docs/diploma

view thesis/tex/2-MarketAnalysis.tex @ 304:34ecf52520d3

small update
author meillo@marmaro.de
date Tue, 20 Jan 2009 17:50:28 +0100
parents 822a4b135dd2
children ce3f39d6c1aa
line source
1 \chapter{Market analysis}
2 \label{chap:market-analysis}
4 This chapter analyzes the current situation and future trends, for electronic communication in general and email in particular. First email's position within other electronic communication technologies is located. Then trends for the whole field of electronic communication are shown. Afterwards opportunities and threats in the market and trends for email are identified. The insights of these analysis result in a summary of things that are important for developing future-prove email software.
8 \section{Electronic communication technologies}
10 Electronic communication is ``communication by computer'', according to the \name{WordNet} database of \name{Princeton University} \citeweb{wordnet}. Mobile phones and fax machines should be seen as computers here too. The \name{Science Glossary} of the \name{Pennsylvania Department of Education} describes electronic communication as ``System for the transmission of information using electronic technology (e.g., digital cameras, cellular telephones, Internet, television, fiber optics).'' \citeweb{science-glossary-pa}.
12 Electronic communication needs no transport of tangible things, only electrons, photons, or radio waves need to be transmitted. Thus electronic communication is fast in general. With costs mainly for infrastructure and very low costs for data transmission, electronic communication is also cheap communication. As underlying transport infrastructure, primary the Internet is used; thus electronic communication is available nearly everywhere around the world. These properties---fast, cheap, available---make electronic communication well suited for long distance communication.
14 As globalization proceeds and long distance communication becomes more and more important, the future for electronic communication is bright.
16 Electronic communication includes the following technologies: electronic mail (email), instant messaging (\name{IM}), chats (e.g.\ \NAME{IRC}), short message service (\NAME{SMS}), multimedia message service (\NAME{MMS}), voice mail, video messages, and Voice over \NAME{IP} (\NAME{VoIP}).
19 \subsection{Classification}
20 Electronic communication technologies can be divided in synchronous and asynchronous communication. Synchronous communication is direct dialog with little delay. Telephone conversation is an example. Asynchronous communication consists of independent messages. Dialogs are possible as well, but not in the same direct fashion. These two groups can also be split by the time needed for data delivery. Synchronous communication requires nearly real-time delivery, whereas for asynchronous communication message delivery times of several seconds or minutes are sufficient.
22 Another possible separation is to distinguish recorded and written information. Recorded information, like audio or video data, is accessible only in a linear way by spooling and replay. Written information, on the other hand, can be accessed in arbitrary sequence, detail and speed.
24 \person{Lenke} and \person{Schmitz} use the same criteria to classify \emph{new media} \cite{lenke95}. They additionally divide into local and remote communication---the latter is presumed here---and by the number of communication participants. As communication technologies for many-to-many communication (like chat rooms) are usable for one-to-one (private chat) too, and ones for one-to-one (email) are usable for many-to-many (mailing lists), a classification by participant structures is omitted here.
26 Figure \ref{fig:comm-classification} shows a classification of communication technologies sorted by the properties synchronous/asynchronous and written/recorded. Email and \NAME{SMS} are examples for written and asynchronous communication; \NAME{IM} and chats are ones for written but synchronous communication. Voice mail and video messages stand as examples for recorded asynchronous communication. VoIP represents recorded synchronous communication.
28 \begin{figure}
29 \begin{center}
30 \includegraphics[scale=0.75]{img/comm-classification.eps}
31 \end{center}
32 \caption{Classification of electronic communication}
33 \label{fig:comm-classification}
34 \end{figure}
36 One might be surprised to find Instant \emph{Messaging} not in the group of \emph{message} communication. Instant Messaging could be put in both groups because it allows asynchronous communication additional to being a chat system. The reasons why it is sorted to dialog communication are its primary use for dialog communication and the very fast---instant---delivery time.
38 Email is not limited to written information, at least since the advent of \NAME{MIME}, which allows to include multimedia content in textual email messages. Thus recorded information can be sent as sub parts of emails. The same applies to Instant Messaging too, where file transfer is an additional sub service offered by most systems. In general recorded information can be transmitted in an encoded textual form.
