s choices and actions to better determine which messages are more likely to be ignored by the user as they come in. These messages end up in the Clutter folder.
Clutter vs. Anti-Spam Filters, Junk Mail and Outlook Rules
Clutter operates in a fashion similar to third-party anti-spam filters like Cloudmark or Spam Bully, in that it learns how to filter out lower priority mail based on a user’s reading habits and actions.
Clutter does differ from two other built-in Outlook features, Junk Mail and Rules, that might at first seem similar in nature to Clutter. The Junk Mail feature in Microsoft Outlook processes messages based on a massive collection of known spam that Microsoft has identified over time. This junk mail processing is generic in nature, as opposed to the more personalized approach taken by Clutter.
Clutter differs from Outlook Rules in that rules are defined by the user and take priority over Clutter processing. There are also significantly more options and actions available through Microsoft Outlook rules than with Clutter.
In terms of message processing priority, Outlook will take the following steps in order:
Filter messages to the junk mail folder that have been identified as spam
Process any and all mailbox rules that apply to incoming messages
Identify and filter messages identified as clutter based on Clutter algorithms
- Microsoft Edge
Microsoft Edge is the official name for a new and improved Web browser introduced in Microsoft’s Windows 10 operating system that was developed to replace the venerable Internet Explorer Web browser. Microsoft Edge combines recent web technology advancements with a streamlined and faster browsing experience, while also delivering compatibility and a consistent user experience across […]
Term used to describe the malicious act of hijacking an engaged Web session with a remote service by intercepting and using the credentials that identified the user/victim to that specific server. Typically, SideJacking is most common on sites that require authentication through a username and password, such as online Web mail accounts as well as […]
- Cakewalk Application Language
Short for Cakewalk Application Language. CAL is an event-processing language that you use to extend Pro Audio and Professional with custom editing commands. You can write your own CAL program and use or edit CAL programs that other people have written. You also can create CAL programs by recording a series of commands, keystrokes, and […]