Feeds

Email churn surges into the tens of billions

Data management headache

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Although it might seem like everybody you know sends you email everyday, as well as lots and lots of people you don’t know, apparently you ain’t seen nothing yet. IDC is claiming that email volumes are going to soar to staggering levels over the next few years as more and more people move online and businesses increasingly turn to electronic means for their business dealings.

The number of email mailboxes is predicted to top more than 1.2 billion by 2005, up from 505 million in 2000, thanks to the staggering growth rate, which will hit a compound annual growth rate of 138 per vcetn , of new email account holders. Naturally, this doesn’t mean that there will be that number of people using email – as many of them will be repeat holders with business, private and personal accounts – but it still means your inbox is going to get pretty busy.

Churn Baby Churn

IDC estimates that the churn of emails is going to grow at such a phenomenal rate that by the end of 2005, the number of person to person emails, which will exclude all of the automated responses and fulfilment emails you will receive, will hit 36 billion worldwide. According to IDC this will have a dramatic effect on the browser market too as more and more people are using browsers to access their email. By 2003, in fact, IDC reckon that 50 per of all email accounts will be accessed through browser.

This is a serious issue. It's not just browsers that are going to be affected. An email explosion means serious data management headaches and, with volumes rising at the rate that IDC predicts, it could become one of the challenges of the next few years.

The general hope within IT departments is that the day- to-day boring stuff, like managing mail servers and archives, is easy enough – leaving the really exciting times for hardcore development an strategy delivery. However, by the look of this rapidly mounting data pile, the day to day management stuff could quite easily become a costly, core focus of a department. And that’s when size really starts to matter.

© IT-Analysis.com.

Remote control for virtualized desktops

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Lawyers mobilise angry mob against Apple over alleged 2011 Macbook Pro crapness
We suffered 'random bouts of graphical distortion' - fanbois
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
US court SHUTS DOWN 'scammers posing as Microsoft, Facebook support staff'
Netizens allegedly duped into paying for bogus tech advice
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Verizon bankrolls tech news site, bans tech's biggest stories
No agenda here. Just don't ever mention Net neutrality or spying, ok?
Inside the EYE of the TORnado: From Navy spooks to Silk Road
It's hard enough to peel the onion, are you hard enough to eat the core?
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.