43 \subsection{Life cycle analysis}
44 Life cycle analysis are common for products but also for technologies. This one here is for electronic communication technologies. The first dimensions regarded is the life time of the subject. It is segmented into the introduction, growth, mature, saturation, and decline phases. The second dimension can display sales, market share, importance, or similar values. The graph has always an S-line shape, with a slow start, a rapidly increasing first half, the highest level in the fourth phase, and a slowly declining end. Reaching the end of the life cycle means, the subject gets inherited by successors or the market situation changed thus it is old fashioned.
46 The current position on the life cycle of some selected communication technologies is depicted in figure \ref{fig:comm-lifecycle}. It is important to notice that the time dimension can be different for each technology---some life cycles are shorter than others---the shape of the graph, however, is the same.
48 \begin{figure}
49 \begin{center}
50 \includegraphics[scale=0.75]{img/comm-lifecycle.eps}
51 \end{center}
52 \caption{Life cycle of electronic communication technologies}
53 \label{fig:comm-lifecycle}
54 \end{figure}
56 Video messages and voice mail are technologies in the introduction phase. Voice over \NAME{IP} is heavily growing these days. Instant Messaging has reached maturation, but is still growing. Email is an example for a technology in the saturation phase. Telefax is an example for a declining technology.
58 Email ranges in the saturation phase, which is defined by a saturated market, no more products are needed, there is no more growth. This means, email is a technology used by everyone who want to use it. It is a standard technology. The current form of email in the current market is on the top of its life cycle. The future is decline, sooner or later.
60 But life cycles positions change as the subject or the market changes. An examples is the \name{Flash} animation software. The product's change from a drawing and animation system to a technology for website building, advertising, and movie distribution, and the thus changing target market, made it slip back on the life cycle. If the email system would evolve to become the basis for Unified Messaging (see section \ref{sec:unified-messaging}), a similar slip back would be the consequence.
62 An example for a changing market are the \NAME{DVD} standards \NAME{DVD+} and \NAME{DVD$-$}. With the upcoming next generation formats BlueRay and \NAME{HD-DVD}, a much sooner decline of \NAME{DVD+} and \NAME{DVD$-$} started, even before reaching their last improvement steps in storage size. Such can happen to email too, if Unified Messaging is a revolution to the email system instead of an evolution.
67 \subsection{Trends}
68 Following are the trends for electronic communication. The trends are shown from the view point of \mta{}s. Nevertheless are these trends common for all of the communication technology.
70 \subsubsection*{Consolidation}
71 There is a consolidation of communication technologies with similar transport characteristics, nowadays. Email is the most flexible kind of asynchronous communication technology in major use. Hence email is the best choice for transferring messages of any kind today. But in future it probably will be \name{Unified Messaging}, which tries to group all kinds of asynchronous messaging into one communication system. It aims to provide a single transport protocol for all content and flexible access interfaces for all kinds of clients. Unified messaging seems to have the potential to be the successor of all asynchronous communication technologies, including email.
73 Today email still is the major asynchronous communication technology and it probably will be it for the next years. As Unified Messaging needs similar transfer facilities to email, it may to be an evolution not a revolution. Hence \mta{}s will still have importance in future, maybe in a modified way.
74 %todo: decentral organization, like the internet -> MTAs are well suited -> further technologies will need something similar
77 \subsubsection*{Integration}
78 Integration of communication technologies becomes popular. This goes beyond consolidation, because communication technologies of different kinds are bundled together to make communication more convenient for human beings. User interfaces tend to go the same direction. The underlying technologies are going to get grouped, but it seems as if synchronous and asynchronous communication can not be joined together in a sane way, so they will probably only merge at the surface.
82 \subsubsection*{Communication hardware}
83 Hardware needed for communicating comes from two different roots: On one side, the telephone, now available as mobile phones. This group centers around recorded data and dialog, but messages are supported by the answering machine and \NAME{SMS}. On the other side, mail and its relatives like email, using computers as main hardware. They center around document messages, but do support dialog communication in Instant Messaging and Voice over \NAME{IP}.
