This page contains a Flash digital edition of a book.
Gartner newsletter


Mobilizing Unified Communications


In a world where work is something you do, not some place you go, mobilizing the applications that drive your business is more important than ever.


The real opportunity lies in combining mobilized applications with unified communications (UC) functionality and status information to create a new breed of compelling applications and capabilities. Releasing an application from its fixed restraints delivers value; just focusing on bringing these tools to the mobile environment limits your possibilities.


Creating the real-time mobile enterprise


Mash-ups blend data and functionality from diverse internal and external sources to create new apps, services and experiences beyond the capabilities of a single application. For example, combining a person’s presence information with data from UC apps and back-end systems empowers mobile workers with more relevant, real-time information to take actions and make decisions on the spot.


Organizations are now merging presence and application data with other status information to create intelligent applications that sense, analyze and respond to a variety of real-time events in a typical business day.


Keeping up with change


As mobile devices become the devices of choice and smartphones get smarter, the demand for mobile UC functionality and enterprise apps will continue to escalate. Internal IT organizations are finding it hard to keep up.


The use of personal devices means developers must create mobile apps for an expanding array of changing devices, platforms and screen sizes. The demands on your development resources can be enormous.


Creating mobile applications that leverage the advanced capabilities possible today requires seamless integration between UC tools, business applications, networks and other technologies to provide the optimal user experience.


Employees want to use personal smartphones to communicate and collaborate with customers, partners and suppliers. IT needs the tools to balance that freedom with tight security policies and controls.


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14