docs/diploma
diff thesis/tex/2-MarketAnalysis.tex @ 123:f2046b9c5382
spell checking done
author | meillo@marmaro.de |
---|---|
date | Thu, 04 Dec 2008 10:53:34 +0100 |
parents | 1beb702fdcd9 |
children | 27ddf2506157 |
line diff
1.1 --- a/thesis/tex/2-MarketAnalysis.tex Thu Dec 04 09:34:08 2008 +0100 1.2 +++ b/thesis/tex/2-MarketAnalysis.tex Thu Dec 04 10:53:34 2008 +0100 1.3 @@ -1,7 +1,7 @@ 1.4 \chapter{Market analysis} 1.5 \label{chap:market-analysis} 1.6 1.7 -This chapter analyses the current situation and future trends, for electronic communication in general and email in particular. First electronic mail's position within other electronic communication technologies is located. Then trends for the whole field of electronic communication are shown. Afterwards opportunities and threats in the market are located and trends for email are figured out. The insights of these analysis result in a summary of things that are important for developing future-prove email software. 1.8 +This chapter analyzes the current situation and future trends, for electronic communication in general and email in particular. First electronic mail's position within other electronic communication technologies is located. Then trends for the whole field of electronic communication are shown. Afterwards opportunities and threats in the market are located and trends for email are figured out. The insights of these analysis result in a summary of things that are important for developing future-prove email software. 1.9 1.10 1.11 1.12 @@ -13,22 +13,22 @@ 1.13 1.14 As globalization proceeds and long distance communication becomes more and more important. The future of electronic communication is bright. 1.15 1.16 -Electronic communication includes the following technologies: electronic mail (email), instant messaging (\name{IM}), chats (e.g.\ \NAME{IRC}), short message service (\NAME{SMS}), voicemail, video messages, and Voice over \NAME{IP} (\NAME{VoIP}). 1.17 +Electronic communication includes the following technologies: electronic mail (email), instant messaging (\name{IM}), chats (e.g.\ \NAME{IRC}), short message service (\NAME{SMS}), voice mail, video messages, and Voice over \NAME{IP} (\NAME{VoIP}). 1.18 1.19 1.20 \subsection{Classification} 1.21 -Types of electronic communication can be divided in synchron and asynchron communication. Syncron communication is direct dialog with little delay. Telephone conversation is an example. Asynchron communication consists of independent messages. Dialogs are possible as well, but not in the same direct fashion. These two groups can also be split by the time needed for data delivery. Synchron communication requires nearly real-time delivery, whereas for asynchron communication message delivery times of several seconds or even minutes are sufficent. 1.22 +Types of electronic communication can be divided in synchronous and asynchronous communication. Synchronous communication is direct dialog with little delay. Telephone conversation is an example. Asynchronous communication consists of independent messages. Dialogs are possible as well, but not in the same direct fashion. These two groups can also be split by the time needed for data delivery. Synchronous communication requires nearly real-time delivery, whereas for asynchronous communication message delivery times of several seconds or even minutes are sufficient. 1.23 1.24 -Another possible separation is to distinguished written and recorded information. Recorded information, like audio or video data, is accessable only in a linear way by spooling and replay. Written information, on the other hand, can be accessed in arbitary sequence, detail and speed. 1.25 +Another possible separation is to distinguished written and recorded information. Recorded information, like audio or video data, is accessible only in a linear way by spooling and replay. Written information, on the other hand, can be accessed in arbitrary sequence, detail and speed. 1.26 1.27 Lenke and Schmitz \cite{lenke95} use the same criteria to classify \emph{new media}. %fixme: is this term common? 1.28 -They additionally divide into local and remote communication---the latter is presumed here---and by the number of communication participants. As communication technologies for n:m communication (like chatrooms) are usable for 1:1 too (private chat), and ones for 1:1 (email) are usable for n:m (mailing lists), a classification by participant structures is ommited here. 1.29 +They additionally divide into local and remote communication---the latter is presumed here---and by the number of communication participants. As communication technologies for n:m communication (like chat rooms) are usable for 1:1 too (private chat), and ones for 1:1 (email) are usable for n:m (mailing lists), a classification by participant structures is omitted here. 1.30 1.31 -Figure \ref{fig:comm-classification} shows a classification of communication technologies sorted by the properties synchron/asynchron and written/recorded. Email and \NAME{SMS} are written and asynchron communication; \NAME{IM} and chats are written information too, but synchron. Recorded information are voicemail and video messages as examples for asynchron communication. VoIP is an example for synchron communication. 