comparison thesis/tex/2-MarketAnalysis.tex @ 212:bbbaf7b328f8

improved swot analysis texts
author meillo@marmaro.de
date Sun, 04 Jan 2009 11:22:21 +0100
parents f2b8481789f6
children 9f30e6625164
comparison
equal deleted inserted replaced
211:f2b8481789f6 212:bbbaf7b328f8
121 \subsection{SWOT analysis} 121 \subsection{SWOT analysis}
122 \label{sec:swot-analysis} 122 \label{sec:swot-analysis}
123 123
124 A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysis should always focus on a specific specific goal to reach with the product. In this case, the main goal is to make email future-safe. 124 A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysis should always focus on a specific specific goal to reach with the product. In this case, the main goal is to make email future-safe.
125 125
126 The two dimension---a subject and the market---are regarded in relation to each other by the analysis. Here the analysis shall be driven by the market's dimension. Thus first opportunities of the market are identified and split into being stengths or weaknesses of email. Then the same is done for threats of the market.
127
128 \subsubsection*{Threats}
129
126 The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it. 130 The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it.
127 131
128 \begin{quote} 132
129 Since receivers pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, or until people can no longer use email. 133 \subsubsection*{Opportunities}
130 \url{http://www.dwheeler.com/guarded-email/guarded-email.html} 134
131 \end{quote} 135 Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and stresses mail servers a lot.
132 136
133 --- 137 The use of various hardware to access mail is another opportunity of the market. But more hardware gets involved and the networks get more complex. Thus the software and infrastructure needed to transfer mail within the growing network might be a weakness of the email system. %fixme: think about that
134
135 Spam is a major threat nowadays and the goal is to reduce it to a bearable level (see section \ref{sec:swot-analysis}). Spam fighting is a war are where the good guys tend to lose. Putting too much effort there will result in few gain. Real success will only be possible with new---better---protocols and abandonning the weak legacy technologies. Hence \masqmail\ should be able to provide state-of-the-art spam protection, but not more.
136
137 Spam is a major threat to email, as described in section \ref{sec:swot-analysis}. The two main problems are forgable sender addresses and that it is cheap to send hundreds of thousands of messages. Hence, spam senders can operate in disguise and have minimal cost.
138
139 ---
140
141 % fixme: hashcash
142
143 Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and and stresses mail servers a lot.
144
145 The use of various hardware to access mail is another opportunity of the market. The software and infrastructure needed to transfer mail within this network might be a weakness of the email system. %fixme: think about that
146 138
147 An opportunity of the market and at the same time a strength of electronic mail is its standardization. Few other communication technologies are standardized and thus freely available in a similar way. %fixme: ref 139 An opportunity of the market and at the same time a strength of electronic mail is its standardization. Few other communication technologies are standardized and thus freely available in a similar way. %fixme: ref
148 Another opportunity and strength is the modular and extensible structure of electronic mail; it can easily evolve to new requirements. %fixme: ref 140 Another opportunity and strength is the modular and extensible structure of electronic mail; it can easily evolve to new requirements. %fixme: ref
149 141
150 The increasing integration of communication channels, is an opportunity for the market. But deciding weather it is a weakness or strength of email is not so easy. It is a weakness because the not possible integration of stream data and the not good integration of large binary data. It is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it easily leads to complexity of software. Complex software is more error prone and thus less reliable. This could be a strength of electronic mail because of its modular design that decreases complexity, but real integration is harder to do than in monolithic systems. 142 The increasing integration of communication channels, is an opportunity for the market. But deciding whether it is a weakness or strength of email is difficult. It is a weakness because the impossible integration of synchronous stream data and the bad integration of large binary data. But it is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it often leads to complexity of software. Complex software is more error prone and thus less reliable. This however could again be a strength of electronic mail because of its modular design that decreases complexity.
