9+ Easy Ways: How Do I Turn On Email Sync? Now!


9+ Easy Ways: How Do I Turn On Email Sync? Now!

The procedure for activating the automatic updating of electronic mail across devices varies depending on the specific email provider and operating system in use. Generally, this process involves accessing the settings menu within the email application or web interface and locating an option related to synchronization or account settings. For example, on a mobile device, one might navigate to the device’s settings, then select “Accounts,” choose the relevant email account, and ensure the “Sync email” toggle is enabled. On a desktop application, the steps could involve accessing the “File” menu, selecting “Account Settings,” and verifying that the synchronization schedule is properly configured.

The value of this feature lies in ensuring consistent access to the most current version of one’s inbox across all connected devices. When properly configured, new messages, read statuses, sent items, and other mailbox modifications are reflected uniformly, regardless of the device used to access the email. This enhances productivity and prevents discrepancies that can arise from viewing outdated information. Historically, email clients required manual refreshing to retrieve new messages; the introduction of automatic updating streamlined the process and eliminated the need for constant user intervention.

The subsequent sections will provide detailed instructions for enabling this function on popular email platforms and operating systems, offering step-by-step guidance to facilitate a seamless configuration experience. The guidance will cover settings on iOS, Android, Outlook, Gmail, and other commonly used platforms.

1. Account settings access

The capability to configure electronic mail updating is fundamentally contingent on access to account settings within the email application or operating system. Without this access, modification of synchronization parameters is not feasible. This access point serves as the central hub for managing email behavior across devices.

  • Authentication Credentials

    Accessing account settings invariably requires valid credentials. This serves as a security measure to prevent unauthorized modification of synchronization preferences. For instance, attempting to adjust settings without proper authentication prompts a request for username and password verification. The absence of these credentials precludes any alteration of synchronization parameters.

  • Synchronization Parameter Modification

    Within account settings, options related to synchronization frequency, folder selection, and data usage are typically located. Adjusting these parameters directly influences the behavior of electronic mail updating. For example, altering the synchronization frequency from “manual” to “automatic” initiates periodic mail retrieval without user intervention. Such modifications are only possible with access to the appropriate settings.

  • Permission Levels and Restrictions

    Organizational policies may impose restrictions on account settings access, particularly on corporate devices. These restrictions can limit the ability to modify synchronization behavior. For example, a company may disable the option to synchronize attachments over cellular networks to conserve data usage. Understanding these restrictions is critical in troubleshooting synchronization issues.

  • Application-Specific Interface

    The method for accessing account settings varies depending on the specific email application or operating system. For example, on iOS, the pathway involves navigating to Settings > Mail > Accounts > [Email Account]. On Android, the route may differ based on the manufacturer and Android version. Familiarity with the specific interface is necessary to locate and modify synchronization settings.

In summary, access to account settings is a prerequisite for configuring and controlling the automated updating of electronic mail. The ability to modify synchronization parameters, authenticate credentials, and navigate application-specific interfaces is essential for ensuring proper email updating across devices. Understanding potential permission restrictions is also critical for effective management.

2. Synchronization frequency control

Synchronization frequency control represents a critical parameter in the effective implementation of electronic mail updating. The process of activating this functionality necessarily entails configuring how often the email client attempts to retrieve new messages and propagate changes across connected devices. This control directly influences data freshness, network usage, and device battery life. Setting an excessively frequent synchronization interval ensures near real-time updates but consumes significant resources. Conversely, infrequent synchronization conserves battery and bandwidth but may result in delayed message delivery. The selection of an appropriate synchronization interval is therefore a crucial consideration when enabling this functionality. For instance, a business professional reliant on immediate email notifications might opt for a more aggressive synchronization schedule, while a casual user may prefer a less frequent interval to minimize battery drain.

The interaction between synchronization frequency and other system parameters further complicates the configuration process. Network connectivity, server responsiveness, and email volume all impact the actual delay experienced between message arrival and local synchronization. For example, a weak or intermittent network connection may render a short synchronization interval ineffective, as the client will be unable to establish a reliable connection with the mail server. Similarly, a high volume of incoming email can overwhelm the client, leading to delays even with frequent synchronization attempts. Consequently, the optimal synchronization frequency is not a fixed value but rather a function of several dynamic factors, necessitating a degree of adaptive adjustment.