1.32 +Figure \ref{fig:comm-classification} shows a classification of communication technologies sorted by the properties synchronous/asynchronous and written/recorded. Email and \NAME{SMS} are written and asynchronous communication; \NAME{IM} and chats are written information too, but synchronous. Recorded information are voice mail and video messages as examples for asynchronous communication. VoIP is an example for synchronous communication. 1.33 1.34 -One might be surprised to find Instant \emph{Messaging} not in the group of \emph{message} communication. Instant Messaging could be put in both groups because it allows asynchron communication additional to being a chat system. The reasons why it is sorted to dialog communication are its primary use for dialog communication and the very fast---instant---delivery time. 1.35 +One might be surprised to find Instant \emph{Messaging} not in the group of \emph{message} communication. Instant Messaging could be put in both groups because it allows asynchronous communication additional to being a chat system. The reasons why it is sorted to dialog communication are its primary use for dialog communication and the very fast---instant---delivery time. 1.36 1.37 -Email is not limited to written information, at least since the advent of \NAME{MIME}, which allows to include multimedia content in textual email messages. Thus recorded information can be sent as subparts of emails. The same applies to Instant Messaging too, where file transfer is an additional subservice offered by most systems. In general recorded information can be transmitted in an encoded textual form. 1.38 +Email is not limited to written information, at least since the advent of \NAME{MIME}, which allows to include multimedia content in textual email messages. Thus recorded information can be sent as sub parts of emails. The same applies to Instant Messaging too, where file transfer is an additional sub service offered by most systems. In general recorded information can be transmitted in an encoded textual form. 1.39 1.40 1.41 1.42 @@ -63,13 +63,13 @@ 1.43 \begin{figure} 1.44 \begin{center} 1.45 \karnaughmap{2}{}{ 1.46 - {\parbox{\kvunitlength}{asynchron\\(messages)}} 1.47 + {\parbox{\kvunitlength}{asynchronous\\(messages)}} 1.48 {written} 1.49 - {\parbox{\kvunitlength}{synchron\\(dialog)}} 1.50 + {\parbox{\kvunitlength}{synchronous\\(dialog)}} 1.51 {recorded} 1.52 }{ 1.53 {\parbox{0.8\kvunitlength}{email\\\NAME{SMS}}} 1.54 - {\parbox{0.8\kvunitlength}{voicemail\\video messages}} 1.55 + {\parbox{0.8\kvunitlength}{voice mail\\video messages}} 1.56 {\parbox{0.8\kvunitlength}{\NAME{IM}\\chat}} 1.57 {\parbox{0.8\kvunitlength}{VoIP\\video conferencing}} 1.58 }{} 1.59 @@ -82,11 +82,11 @@ 1.60 1.61 1.62 \subsection{Life cycle analysis} 1.63 -Life cycle analysis are common for products but also for technologies. This one here is for electronic communication technologies. The first dimensions regarded is the life time of the subject. It is segmented into the introduction, growth, mature, saturation, and decline phases. The second dimension can display sales, market share, importance, or similar values. The graph has always an S-line shape, with a slow start, a rapidly increasing first half, the highest level in the third quater, and a slowly declining end. Reaching the end of the life cycle means, the subject is inherited by its successor or the market situation changed thus making it oldfashioned. 1.64 +Life cycle analysis are common for products but also for technologies. This one here is for electronic communication technologies. The first dimensions regarded is the life time of the subject. It is segmented into the introduction, growth, mature, saturation, and decline phases. The second dimension can display sales, market share, importance, or similar values. The graph has always an S-line shape, with a slow start, a rapidly increasing first half, the highest level in the third quarter, and a slowly declining end. Reaching the end of the life cycle means, the subject is inherited by its successor or the market situation changed thus making it old fashioned. 1.65 1.66 The current position on the life cycle of the introduced communication technologies is depicted in figure \ref{fig:comm-lifecycle}. It is important to notice that there is no time line matching for all of them---some life cycles are shorter than others---the shape of the graph, however, is the same. 1.67 1.68 -Video messages and voicemail are technologies in the introduction phase. Voice over \NAME{IP} is heavily growing these days. Instant Messaging has reached maturation, but still growing. Email is an example for a technology in the saturation phase. Declining does none of the above mentioned; telefax is an example for a declining technology. 