151 143
152 Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is easy to see, that the opportunities outweigh. This indicates a still increasing technology. %fixme: ref 144 Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is obvious to see, that the opportunities outweigh. This is an indicator for a still increasing market. %fixme: ref
153 145
154 \begin{figure} 146 \begin{figure}
155 \begin{center} 147 \begin{center}
156 %\input{input/email-swot.tex}
157 \includegraphics[scale=0.75]{img/email-swot.eps} 148 \includegraphics[scale=0.75]{img/email-swot.eps}
158 \end{center} 149 \end{center}
159 \caption{\NAME{SWOT} analysis for email} 150 \caption{\NAME{SWOT} analysis for email}
160 \label{fig:email-swot} 151 \label{fig:email-swot}
161 \end{figure} 152 \end{figure}
162 153
163 The analysis shows what should be done to achieve the goal (Making email future-safe). Spam mail should be reduced as good as possible. Solutions for large data transfers and infrastructures with more nodes moving within the net should be developed, there is a lot of potential. Standardization, modularity and extendability should be used to go even further, these are the key advantages of email. 154 \subsubsection*{Conclusion}
164 %fixme: a bit more concrete, see description of swot analysis 155
156 The result of a \NAME{SWOT} analysis are strategies to react on the identified opportunities and threats, dependent on whether they are strengths or weaknesses of the subject. These strategies are what should be done to achieve the overall goal---here making email future-safe.
157
158 Threats of the market that are weaknesses of the subject should be avoided if possible, or one should prepare against them if they are impossible to avoid. As spam is unavoidable, email must prepare against them. The goal is to reduce spam to a bearable level. Spam fighting is a war where the good guys tend to lose. Putting too much effort there will result in few gain. Hence sufficient spam protection should be provided, but not more.
159
160 Threats that are strengths of the subject should be confronted. Here non were identified.
161
162 For opportunities of the market that are weaknesses of the subject, solutions should be searched. Large data transfers and infrastructures with nodes moving within the network, range here. As a lot of potential is present, it should be used by developing solutions to remove the weaknesses.
163
164 Finally, opportunities that are strengths of the subject. These are standardization, modularity, and extendability. They should be exploited to go even further, these are the key advantages of email.
165
165 166
166 167
167 168
168 169
169 \subsection{Trends for electronic mail} 170 \subsection{Trends for electronic mail}
203 204
204 \name{Mail transfer agent}s are still important in this mail architecture, but in a slightly different way. Their job is not transferring mail anymore---this makes the name misleading---they are used to transport the notifications about new mail to the destinations. This is a quite similar job as they do in the \NAME{SMTP} model. The real transfer of the mail can be done in any way, for example via \NAME{FTP} or \NAME{SCP}. 205 \name{Mail transfer agent}s are still important in this mail architecture, but in a slightly different way. Their job is not transferring mail anymore---this makes the name misleading---they are used to transport the notifications about new mail to the destinations. This is a quite similar job as they do in the \NAME{SMTP} model. The real transfer of the mail can be done in any way, for example via \NAME{FTP} or \NAME{SCP}.
205 %FIXME: add references for IM2000 206 %FIXME: add references for IM2000
206 207
207 208
209 ---
210
211
208 %add ``guarded email'' by dwheeler 212 %add ``guarded email'' by dwheeler
213 \begin{quote}
214 Since receivers pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, or until people can no longer use email.
215 \url{http://www.dwheeler.com/guarded-email/guarded-email.html}
216 \end{quote}
217
209 218
210 %maybe add a third one 219 %maybe add a third one
211 220
221 << hashcash >>
212 222
213 223
214 \subsection{Future-safety of email} 224 \subsection{Future-safety of email}
215 %fixme: rework 225 %fixme: rework
216 It seems as if electronic mail or a similar technology has good chances to survive the next decades. This bases on the assumption that it always will be important to send information messages. These can be notes from other people, or notifications from systems (like a broken or full hard drive in the home server, or the coffee machine ran out of coffee beans). Other communication technologies are not as suitable for this kind of messages, as email, short message service, voice mail, and the like. Telephone talks are more focused on dialog and normally interrupt people. These kind of messages should not interrupt people, unless urgent, and they do not need two-way information exchange. The second argument applies to instant messaging too. If only one message is to be send, one does not need instant messaging. Thus, one type of one-way message sending technology will survive. 226 It seems as if electronic mail or a similar technology has good chances to survive the next decades. This bases on the assumption that it always will be important to send information messages. These can be notes from other people, or notifications from systems (like a broken or full hard drive in the home server, or the coffee machine ran out of coffee beans). Other communication technologies are not as suitable for this kind of messages, as email, short message service, voice mail, and the like. Telephone talks are more focused on dialog and normally interrupt people. These kind of messages should not interrupt people, unless urgent, and they do not need two-way information exchange. The second argument applies to instant messaging too. If only one message is to be send, one does not need instant messaging. Thus, one type of one-way message sending technology will survive.