In conclusion, configuring the synchronization frequency is an indispensable step in enabling email updating. A thoughtful approach to this parameter, considering the trade-offs between data freshness, resource consumption, and external factors such as network conditions, is essential for achieving a satisfactory user experience. The absence of proper synchronization frequency control can negate the benefits of automated mail retrieval, resulting in either excessive battery drain or unacceptable delays in message delivery, thereby highlighting the practical significance of understanding this component of email updating.

3. Server connection stability

Server connection stability is a foundational element that directly impacts the efficacy of electronic mail updating. Without a reliable connection to the mail server, the synchronization process is compromised, rendering the automated retrieval of new messages and propagation of changes across devices inoperative.

  • Connection Intermittency Effects

    Sporadic or interrupted connections prevent consistent data transmission between the client device and the mail server. When a connection is unstable, email updates may be missed entirely, leading to delayed message delivery or incomplete synchronization. This is especially critical in mobile environments where network availability can fluctuate. For example, moving between Wi-Fi and cellular networks may introduce brief periods of disconnection, hindering the synchronization process.

  • Impact on Synchronization Frequency

    An unstable server connection undermines the effectiveness of even the most frequent synchronization schedules. If the client attempts to synchronize during a period of disconnection, the synchronization attempt will fail, resulting in missed updates. The client may repeatedly attempt to connect, consuming battery life and bandwidth without achieving a successful synchronization. Therefore, the configured synchronization frequency is only meaningful when a stable server connection is maintained.

  • Error Handling and Retry Mechanisms

    Email clients typically implement error handling and retry mechanisms to address temporary connection issues. These mechanisms attempt to re-establish the connection and resume synchronization after a disruption. However, prolonged or frequent disruptions can overwhelm these mechanisms, leading to prolonged delays or outright failure to synchronize. A robust error handling system is critical for mitigating the effects of occasional connection instability.

  • Server-Side Infrastructure Reliability

    Server-side issues, such as server downtime or network congestion, can also manifest as connection instability from the client’s perspective. Even with a stable client-side connection, problems on the server can prevent successful synchronization. Regular server maintenance, capacity planning, and network optimization are essential for maintaining server-side reliability and ensuring consistent email updating.

The ability to facilitate electronic mail updating hinges substantially on the ability of email clients to maintain consistent and reliable connectivity with the mail server. Connection intermittency, error handling efficacy, and synchronization frequency must be carefully considered in the context of server-side infrastructure reliability. The cumulative impact of these interconnected elements determines the success or failure of the automated process.

4. Password authentication validity

The successful execution of email synchronization is inextricably linked to the continuous validity of password authentication. Without valid credentials, the email client is unable to access the mail server, rendering the automated updating of electronic mail across devices impossible.

  • Initial Authentication Requirements

    The initial setup process for email synchronization invariably requires the provision of valid authentication credentials, typically a username and password. These credentials are used to verify the user’s identity and authorize access to the mail server. If the provided credentials are incorrect or invalid, the synchronization process will fail to initiate. The importance of accuracy during this initial configuration phase cannot be overstated.

  • Impact of Password Changes

    When a user changes their email password, it is imperative to update the stored credentials on all devices configured for email synchronization. Failure to do so will result in authentication failures, preventing the client from retrieving new messages and propagating changes. Modern email clients often provide mechanisms for prompting users to update their credentials upon detecting a password change, but manual intervention may still be required in some cases.

  • Account Lockout Scenarios

    Repeated attempts to authenticate with incorrect credentials can trigger account lockout mechanisms on the mail server. This is a security measure designed to prevent unauthorized access. When an account is locked out, email synchronization is effectively disabled until the lockout period expires or the user resets their password. This scenario highlights the criticality of maintaining accurate and up-to-date credentials to avoid disruption of email services.

  • Multi-Factor Authentication Considerations

    The implementation of multi-factor authentication (MFA) adds an additional layer of security to the authentication process. In this scenario, successful email synchronization requires not only a valid password but also a secondary authentication factor, such as a one-time code generated by a mobile app. The validity of both factors must be confirmed for synchronization to proceed. Properly configured MFA significantly enhances security but also introduces additional complexity to the authentication process.