1.69 +Video messages and voice mail are technologies in the introduction phase. Voice over \NAME{IP} is heavily growing these days. Instant Messaging has reached maturation, but still growing. Email is an example for a technology in the saturation phase. Declining does none of the above mentioned; telefax is an example for a declining technology. 1.70 1.71 \begin{figure} 1.72 \begin{center} 1.73 @@ -126,14 +126,14 @@ 1.74 Following are the trends for electronic communication. The trends are shown from the view point of \mta{}s. Nevertheless are these trends common for all of the communication technology. 1.75 1.76 \subsubsection*{Consolidation} 1.77 -There is a consolidation of communication technologies with similar transport characteristics, nowadays. Email is the most flexible kind of asynchron communication technology already in major use. Hence email is the best choice for transfering messages of any kind today. But in future it probably will be \name{Unified Messaging}, which tries to group all kinds of asynchron messaging into one communication system. It aims to provide a single transport protocol for all content and a flexible access interface for all kinds of clients. Unified messaging seems to have the potential to be the successor of all asynchron communication technologies, including email. 1.78 +There is a consolidation of communication technologies with similar transport characteristics, nowadays. Email is the most flexible kind of asynchronous communication technology already in major use. Hence email is the best choice for transferring messages of any kind today. But in future it probably will be \name{Unified Messaging}, which tries to group all kinds of asynchronous messaging into one communication system. It aims to provide a single transport protocol for all content and a flexible access interface for all kinds of clients. Unified messaging seems to have the potential to be the successor of all asynchronous communication technologies, including email. 1.79 1.80 -Today email still is the major asynchron communication technology and it probably will be it for the next years. As Unified Messaging needs similar transfer facilities to email, it may to be an evolution not a revolution. Hence \mta{}s will still have importance in future, maybe in a modified way. 1.81 +Today email still is the major asynchronous communication technology and it probably will be it for the next years. As Unified Messaging needs similar transfer facilities to email, it may to be an evolution not a revolution. Hence \mta{}s will still have importance in future, maybe in a modified way. 1.82 %todo: decentral organization, like the internet -> MTAs are well suited -> further technologies will need something similar 1.83 1.84 1.85 \subsubsection*{Integration} 1.86 -Integration of communication technologies becomes popular. This goes beyond consolidation, because communication technologies of different kinds are bundled together to make communication more convenient for human. User interfaces tend to this direction. The underlying technologies will get grouped, but it seems as if synchron and asynchron communication can not be joined together in a sane way, so they will probably only merge at the surface. 1.87 +Integration of communication technologies becomes popular. This goes beyond consolidation, because communication technologies of different kinds are bundled together to make communication more convenient for human. User interfaces tend to this direction. The underlying technologies will get grouped, but it seems as if synchronous and asynchronous communication can not be joined together in a sane way, so they will probably only merge at the surface. 1.88 1.89 1.90 1.91 @@ -144,7 +144,7 @@ 1.92 1.93 Smart Phones match well the requirements of recorded data, for which they were designed. Writing text is not good to do with the minimal keyboards available for smart phones; speech to text converters may provide help in future. This leaves us with the need for ordinary computers for the field of exchanging documents and as better input hardware for all written information. 1.94 1.95 -It seems as if a combination of computers and smart phones will be the hardware used for communication in future. Both specialized to the best matching communication technologies, but supporting the others too. Hence facilities for transfering information off and onto the devices will be needed. 