85 The last years finally brought the two groups together, with \name{smart phones} being the merging hardware element. Smart phones are computers in the size of mobile phones or mobile phones with the capabilities of computers, however one likes to see it. They provide both functions, being telephones and computers.
87 Smart Phones match well the requirements of recorded data, for which they were designed. Text is difficult to write with the minimal keyboards available for smart phones; speech to text converters may provide help in future. This leaves us with the need for ordinary computers for the field of exchanging documents and as better input hardware for all written information.
89 It seems as if a combination of desktop computers and smart phones will be the hardware used for communication in future. Both specialized to the best matching communication technologies, but with support for the others, too. Hence facilities for transferring information off and onto the devices will be needed.
93 \subsubsection*{Unified Communication}
94 \name{Unified communication} is the technology aiming to consolidate and integrate all electronic communication and providing access for all kinds of hardware clients. Unified communication tries to bring the three trends here mentioned together. The \name{{\smaller PC} Magazine} has the following definition in its Encyclopedia: ``[Unified communications is t]he real-time redirection of a voice, text or e-mail message to the device closest to the intended recipient at any given time.'' \citeweb{pcmag:uc}. The main goal is to integrate all kinds of communication (asynchronous and synchronous) into one system, hence this requires real-time delivery of data.
96 According to \person{Michael Osterman}, unified communications is already possible as far as various incoming sources are routed to one storage where messages can be accessed by one or a few clients \cite{osterman08}. But a system with an ``intelligent parser of a single data stream into separate streams that are designed to meet the real-time needs of the user'' is a goal for the future, he says.
98 The question is, whether the integration of synchronous and asynchronous communication does make sense. A communication between one person talking on the phone and the other replying using his instant messenger, certainly does (assumed the text-to-speech and speech-to-text converting is fast and the quality good enough). But transferring large video messages and real-time communication data with the same technology, possibly does not.
102 \subsubsection*{Unified Messaging}
103 \label{sec:unified-messaging}
104 \name{Unified messaging}, although often used exchangeable with unified communications, is only a subset of it. It does not require real-time data transmission and is therefore only usable for asynchronous communication \citeweb{wikipedia:uc}. Unified messaging's function is basically: Receiving incoming messages from various channels, converting them into a common format, and storing them into a single memory. The stored messages can then be accessed from different devices \citeweb{wikipedia:um}.
106 The easiest way of Unified Messaging is to base it on either email and convert all input sources to email messages (as attachments for instance) and store them in the user's mail box, or use the telephone system as basis and convert text messages to speech. Both is technically possible for asynchronous communication.
108 Finally, a critical voice from \person{Jesse Freund}, who voted Unified Messaging on top of a hype list, published by \name{Wired.com} ten years ago. His description of the technology ended with the humorous sentences:
109 \begin{quote}
110 Unified messaging is a nice idea, but a tough sell: The reason you bought a cell phone, a pager, and a fax/modem is because each does its job well. No one wants to download voice mail as a series of RealAudio messages or sit through a voice mail bot spelling out email, complete with `semicolon dash end-parenthesis' for ;-).
111 \hfill\cite{wired:hype}
112 \end{quote}
119 \section{Electronic mail}
121 After viewing the whole market of electronic communication, a zoom into the market of electronic mail follows. Email is an asynchronous communication technology that transports textual information primary. This thesis is about a \mta, so the market situation for email is important. Interesting questions are: Is email future-safe? How will electronic mail change? Will it change at all? Which are the critical parts? These questions matter when deciding on the directions for further development of an \MTA. They are discussed in this section.
125 \subsection{SWOT analysis}
126 \label{sec:swot-analysis}
128 A \NAME{SWOT} analysis regards the strengths and weaknesses of a subject against the opportunities and threats of its market. The slightly altered form called \name{Dialectical {\smaller SWOT} analysis}, which is used here, is described in \cite{powerof2x2}. \NAME{SWOT} analysis should always focus on a specific goal to reach with the product. In this case, the main goal is to make email future-safe.