In summary, the validity of password authentication serves as a gatekeeper for email synchronization. From initial setup to password changes and the implementation of advanced security measures such as MFA, maintaining accurate and up-to-date credentials is essential for ensuring uninterrupted and secure email updating across all devices. The integrity of the synchronization process is directly dependent upon the continuous validity of the authentication mechanism.

5. Device compatibility confirmation

Prior to initiating the email synchronization process, verification of device compatibility is paramount. A device’s inherent limitations or incompatibility with specific email protocols can impede or entirely prevent successful synchronization. This preliminary assessment ensures that the hardware and software environment is conducive to the desired functionality.

  • Operating System Version

    The operating system version installed on the device must meet the minimum requirements stipulated by the email client or service. Outdated operating systems may lack the necessary libraries or APIs to establish a secure and stable connection to the mail server. For instance, older versions of Android or iOS might not support modern encryption protocols, hindering synchronization. Verification of the operating system version and subsequent updates, if available, is a crucial initial step.

  • Email Client Application Support

    The chosen email client application must be designed to function correctly on the device’s operating system. Incompatibility can manifest as application crashes, rendering errors, or the inability to establish a connection with the mail server. Compatibility information is typically provided by the application developer or the device manufacturer. For example, certain email clients may be optimized for specific hardware architectures or screen resolutions. Ensuring that the application is officially supported on the device is essential.

  • Protocol Support (IMAP, POP3, Exchange)

    The device must be capable of supporting the email protocols utilized by the email service. Internet Message Access Protocol (IMAP), Post Office Protocol version 3 (POP3), and Microsoft Exchange are common protocols, each with varying levels of complexity and security. Older devices may only support basic protocols or lack the ability to negotiate secure connections. Determining which protocols are required by the email service and verifying device support is crucial for successful synchronization. Lack of support can result in failed connection attempts or incomplete mail retrieval.

  • Hardware Resource Sufficiency

    While often overlooked, the device’s available hardware resources, such as processing power and memory, can impact synchronization performance. Devices with limited resources may experience slow synchronization speeds or encounter errors due to insufficient memory allocation. This is particularly relevant when handling large email attachments or synchronizing multiple accounts simultaneously. Assessing the device’s hardware capabilities and managing resource usage can mitigate potential performance issues.

Device compatibility confirmation ensures a foundation for the synchronization setup. Addressing potential incompatibilities before attempting configuration minimizes troubleshooting and maximizes the likelihood of successful email updating across all devices. The interplay of operating system support, application functionality, protocol compliance, and hardware resources dictates the ultimate feasibility of automated email retrieval and data consistency.

6. Storage capacity allowance

Storage capacity allowance represents a critical constraint on the functionality of email synchronization. While the process of activating this synchronization aims to ensure consistent access to electronic mail across multiple devices, the available storage space, both on the server and the client device, directly impacts the scope and effectiveness of the synchronization process. Insufficient storage can lead to incomplete synchronization, data loss, or the inability to receive new messages.

  • Server-Side Quotas and Synchronization Scope

    Email providers impose storage quotas on user accounts. When an account approaches or exceeds this quota, the synchronization process may be affected. The server may limit the amount of data that can be synchronized to client devices, preventing complete retrieval of older messages or attachments. For instance, a user with a 15 GB Gmail account approaching its limit may find that only the most recent emails are synchronized to their mobile device, with older emails remaining accessible only through the web interface. This limitation directly influences the extent to which the synchronization function can provide a comprehensive view of the user’s inbox.

  • Client-Side Storage Limitations and Data Management

    Client devices, such as smartphones and tablets, also possess finite storage capacity. When configuring email synchronization, the amount of data downloaded to the device can be managed through settings such as limiting the synchronization period or excluding attachments. However, insufficient device storage can lead to synchronization errors, application crashes, or the inability to download new emails. A user with a smartphone nearing its storage limit might experience repeated synchronization failures until storage space is freed up. Effective data management strategies, such as archiving older emails or removing large attachments, become essential for maintaining synchronization functionality.

  • Impact on Attachment Synchronization

    Email attachments consume significant storage space. The synchronization of attachments can be selectively enabled or disabled to manage storage usage. However, if both server and client storage are limited, the synchronization of attachments may be severely restricted, preventing access to important files on mobile devices. A user relying on synchronized attachments for work may find that they are unable to access these files on their phone due to storage constraints, impacting their productivity. The ability to prioritize or exclude certain attachment types based on size or relevance can mitigate these issues.