1.96 +It seems as if a combination of computers and smart phones will be the hardware used for communication in future. Both specialized to the best matching communication technologies, but supporting the others too. Hence facilities for transferring information off and onto the devices will be needed. 1.97 1.98 1.99 1.100 @@ -153,17 +153,17 @@ 1.101 1.102 According to Michael Osterman \citeweb{howto-def-uc}, unified communications is already possible as far as various incoming sources are routed to one storage where messages can be accessed by one or a few clients. But a system with an ``intelligent parser of a single data stream into separate streams that are designed to meet the real-time needs of the user'' is a goal for the future, he says. 1.103 1.104 -The question is, if the integration of synchronous and asynchronous message transfer does make sense. A communication between one person talking on the phone and the other replying using his instant messenger, certainly does, if the text-to-speech and speech-to-text convertion is fast and the quality good enough. But transfering large video messages and real-time communication data with the same technology, possibly does not. 1.105 +The question is, if the integration of synchronous and asynchronous message transfer does make sense. A communication between one person talking on the phone and the other replying using his instant messenger, certainly does, if the text-to-speech and speech-to-text converting is fast and the quality good enough. But transferring large video messages and real-time communication data with the same technology, possibly does not. 1.106 1.107 1.108 1.109 \subsubsection*{Unified Messaging} 1.110 \label{sec:unified-messaging} 1.111 -\name{Unified messaging}, although often used exchangeable with unified communications, is only a subset of it. It does not require real-time data transmission and is therefor only usable for asynchronous communication \citeweb{wikipedia:uc}. Unified messaging's function is basically: Receiveing incoming messages from various channels, converting it to a common format, and storeing it into a single space. The stored messages can then be accessed from different devices. \citeweb{wikipedia:um} 1.112 +\name{Unified messaging}, although often used exchangeable with unified communications, is only a subset of it. It does not require real-time data transmission and is therefor only usable for asynchronous communication \citeweb{wikipedia:uc}. Unified messaging's function is basically: Receiving incoming messages from various channels, converting it to a common format, and storing it into a single space. The stored messages can then be accessed from different devices. \citeweb{wikipedia:um} 1.113 1.114 The easiest way of unified messaging is to base it on either email and convert all input sources to email messages (as attachments for instance) and store them in the user's mail box. Or use the telephone system as basis and convert text messages to speech. Both is no problem for asynchronous communication. 1.115 1.116 -Finally a critical voice from Jesse Freund, who voted unified messaging on top of a hype list for \name{Wired.com}, ten years ago \cite{wired:hype}. His description of the technology ended with the humorous sentences: ``Unified messaging is a nice idea, but a tough sell: The reason you bought a cell phone, a pager, and a fax/modem is because each does its job well. No one wants to download voicemail as a series of RealAudio messages or sit through a voicemail bot spelling out email, complete with `semicolon dash end-parenthesis' for ;-).'' 1.117 +Finally a critical voice from Jesse Freund, who voted unified messaging on top of a hype list for \name{Wired.com}, ten years ago \cite{wired:hype}. His description of the technology ended with the humorous sentences: ``Unified messaging is a nice idea, but a tough sell: The reason you bought a cell phone, a pager, and a fax/modem is because each does its job well. No one wants to download voice mail as a series of RealAudio messages or sit through a voice mail bot spelling out email, complete with `semicolon dash end-parenthesis' for ;-).'' 1.118 1.119 1.120 %todo: have a result here? 1.121 @@ -173,24 +173,24 @@ 1.122 1.123 \section{Electronic mail} 1.124 1.125 -After viewing the whole market of electronic communication, a zoom in to the market of electronic mail follows. Email is an asynchron communication technology that transports textual information primary. This thesis is about a \mta, so the market situation for email is important. Interesting questions are: Is email future-safe? How will electronic mail change? Will it change at all? Which are the critical parts? These questions matter when deciding on the directions for further development of an \MTA. They are discussed in this section. 