{"id":1813,"date":"2005-05-27T00:00:00","date_gmt":"2005-05-27T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/27\/683-mln-e-mail-users-worlwide-130-bln-e-mails-sent-daily\/"},"modified":"2021-12-30T11:40:02","modified_gmt":"2021-12-30T11:40:02","slug":"683-mln-e-mail-users-worlwide-130-bln-e-mails-sent-daily","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/05\/27\/683-mln-e-mail-users-worlwide-130-bln-e-mails-sent-daily\/","title":{"rendered":"683 mln e-mail users worlwide, 130 bln e-mails sent daily"},"content":{"rendered":"<p>A new study showing year-end market size, market share, and four-year forecasts (2005 &#8211; 2009) for all core market segments tracked by the Radicati Group, Inc. is now available.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the study, there are about 683 million email users worldwide, with nearly 1.2 billion active email accounts.<\/p>\n<p>In regards to instant messaging (IM), the study shows strong growth in both corporate and consumer IM use.  The IM Management segment of the market, which develops products to manage, archive and secure IM systems is poised for particularly strong growth, growing from $39 million in 2005 to $118 million in 2009.<\/p>\n<p>http:\/\/www.marketwire.com\/mw\/release_html_b1?release_id=85246<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1813","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1813"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1813\/revisions"}],"predecessor-version":[{"id":4300,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1813\/revisions\/4300"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}