  • Archiving and Data Retention Policies

    Organizations often implement data retention policies that dictate how long emails are stored on the server. These policies can indirectly impact synchronization by limiting the amount of data available for retrieval. If older emails are automatically archived or deleted from the server, they will no longer be synchronized to client devices. Users should be aware of these policies and adjust their synchronization settings accordingly. For example, if an organization retains emails for only one year, users should not expect to synchronize emails older than that period to their mobile devices. This constraint highlights the need for understanding and adapting to organizational data management practices.

The relationship between storage capacity allowance and email synchronization is one of constraint and adaptation. Limited storage, whether on the server or the client device, necessitates careful management of synchronization settings and data retention practices. Ignoring these limitations can lead to incomplete synchronization, data loss, and a compromised user experience. A comprehensive understanding of these constraints is essential for effectively enabling and maintaining email synchronization across multiple devices. The configuration process must account for available storage to ensure functionality is maximized within existing limitations.

7. Application permission verification

Application permission verification constitutes a critical juncture in the process of enabling electronic mail updating. The authorization granted to an email application directly dictates its capacity to access and manipulate account data, thereby influencing the success and security of the synchronization endeavor.

  • Contact Access and Privacy Implications

    Granting an email application access to device contacts can facilitate features like auto-completion and contact suggestion during message composition. However, it also raises privacy concerns, as the application gains the ability to read and potentially transmit contact information. With respect to automated updating, contact synchronization is often intertwined with email synchronization. For instance, changes made to contacts on one device, such as adding a new email address, will only propagate to other devices if the application possesses the requisite contact access permissions. The absence of these permissions can lead to inconsistencies across devices and a compromised user experience.

  • Calendar Integration and Event Synchronization

    Email applications frequently request access to device calendars to enable features like event scheduling and reminder synchronization. When permission is granted, events created or modified within the email application are automatically reflected in the device’s calendar, and vice versa. This integration relies on the email application’s ability to read and write calendar data. Denying calendar access prevents the seamless synchronization of event information, potentially leading to missed appointments or scheduling conflicts. The absence of such permissions necessitates manual updates across multiple devices, negating the benefits of automated updating.

  • Background Data Restrictions and Update Frequency

    Operating systems often allow users to restrict background data usage for individual applications. When background data is restricted for an email application, its ability to synchronize email in the background is curtailed. This means that new emails will only be retrieved when the application is actively in use. The repercussions for electronic mail updating are significant, as real-time notifications may be delayed or missed entirely. This limitation can be particularly problematic for users who rely on prompt email delivery for time-sensitive communications. The explicit allowance of background data is, therefore, a prerequisite for reliable automated updating.

  • Storage Access and Attachment Management

    Email applications typically require access to device storage to enable the downloading and saving of attachments. When storage access is denied, the application may be unable to download attachments, preventing users from accessing important files received via email. Additionally, the application’s ability to save composed messages in drafts may also be impaired. With respect to automated updating, storage access is essential for maintaining a complete and accessible record of email communications across devices. The absence of this permission can lead to incomplete synchronization and a degraded user experience. Storage considerations, therefore, play a crucial role in enabling effective automated updating.

These facets highlight the integral role of application permission verification in enabling electronic mail updating. Without the requisite permissions, the functionality of automated synchronization is compromised, leading to incomplete data transfer, impaired user experience, and potential security vulnerabilities. Granting permissions should be a deliberate and informed process, balancing functionality with privacy considerations to ensure a secure and efficient electronic mail experience. The success of “how do i turn on email sync” hinges on the proper granting of application permissions.

8. Background data enablement

Background data enablement directly governs an application’s capacity to operate and transmit data when the user is not actively engaged with it. Its significance within the context of email synchronization is paramount, dictating the immediacy and reliability of message delivery across connected devices. Without background data access, the automated updating of electronic mail is severely hampered.

  • Real-Time Synchronization Impairment

    The restriction of background data inherently undermines the ability of an email client to provide real-time synchronization. When an email application is confined to foreground operation, new messages are only retrieved when the application is actively in use. This limitation negates the fundamental benefit of automatic updating, as users must manually initiate the synchronization process to receive new messages. For instance, a business professional expecting immediate notifications of critical emails would be significantly disadvantaged by background data restrictions, potentially leading to missed opportunities or delayed responses.