1.126 +After viewing the whole market of electronic communication, a zoom in to the market of electronic mail follows. Email is an asynchronous communication technology that transports textual information primary. This thesis is about a \mta, so the market situation for email is important. Interesting questions are: Is email future-safe? How will electronic mail change? Will it change at all? Which are the critical parts? These questions matter when deciding on the directions for further development of an \MTA. They are discussed in this section. 1.127 1.128 1.129 1.130 \subsection{SWOT analysis} 1.131 1.132 -A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysises should always focus on a specific specific goal to reach with the product. In this case, the main goal is to make email future-safe. 1.133 +A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysis should always focus on a specific specific goal to reach with the product. In this case, the main goal is to make email future-safe. 1.134 1.135 -The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quater of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the botnets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positiv for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it. 1.136 +The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\%, ranging from a low of 64\% to a peak of 94\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it. 1.137 1.138 -Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transfered. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and and stresses mail servers a lot. 1.139 +Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for unified messaging, lots of voice and video mail will need to be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and and stresses mail servers a lot. 1.140 1.141 The use of various hardware to access mail is another opportunity of the market. The software and infrastructure needed to transfer mail within this network might be a weakness of the email system. %fixme: think about that 1.142 1.143 An opportunity of the market and at the same time a strength of electronic mail is its standardization. Few other communication technologies are standardized and thus freely available in a similar way. %fixme: ref 1.144 -Another opportunity and strength is the modular and extendable structure of electronic mail; it can easily evolve to new requirements. %fixme: ref 1.145 +Another opportunity and strength is the modular and extensible structure of electronic mail; it can easily evolve to new requirements. %fixme: ref 1.146 1.147 -The increasing integration of communication channels, is an opportunity for the market. But deciding weather it is a weakness or strength of email is not so easy. It is a weakness because the not possible integration of stream data and the not good integration of large binary data. It is also a strength, because arbitary asynchron communication data already can be integrated. On the other hand, the integration might be a threat too, because it easily leads to complexity of software. Complex software is more error prone and thus less reliable. This could be a strength of electronic mail because of its modular design that decreases complexity, but real integration is harder to do than in monolitic systems. 1.148 +The increasing integration of communication channels, is an opportunity for the market. But deciding weather it is a weakness or strength of email is not so easy. It is a weakness because the not possible integration of stream data and the not good integration of large binary data. It is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it easily leads to complexity of software. Complex software is more error prone and thus less reliable. This could be a strength of electronic mail because of its modular design that decreases complexity, but real integration is harder to do than in monolithic systems. 1.149 1.150 Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is easy to see, that the opportunities outweigh. This indicates a still increasing technology. %fixme: ref 1.151 1.152 @@ -200,7 +200,7 @@ 1.153 --------------------------------------------------- 1.154 | | | 1.155 strength | standard | | 1.156 - of email | modular,extendabl| | 1.157 + of email | modular,extensible| | 1.158 | | | 1.159 --------------------------------------------------- 1.160 | big data transfer| | 1.161 @@ -235,11 +235,11 @@ 1.162 %fixme: check for non-breakable dash 1.163 freemail provider (e.g.\ \NAME{GMX}, \name{Yahoo}, \name{Hotmail}) or provider that offer enhanced mail services that one needs to pay for. Outgoing mail is send either with the webmail client of the provider or using \name{mail user agent}s sending it to the provider for relay. Incoming mail is read with the webmail client or retrieved from the provider via \NAME{POP3} or \NAME{IMAP} to the local computer to be read in the \name{mail user agent}. This means all mail sending and receiving work is done by the provider. 