130 The two dimension---a subject and the market---are regarded in relation to each other by the analysis. Here the analysis shall be driven by the market's dimension. Thus first opportunities of the market are identified and split into being strengths or weaknesses of email. Then the same is done for threats of the market.
132 \subsubsection*{Threats}
133 The market's main threat is \emph{spam}, also named \name{junk mail} or \name{unsolicited commercial email} (\NAME{UCE}). \person{David~A.\ Wheeler} is clear about it:
134 \begin{quote}
135 Since \emph{receivers} pay the bulk of the costs for spam (including most obviously their time to delete all that incoming spam), spam use will continue to rise until effective technical and legal countermeasures are deployed, \emph{or} until people can no longer use email.
136 \hfill\cite{wheeler03}
137 \end{quote}
138 The amount of spam is huge. Panda Security and Commtouch state in their \name{Email Threats Trend Report} for the second Quarter of 2008: ``Spam levels throughout the second quarter averaged 77\,\%, ranging from a low of 64\,\% to a peak of 94\,\% of all email [...]''\cite[page 4]{panda:email-threats}. The report sees the main reason in the bot nets consisting of zombie computers: ``Spam and malware levels remain high for yet another quarter, powered by the brawny yet agile networks of zombie \NAME{IP}s.''\cite[page 1]{panda:email-threats} This is supported by IronPort Systems: ``More than 80 percent of spam now comes from a `zombie'---an infected \NAME{PC}, typically in a consumer broadband network, that has been hijacked by spammers.''\cite{ironport:zombie-computers}. Positive for \MTA{}s is, that they are not the main source for spam, but it is only a small delight. Spam is a general weakness of the email system, because it can not prevent it.
144 \subsubsection*{Opportunities}
146 Opportunities of the market are large data transfers, coming from multimedia content, which becomes popular. If email is used as basis for Unified Messaging, lots of voice and video mail will be transferred. Email is weak related to that kind of data: the data needs to be encoded to \NAME{ASCII} and stresses mail servers a lot.
148 The use of various hardware to access mail is another opportunity of the market. But more hardware gets involved and the networks get more complex. Thus the software and infrastructure needed to transfer mail within the growing network might be a weakness of the email system. %fixme: think about that
150 An opportunity of the market and at the same time a strength of electronic mail is its standardization. Few other communication technologies are standardized and thus freely available in a similar way. %fixme: ref
151 Another opportunity and strength is the modular and extensible structure of electronic mail; it can easily evolve to new requirements. %fixme: ref
153 The increasing integration of communication channels, is an opportunity for the market. But deciding whether it is a weakness or strength of email is difficult. Due to the impossibility to integrate synchronous stream data and large binary data is it a weakness. But it is also a strength, because arbitrary asynchronous communication data already can be integrated. On the other hand, the integration might be a threat too, because it often leads to complexity of software. Complex software is more error prone and thus less reliable. This however could again be a strength of electronic mail because of its modular design that decreases complexity.
155 Figure \ref{fig:email-swot} displays the \NAME{SWOT} analysis in a handy overview. It is obvious to see, that the opportunities outweigh. This is an indicator for a still increasing market. %fixme: ref
157 \begin{figure}
158 \begin{center}
159 \includegraphics[scale=0.75]{img/email-swot.eps}
160 \end{center}
161 \caption{\NAME{SWOT} analysis for email}
162 \label{fig:email-swot}
163 \end{figure}
165 \subsubsection*{Resulting strategies}
167 The result of a \NAME{SWOT} analysis are strategies to react on the identified opportunities and threats, dependent on whether they are strengths or weaknesses of the subject. These strategies are what should be done to achieve the overall goal---here making email future-safe.
169 Threats of the market that are weaknesses of the subject should be avoided if possible, or one should prepare against them if they are impossible to avoid. As spam is unavoidable, email must prepare against them. The goal is to reduce spam to a bearable level. Spam fighting, with currently used protocols, is a war where the good guys must lose. Investing high effort will result in few gain. Hence sufficient spam protection should be provided, but not more. New concepts and protocols will change this fight; they must be in use before email has become unusable.