  • Impact on Push Notification Reliability

    Push notifications, designed to alert users to new emails in real time, are heavily reliant on background data access. When background data is disabled, the email client is unable to maintain a persistent connection to the mail server, preventing the delivery of push notifications. This results in delayed or missed alerts, diminishing the user’s ability to respond promptly to incoming messages. In practical terms, a user who relies on push notifications to stay informed of important communications would experience significant disruptions in service when background data is restricted.

  • Battery Consumption Considerations

    While enabling background data facilitates seamless email synchronization, it also contributes to increased battery consumption. The email client must maintain a persistent connection to the mail server, periodically checking for new messages and propagating changes. This constant activity consumes device resources, potentially reducing battery life. However, modern operating systems and email clients often employ sophisticated power management techniques to minimize the impact of background data usage on battery performance. A balance must be struck between the convenience of real-time synchronization and the need to conserve battery power.

  • Operating System-Level Restrictions and Overrides

    Operating systems often provide granular controls over background data usage, allowing users to restrict background data for specific applications or globally. These restrictions can override application-level settings, preventing email synchronization even when the application is configured to operate in the background. Furthermore, some operating systems offer “data saver” modes that automatically restrict background data for all applications to conserve bandwidth. Understanding these operating system-level restrictions is crucial for troubleshooting synchronization issues. Users must ensure that background data is explicitly enabled for the email application to ensure reliable automated updating.

In conclusion, background data enablement is an indispensable component of functional email synchronization. The absence of background data access compromises real-time synchronization, impairs push notification reliability, and ultimately undermines the core benefits of automated email updating. While battery consumption is a valid consideration, modern devices offer sophisticated power management tools to mitigate the impact. The ability of the keyword term “how do i turn on email sync” to reach its full potential is tied directly to enabling background data.

9. Push notification configuration

The configuration of push notifications directly influences the user’s experience with electronic mail synchronization. An integral aspect of automating updates, push notifications provide real-time alerts upon the arrival of new messages. Effective configuration ensures timely delivery of these alerts, enhancing responsiveness and minimizing delays in communication. If push notifications are disabled or improperly configured, new emails may go unnoticed until the user manually checks their inbox, negating a primary benefit of automated updates. For example, a business professional awaiting an urgent client communication relies on push notifications for immediate awareness; misconfiguration could lead to a missed opportunity. Therefore, proper adjustment of push notification settings is an indispensable component of successful email synchronization.

The interplay between operating system settings and email application settings further complicates push notification configuration. Operating systems often provide global controls over notification delivery, allowing users to restrict notifications for specific applications or for all applications. Simultaneously, email applications provide granular control over the types of notifications delivered, such as alerts for new emails, calendar reminders, or task updates. For instance, an individual might enable global notifications for the email application but selectively disable notifications for social media promotions within the application’s settings. A comprehensive understanding of both operating system and application settings is crucial for achieving the desired notification behavior. Failure to align these settings can result in inconsistent or unreliable notifications.

In summary, push notification configuration forms a critical link in the chain of email synchronization, bridging the gap between automated updates and user awareness. The value of real-time notifications is diminished when push notification settings are overlooked or improperly configured. Aligning operating system-level controls with application-specific settings is essential for ensuring reliable delivery of alerts. The successful automation of updates relies significantly on a properly configured push notification system. The goal to effectively know “how do i turn on email sync” involves optimal notification configuration.

Frequently Asked Questions

This section addresses common inquiries regarding the activation and maintenance of email synchronization across devices. The information provided aims to clarify potential issues and optimize the synchronization process.

Question 1: What prerequisites are necessary before initiating email synchronization?

Prior to activation, verification of network connectivity, valid account credentials, and device compatibility is essential. Inadequate network access, incorrect username or password, or an unsupported device may prevent successful synchronization.

Question 2: How does synchronization frequency impact battery life?

A more frequent synchronization schedule consumes additional battery power due to the increased network activity. Conversely, infrequent synchronization conserves battery but may result in delayed email delivery. Adjust the synchronization frequency to strike a balance between timely updates and battery preservation.

Question 3: What measures mitigate synchronization issues stemming from unstable network connections?