1.164 1.165 -The reason therefor is originated in the time when people used dial-up connections to the internet. A mail server needs to be online to receive email. Sending mail is no problem, but receiving it is hardly possible with an \MTA\ being few time online. Internet service providers had servers running all day long connected to the internet. So they offered email service. 1.166 +The reason therefor is originated in the time when people used dial-up connections to the Internet. A mail server needs to be online to receive email. Sending mail is no problem, but receiving it is hardly possible with an \MTA\ being few time online. Internet service providers had servers running all day long connected to the Internet. So they offered email service. 1.167 1.168 -Nowadays, dial-up internet access is rare; the majority has broadband internet access paying a flat rate for it. So being online or not does not affect costs anymore, even traffic is unlimited. Today it is possible to have an own mail server running at home. The last technical problem remaining are the changing \NAME{IP} addresses one gets assigned every 24 hours. But this is easily solvable with one of the dynamic \NAME{DNS} services around; they provide the mapping of a fixed domain name to the changing \NAME{IP} addresses. 1.169 +Nowadays, dial-up Internet access is rare; the majority has broadband Internet access paying a flat rate for it. So being online or not does not affect costs anymore, even traffic is unlimited. Today it is possible to have an own mail server running at home. The last technical problem remaining are the changing \NAME{IP} addresses one gets assigned every 24 hours. But this is easily solvable with one of the dynamic \NAME{DNS} services around; they provide the mapping of a fixed domain name to the changing \NAME{IP} addresses. 1.170 1.171 -Home servers become popular in these days, for central data storage and multi media services. Being assembled of energy efficient elements, power consumption is no big problem anymore. These home servers will replace video recorders and music collections in the near future. It is also realistic that they will manage heating systems and intercoms too. Given the future leads to this direction, it is a logical step to have email and other communication will be provided by the (or one of) the own server aswell. 1.172 +Home servers become popular in these days, for central data storage and multimedia services. Being assembled of energy efficient elements, power consumption is no big problem anymore. These home servers will replace video recorders and music collections in the near future. It is also realistic that they will manage heating systems and intercoms too. Given the future leads to this direction, it is a logical step to have email and other communication will be provided by the (or one of) the own server as well. 1.173 1.174 After \mta{}s have not been popular for users in the last time, the next years might bring them back to them. Maybe in a few years nearly everyone will have one running at home \dots\ possibly without knowing about it. 1.175 1.176 @@ -247,18 +247,18 @@ 1.177 \subsubsection*{Pushing versus polling} 1.178 The retrieval of email is a field that is about to change now. The old way is to fetch email by polling the server that holds the personal mail box. This polling is done in regular intervals, often once every five to thirty minutes. The mail transfer from the mail box to the \name{mail user agent} is initiated from the mail client side. The disadvantage herewith is the delay between mail actually arriving on the server and the user finally having the message on his screen. 1.179 1.180 -To remove this disadvantage, \name{push email} was invented. Here the server is not polled every few minutes about new mail, but the server pushes new mail directly to the client on arrival. The transfer is initiated by the server. This concept became popular with the smart phones; they were able to do emailing, but the traffic caused by polling the server often was expensive. The concept workes well with mobile phones where the provider knows about the client, but it seems not to be a choice for computers since the provider needs to have some kind of login to push data to the computer. 1.181 +To remove this disadvantage, \name{push email} was invented. Here the server is not polled every few minutes about new mail, but the server pushes new mail directly to the client on arrival. The transfer is initiated by the server. This concept became popular with the smart phones; they were able to do emailing, but the traffic caused by polling the server often was expensive. The concept works well with mobile phones where the provider knows about the client, but it seems not to be a choice for computers since the provider needs to have some kind of login to push data to the computer. 