(This article originally appeared in the May 2008 issue of Internet Telephony magazine.)
The main unification in Unified Communications (News - Alert) is between the business telephone and the computer. From the telephone world come voice calls, voice mail, voice conferences and faxes; from the computer world come e-mail, instant messaging and session sharing. The goal of the unification is a user experience where these modes of communication complement each other, for example a unified inbox, where your voice-mails and faxes appear as e-mails, or where clicking on an e-mail address offers the option to place a phone call.
Mobile Unified Communications adds a third device, the smart phone. The smart phone is potentially the perfect device for UC because it is both a computer and a phone.
Adding mobile phones into the UC mix is a major undertaking, and it is being done piecemeal. The first step was taken by RIM, adding corporate e-mail to the mobile phone. The next step is to make the mobile phone behave like a corporate desk phone, offering the features of the PBX

. A step beyond offering PBX features on cell phones is to use WiFi (News - Alert) for voice calls where there is coverage, and to maintain call continuity as the user walks out of WiFi

coverage.
In addition to the usual issue of cost justification, companies considering implementing Mobile Unified Communications face three major types of challenge: security, manageability, and WiFi infrastructure readiness.
Mobile devices face some unique security issues. First, they are easily lost or stolen. Second, they connect to the Internet outside the corporate firewall

. Third they are more personal than computers, and more likely to be compromised by user carelessness. A related security risk is the potential vulnerability of the corporate WiFi network.
Device manageability is paramount to corporate IT departments. They want to be able to enforce policies, to provision and track every device on their network. RIM, Microsoft (News - Alert), and Nokia all pitch manageability as a competitive advantage for their enterprise smart phones.
Voice-over-WiFi makes heavy demands on WiFi networks. Few of them can handle a cutover to Voice over WiFi without an upgrade. WiFi networks don’t normally have enough capacity for more than a few simultaneous conversations, and authentication and admission to WiFi access points is often too slow to allow seamless handover from access point to access point. Fortunately WiFi infrastructure vendors can already deliver a range of ingenious solutions to these issues, and they are continuing to make improvements.
The pieces are all in place. Smart phone sales are exploding. You may be doing Mobile Unified Communications sooner than you think.
Michael Stanford has been an entrepreneur and strategist in Voice-over-IP
for over a decade. His strengths are technical depth, business analytic skills and the ability to communicate clearly. In his current consulting practice, Michael specializes in VoIP
wireless networks, both WiFi and WiMAX (News - Alert). Internet Telephony Magazine recognized him as one of “The Top 100 Voices of IP Communications” and VoIP News named him one of “The 50 Most Influential People in VoIP”. Voice over IP (VoIP) | X |
A real-time communications system that converts voice into digital packets containing media and signaling data that travel over networks using Internet Protocol....more |
Internet Protocol (IP) | X |
IP stands for Internet Protocol, a data-networking protocol developed throughout the 1980s. It is the established standard protocol for transmitting and receiving data
in packets over the Internet. I...more |
Private Branch Exchange (PBX) | X |
Originally, telephone features were provided by telephone central office switching systems, often called CENTREX.�PBX systems emerged as customers wanted to have more calling features and control over...more |
Wireless Fidelity (WiFi) | X |
The IEEE 802.11 wireless LAN standard is usually referred to as Wi-Fi-Wireless Fidelity or RLAN-Radio Local Area Network. The 802.11 standard has evolved into a number of sub-standards 802.11a/b/g/n....more |
Firewall | X |
This is called a Stateful Inspection for a firewall to check, alert or audit the status (state) of the TCP connection - SYN, SYN-ACK or FIN. In other words, this is what a firewall does, check for co...more |