171 Threats that are strengths of the subject should be confronted. Here non were identified.
173 For opportunities of the market that are weaknesses of the subject, solutions should be searched. Large data transfers and infrastructures with nodes moving within the network, range here. As a lot of potential is present, it should be used by developing solutions to remove the weaknesses.
175 Finally, opportunities that are strengths of the subject. These are standardization, modularity, and extendability. They should be exploited to go even further, these are the key advantages of email.
181 \subsection{Trends for electronic mail}
182 \label{sec:email-trends}
184 Noting remains the same, so does the email technology not. Emailing in future will probably differ from emailing today. This section tries to identify possible trends affecting the future of electronic mail.
187 \subsubsection*{Provider independence}
188 Today's email structure is heavily dependent on email providers. This means, most people have email addresses from some provider. These can be providers that offer email accounts in addition to their regular services, for example online connections. \NAME{AOL} and \name{T\mbox{-}On\-line} for instance do so. Or specialized email providers that commonly offer free mail as well as enhanced mail services, one must pay for. Examples for email providers are \NAME{GMX}, \name{Yahoo}, and \name{Hotmail}. %fixme: check for non-breakable dash
190 Outgoing mail is send either with the webmail client of the provider or using \name{mail user agent}s sending it to the provider for relay. Incoming mail is read with the webmail client or retrieved from the provider via \NAME{POP3} or \NAME{IMAP} to the local computer to be read using the \name{mail user agent}. This means all mail sending and receiving work is done by the provider.
192 The reason therefor is originated in the time when people used dial-up connections to the Internet. A mail server needs to be online to receive email. Sending mail is no problem, but receiving it is hardly possible with an \MTA\ being few time online. Internet service providers had servers running all day long connected to the Internet. So they offered email service, and they still do.
194 Nowadays, dial-up Internet access became rare; the majority has broadband Internet access paying a flat rate for it. Hence the time being online not affect costs anymore, even traffic is unlimited. Today it is possible to have an own mail server running at home. The technical problem remaining is the changing \NAME{IP} addresses one gets assigned every 24 hours. But this is solvable with one of the dynamic \NAME{DNS} services; they provide the mapping of a fixed domain name to the changing \NAME{IP} addresses.
196 Home servers become popular for central data storage and multimedia services, these days. Being assembled of energy efficient elements, power consumption is no big problem anymore. These home servers will replace video recorders and \NAME{CD} music collections in the near future. It is also realistic that they will manage heating systems and intercoms too. Given the future leads to this direction, it will be a logical step to have email and other communication provided by the own home server as well.
198 After \mta{}s have not been popular for users in the past years, the next years might bring the \MTA{}s back to the users. Maybe in a few years nearly everyone will have one running at home.
201 \subsubsection*{Pushing versus polling}
202 The retrieval of email is a field that is about to change these days. The old way is to fetch email by polling the server that holds the personal mail box. This polling is normally done in regular intervals, often once every five to thirty minutes. The mail transfer from the mail box to the \name{mail user agent} is initiated from the user side. The disadvantage herewith is the delay between mail actually arriving on the server and the user finally having the message on his screen.
204 To remove this disadvantage, \name{push email} was invented. Here the server is not polled every few minutes about new mail, but the server pushes new mail directly to the client on arrival. The transfer is initiated by the server. This concept became popular with smart phones; they were able to do emailing, but the traffic caused by polling the server was expensive.
206 The concept works well with mobile phones where the provider knows about the client, but it does not to be a choice for computers since the provider needs to have some kind of login to push data to the user's computer. Push email, however, could swap over to computers when using a home server and no external provider. A possible scenario is a home server receiving mail from the Internet and pushing it to own workstations and smart phones. The configuration could be done by the user using some simple interface, like one configures his telephone system to have different telephone numbers ringing on specified phones.
207 %FIXME: add reference to push email
209 Another problem is multiple clients sharing one mail box. This is only solvable by working directly in the server's mail box, which causes lots of traffic, or by storing at least information about read messages and the like there.