1.182 1.183 -The push concept, however could swap over to computers when using a home server and no external provider. A possible scenario is a home server receiving mail from the internet and pushing it to computers and smart phones. The configuration could be done by the user through some simple interface, like one configures his telephone system to have different telephone numbers ring on specified phones. 1.184 +The push concept, however could swap over to computers when using a home server and no external provider. A possible scenario is a home server receiving mail from the Internet and pushing it to computers and smart phones. The configuration could be done by the user through some simple interface, like one configures his telephone system to have different telephone numbers ring on specified phones. 1.185 %FIXME: add reference to push email 1.186 1.187 1.188 \subsubsection*{Internet Mail 2000} 1.189 -Another concept to redesign the electronic mail system, but this time focused on mail transfer is named ``Internet Mail 2000''. It was proposed by Daniel J.\ Bernstein, the creater of \name{qmail}. Similar approaches were independently introduced by others too. 1.190 +Another concept to redesign the electronic mail system, but this time focused on mail transfer is named ``Internet Mail 2000''. It was proposed by Daniel J.\ Bernstein, the creator of \name{qmail}. Similar approaches were independently introduced by others too. 1.191 1.192 -As main change it makes the sender have the responsibility of mail storage; only a notification about a mail message gets send to the receiver, who can fetch the message then from the sender's server. This is in contrast to the \NAME{SMTP} mail architecture, where mail and the responsibility for it is transfered from the sender to the receiver. 1.193 +As main change it makes the sender have the responsibility of mail storage; only a notification about a mail message gets send to the receiver, who can fetch the message then from the sender's server. This is in contrast to the \NAME{SMTP} mail architecture, where mail and the responsibility for it is transferred from the sender to the receiver. 1.194 1.195 -\name{Mail transfer agent}s are still important in this mail architecture, but in a slightly different way. Their job is not transfering mail anymore---this makes the name missleading---they are used to transport the notifications about new mail to the destinations. This is a quite similar job as they do in the \NAME{SMTP} model. The real transfer of the mail can be done in any way, for example via \NAME{FTP} or \NAME{SCP}. 1.196 +\name{Mail transfer agent}s are still important in this mail architecture, but in a slightly different way. Their job is not transferring mail anymore---this makes the name misleading---they are used to transport the notifications about new mail to the destinations. This is a quite similar job as they do in the \NAME{SMTP} model. The real transfer of the mail can be done in any way, for example via \NAME{FTP} or \NAME{SCP}. 1.197 %FIXME: add references for IM2000 1.198 1.199 1.200 @@ -267,7 +267,7 @@ 1.201 1.202 \subsection{Future-safety of email} 1.203 %fixme: rework 1.204 -It seems as if electronic mail or a similar technology has good chances to survive the next decades. This bases on the assumption that it always will be important to send information messages. These can be notes from other people, or notifications from systems (like a broken or full hard drive in the home server, or the coffee machine ran out of coffee beans). Other communication technologies are not as suitable for this kind of messages, as email, short message service, voice mail, and the like. Telephone talks are more focused on dialog and normally interrupt people. These kind of messages should not interrupt people, unless urgent, and they do not need two-way information exchange. The second argument appies to instant messaging too. If only one message is to be send, one does not need instant messaging. Thus, one type of one-way message sending technology will survive. 1.205 +It seems as if electronic mail or a similar technology has good chances to survive the next decades. This bases on the assumption that it always will be important to send information messages. These can be notes from other people, or notifications from systems (like a broken or full hard drive in the home server, or the coffee machine ran out of coffee beans). Other communication technologies are not as suitable for this kind of messages, as email, short message service, voice mail, and the like. Telephone talks are more focused on dialog and normally interrupt people. These kind of messages should not interrupt people, unless urgent, and they do not need two-way information exchange. The second argument applies to instant messaging too. If only one message is to be send, one does not need instant messaging. Thus, one type of one-way message sending technology will survive. 