Addressing connection instability involves verifying network signal strength, ensuring a stable Wi-Fi connection, and minimizing interference from other wireless devices. In situations where a constant, stable connection is unavailable, consider adjusting the synchronization frequency to a less frequent interval.

Question 4: How are password changes implemented across synchronized devices?

Upon changing an email account password, update the stored credentials on all devices configured for synchronization. Failure to do so will result in authentication errors and prevent the client from retrieving new messages. Most email clients will prompt for the updated password; however, manual intervention may be required.

Question 5: What are the implications of exceeding storage capacity limitations?

Exceeding storage quotas, either on the server or the client device, can impede synchronization. The server may limit the amount of data available for synchronization, and the client device may be unable to download new messages. Management of storage limitations involves archiving older emails, removing large attachments, or increasing storage capacity.

Question 6: How can background data restrictions affect email synchronization?

Restricting background data for an email application prevents it from synchronizing in the background, leading to delayed message delivery and missed push notifications. To ensure real-time synchronization, enable background data access for the email application within the device’s settings.

Key takeaways include the need for careful consideration of network connectivity, password validity, storage limitations, and application permissions to ensure optimal email synchronization.

The subsequent section will provide a troubleshooting guide for resolving common email synchronization errors.

Practical Guidelines for Email Synchronization Activation

The subsequent points offer actionable guidance to ensure a seamless and efficient electronic mail synchronization experience across multiple devices.

Tip 1: Verify Network Connectivity Prior to Configuration. A stable and reliable network connection is a prerequisite for successful email synchronization. Prioritize establishing a secure Wi-Fi connection over cellular data, if available, to minimize potential disruptions during the initial setup and subsequent synchronization processes.

Tip 2: Exercise Precision when Entering Account Credentials. Authentication errors are a common cause of synchronization failure. Scrutinize the entered username and password, paying close attention to case sensitivity and avoiding inadvertent typographical errors. Consider utilizing password management tools to securely store and automatically populate credentials.

Tip 3: Assess and Manage Device Storage Capacity. Limited storage space can impede the synchronization process. Regularly monitor available storage and delete unnecessary files, applications, or media to optimize performance. Consider selectively synchronizing specific email folders or limiting the download of attachments to conserve storage space.

Tip 4: Review and Adjust Synchronization Frequency Settings. A more frequent synchronization schedule ensures timely delivery of new messages but can also increase battery consumption. Adjust the synchronization frequency based on individual needs and usage patterns. Consider using push notifications for immediate alerts and a less frequent background synchronization interval.

Tip 5: Validate and Grant Application Permissions Appropriately. Email applications require specific permissions to access contacts, calendar data, and storage. Carefully review and grant only the necessary permissions, balancing functionality with privacy considerations. Periodically revisit application permissions to ensure they remain aligned with current needs and security best practices.

Tip 6: Enable Background Data Access for Consistent Synchronization. Restricting background data prevents the email application from synchronizing when not actively in use, resulting in delayed message delivery. Ensure that background data access is enabled within the device’s settings to maintain consistent and timely synchronization.

Tip 7: Regularly Update the Email Application and Operating System. Software updates often include bug fixes, performance enhancements, and security patches that can improve email synchronization reliability. Maintain both the email application and the operating system to the latest versions to minimize potential issues.

These guidelines represent best practices for optimizing email synchronization. Adherence to these principles promotes a more reliable and efficient communication experience.

The concluding section will summarize key considerations for maintaining long-term email synchronization performance.

Conclusion

The preceding exploration provides a comprehensive overview of the factors governing electronic mail synchronization activation. Effective implementation hinges on a confluence of technical considerations, encompassing network connectivity, account authentication, device compatibility, storage management, application permissions, background data enablement, and push notification configuration. The absence of any of these elements compromises the efficacy of the process, potentially resulting in incomplete data transfer, delayed message delivery, and a diminished user experience. Understanding these intricate relationships is crucial for optimizing the synchronization of electronic mail across multiple devices.

Continued adherence to established best practices, encompassing regular maintenance, proactive monitoring of system resources, and vigilant oversight of application permissions, is paramount. Ensuring long-term synchronization reliability necessitates a commitment to ongoing vigilance. A proactive approach will ensure the consistent and secure flow of information, mitigating potential disruptions and upholding the integrity of electronic communication. Therefore, attention to these details provides for a maximized functionality in electronic mail.