212 \subsubsection*{New email concepts}
214 Changing requirements for email communication lead to the need for new concepts and new protocols that cover these requirements. One of these concepts to redesign the electronic mail system is named ``Internet Mail 2000''. It was proposed by \person{Daniel~J.\ Bernstein}, the creator of \qmail. Similar approaches were independently introduced by others too.
215 %FIXME: add references for IM2000
217 As main change, the sender has the responsibility for mail storage; only a notification about a mail message gets send to the recipient. He can fetch the message then from the sender's server. This is in contrast to the \NAME{SMTP} mail architecture, where mail and the responsibility for it is transferred from the sender to the receiver (called \name{store-and-forward}).
219 \name{Mail transfer agent}s are still important in this new email architecture, but in a slightly different way. They do not transferring mail itself anymore, but they transport the notifications about new mail to the destinations. This is a quite similar job as they do in the \NAME{SMTP} model. The real transfer of the mail can be done in an arbitrary way, for example via \NAME{FTP} or \NAME{SCP}.
221 A second concept, this one primary to arm against spam, is \person{David~A.\ Wheeler}'s \name{Guarded Email}, described in \cite{wheeler03}. It requires messages to be recognized as Ham (non-spam) to be accepted, otherwise a challenge-response authentication will be initiated.
223 \name{Hashcash} by \person{Adam Back}---a third concept---tries to limit spam and denial of service attacks \cite{back02}. It requests payment for mail to get accepted. The costs are computing time for generating hash values. Thus sending spam becomes expensive. More information can be found on \citeweb{hashcash:homepage}.
225 New concepts, like the ones presented here, are invented to remove problems of the email technology. Internet Mail 2000, for instance, removes the spam and large message transfer problems.
232 \subsection{Important in future}
233 \label{sec:what-will-be-important}
235 Provider independence through running an own mail server at home asks for easy configuration of the \MTA. Providers have specialists to configure the systems, but ordinary people do not. Solutions are either having some home service system for computer configuration established with specialists coming to ones home to set up the systems; like it is already common for problems with the power and water supply systems. Or configuration needs to be easy and fool-prove, to be done by the owner himself. The latter solution depends on standardized parts that fit together seamlessly. The technology must not be a problem itself. Only settings custom to the users environment should be left open for him to set. This of course needs to be doable using a simple configuration interface like a web interface. Non-technical educated users should be able to configure the system.
237 Complex configuration itself is not a problem if simplification wrappers around it do provide an easy interface. The approach of wrappers to make it look easier to the outside is a good concept in general. %FIXME: add ref
238 It still lets the specialist do complex and detailed configuration, and also offering a simple configuration interface to novices. \sendmail\ took this approach with the \name{m4} macros. %fixme: add ref
239 Further more is it well suited to provide various wrappers with different user interfaces (e.g.\ graphical programs, websites, command line programs; all of them either in a questionnaire style or interactive).
241 When \MTA{}s become popular on home servers and maybe even on workstations and smart phones, then performance will be less important. Providers need \mta{}s that process large amounts of mail in short time. However, there is no need for home servers and workstations to handle that much mail; they need to process far less email messages per time unit. Thus performance will probably not be a main requirement for an \MTA\ in future, if they mainly run on private machines.
243 New mailing concepts and architectures like push email or \name{Internet Mail 2000} will, if they succeed, require \mta{}s to adopt the new technology. \MTA{}s that are not able to change are going to be sorted out by evolution. Thus it is important not to focus too much on one use case, but to stay flexible. \person{Allman} saw the flexibility of \sendmail\ one reason for its huge success (see section \ref{sec:sendmail}).
245 Another important requirement for all kinds of software will be security. There is a constant trend coming from completely non-secured software, in the 70s and 80s, over growing security awareness, in the 90s, to security being a primary goal, now. This leads to the conclusion that software security will be even more important within the next years. As more clients get connected to the Internet and especially more computers are listening for incoming connections (like an \MTA\ in a home server), there are more possibilities to break into systems. Securing of software systems will be done with increasing effort in future.