1.206 1.207 Whether email will be the one surviving, or short message service, or another one, does not matter. Probably it will be \name{unified messaging}, which includes all of the other ones in it, anyway. \MTA{}s are a kind of software needed for all of these messaging methods---programs that transfer and receive messages. 1.208 1.209 @@ -278,12 +278,12 @@ 1.210 \section{What will be important} 1.211 Now that it is explained why email will survive (in some changed but related form), it is time to think about the properties required for \mta{}s in the next years. Because as the fields and kinds of usage change, the requirement change too. 1.212 1.213 -Provider independence through running an own mail server at home asks for easy configuration of the \MTA. Providers have specialists to configure the systems, but ordinary people do not. Solutions are either having some home service system for computer configuration established with specialists coming to one's home to set up the systems; like it is already common for problems with the power and water supply systems. Or configuration needs to be easy and fool-prove, to be done by the owner himself. The latter solution depends on standardized parts that fit together seamlessly. The technology must not be a problem itself. Only settings custom to the users environment should be left open for him to set. This of course needs to be doable using a simple configuration interface like a web interface. Non-technical educated users should be able to configure the system. 1.214 +Provider independence through running an own mail server at home asks for easy configuration of the \MTA. Providers have specialists to configure the systems, but ordinary people do not. Solutions are either having some home service system for computer configuration established with specialists coming to ones home to set up the systems; like it is already common for problems with the power and water supply systems. Or configuration needs to be easy and fool-prove, to be done by the owner himself. The latter solution depends on standardized parts that fit together seamlessly. The technology must not be a problem itself. Only settings custom to the users environment should be left open for him to set. This of course needs to be doable using a simple configuration interface like a web interface. Non-technical educated users should be able to configure the system. 1.215 1.216 \sendmail\ and \name{qmail} appear to have bad positions at this point. Their configuration is complex, thus they would need simplification wrappers around them to provide easy configuration. 1.217 1.218 The approach of wrappers around the main program to make it look easier to the outside is a good concept in general. %FIXME: add ref 1.219 -It still lets the specialist do complex and detailed configuration, and also offering a simple configuration interface to novices. Further more is it well suited to provide various wrappers with different user interfaces (e.g.\ graphical programs, websites, command line programs; all of them either in a questionaire style or iteractive). 1.220 +It still lets the specialist do complex and detailed configuration, and also offering a simple configuration interface to novices. Further more is it well suited to provide various wrappers with different user interfaces (e.g.\ graphical programs, websites, command line programs; all of them either in a questionnaire style or interactive). 1.221 1.222 When \MTA{}s become popular on home servers and maybe even on workstations and smart phones, then performance will be less important. Providers need \mta{}s that process large amounts of mail in short time. Home servers or workstations however, do not see that much mail; they need to handle only tens or hundreds of email messages per hour. Thus performance will probably not be a main requirement for an \MTA\ in future, if they mainly run on private machines. 1.223 1.224 @@ -299,7 +299,7 @@ 1.225 1.226 It seems as if all widely used \mta{}s provide good security nowadays. \name{qmail}'s architecture, also used in \name{postfix}, is generally seen to be conceptually more secure, however. 1.227 1.228 -In summary: Easy configuration, aswell as the somehow opposed flexibility will be important for future \mta{}s. Also will it be security, but not performance. \MTA{}s might become more commodity software, like web servers already are today, with the purpose to include it in many systems and the need of minimal configuration. 1.229 +In summary: Easy configuration, as well as the somehow opposed flexibility will be important for future \mta{}s. Also will it be security, but not performance. \MTA{}s might become more commodity software, like web servers already are today, with the purpose to include it in many systems and the need of minimal configuration. 1.230 1.231 1.232