247 ``Plug-and-play''-able hardware with preconfigured software running can be expected to become popular. Like someone buys a set-top box to watch Pay-\NAME{TV} today, he might be buying a box acting as mail server in a few years. He plugs the power cable in, inserts his email address in a web interface and selects the clients (workstation computers or smart phones) to which mail should be send and from which mail is accepted to receive. That's all. It would just work then, like everyone expects it from a set-top box today. Secure and robust software is a pre-requisite for such boxes to make that vision possible.
250 In summary: Easy configuration, as well as the somehow opposed flexibility will be important for future \mta{}s. Also will it be security, but not performance. \MTA{}s might become more commodity software, like web servers already are today, with the purpose to include it in many systems and the need of minimal configuration.
259 \section{Conclusion}
260 \label{sec:market-analysis-conclusion}
261 It seems as if electronic mail or a similar technology has good chances to survive the next decades.
263 It is assumed that it always will be important to send information messages. Those can be notes from people or notifications from systems. No other, current available, communication technology is as suitable for this kind of information transfer, as email, \NAME{SMS}, voice mail, and other asynchronous communication technologies. Synchronous communication, in contrast, is focused on dialog and normally interrupts people. The here needed kind of messages should not interrupt people, unless urgent, and they do not need two-way information exchange. Although synchronous communication could be used for transferring messages, it is not the best choice. The best choice is an asynchronous technology. Thus at least one asynchronous communication technology is likely to survive.
265 Whether email will be the surviving one, is not possible to know by now. It currently seems likely that \name{unified messaging} will be the future for asynchronous communication. But Unified Messaging is more a concept than a technology itself. This concept will base upon one or many underlying transport technologies, like email, \NAME{SMS}, and the like. Its goal is to integrate the transport technologies in order to hide them from the user's view. Currently, email is the most used asynchronous electronic communication technology. It is matured, flexible, and extendable, as well as standardized. These advantages make email a good base transport technology for Unified Messaging. Anyhow, whether email will be the basis for Unified Messaging or not---\MTA{}s are a software needed for all asynchronous communication methods: programs that transfer messages from senders to destinations. Thus, their future is bright.
267 %The trends in the communication market are consolidation, integration, and the merge of communication hardware. All this goes along with market's change to Unified Messaging.
269 Unified Communication, as next step after Unified Messaging, is about the integration of asynchronous an synchronous communication channels. It seems impossible to merge the two worlds on basis of email in an evolutionary way. As only a revolutionary change of the whole email concept would make that merge possible, it is best to ignore it. New designed technologies are usually superior to heavily patched and bent old technologies, anyway. A general merge of synchronous and asynchronous communication has good chances to be fatal for email.
271 Until Unified Communication will become reality---if ever---electronic mail has a good position, also as basis for Unified Messaging.
274 Not only the market influences email's future safety, but also must the email technology itself do its part in evolving to satisfy upcoming needs. Actions to take were discovered by using the \NAME{SWOT} analysis. These are: Prepare against spam. Search solutions for large data transfers and increasing growth and ramification of networks. Exploit standardization, modularity, and extendability.
276 Also needed is awareness for new trends like: Provider independence, new delivery concepts, and completely new emailing concepts, introducing new protocols. Easy configuration will also be important, security will be essential.
279 What kinds of \MTA{}s will be needed in future? Probably ones running on home servers and workstations. This is what \masqmail\ was designed for. But the dial-up Internet connections, which are central to \masqmail's design, become rare. But mobile clients that move between different networks, do need relaying over different locations, dependent on external influences, too. This makes \masqmail\ still be a good \MTA\ for various situations. \masqmail\ is additionally small and it is much easier to configure for situations that are common to workstations and home servers, than other \MTA{}s. Thus \masqmail\ is generally a good program to have for several setups. These setups were quite common some years ago, but are rare now. The trends expected for the next years will lead to new situations where \masqmail\ will be a valuable \MTA.
286 % what about dial-up and other masqmail stuff?
287 % how good is masqmail suited?
288 % how large is the niche?
289 % is it growing?