Feeds

World finally using unified communications

Aggressive projects more successful

High performance access to file storage

It seems that Unified Communications (UC) has at last started to move beyond the ‘what is it’ stage and hit the mainstream world of real users with real implementations and real experiences.

As we found in our poll (full report available here) at the end of last year with Reg readers, which looked at advanced business communications in the workplace, when we talked about the different components of UC, such as Unified Directory (UD) or Unified Messaging (UM), many have already either implemented these or have them on the agenda to some degree, with only a very small proportion actually having rejected them completely.

This is actually a pretty positive picture, and one that gives companies more confidence when thinking about taking the UC plunge. Implementing UC is a significant initiative, however, and awareness of potential challenges is a critical part of the planning process. If we look at the challenges that Reg readers have either experienced or anticipate, as shown in the chart below, we can learn a lot.

Chart-2-UC

The initial suggestion from this picture, as indicated by the red and orange portion of the bars, is that many businesses see UC implementations as weighed down with quite serious challenges, particularly around integration, security, cost management and a fear of vendor lock in. But on a positive note, a not insignificant proportion of Reg readers say that, in fact these challenges are easily manageable, as indicated by the green portion of the bars. So what can we glean from this?

By analysing this further, we have found that the challenges are lessened to some degree for those users who have taken a more aggressive UC adoption approach, embracing a wider set of components – unified directory, unified messaging and presence for example. Equally those implementing on a wider basis across their company also see benefits. Together these suggest that taking a more all encompassing and joined up approach from the outset, while not necessarily making the UC journey hassle free, can make it a little easier. If we think about this, this is intuitive. We would expect a properly designed and packaged UC solution to lead to fewer integration challenges than with a piecemeal/DIY approach.

It is also notable that those businesses that have embraced UC more aggressively have made certain of more involvement of stakeholders from across the business in driving and supporting initiatives around UC. This makes absolute sense, as the success of strategic implementations of this nature is closely linked to the level of support across the entire business. And of course, implementations which pull in a broader range of stakeholders are much more likely to be properly specified.

Evidence of this more all-inclusive approach is illustrated in the chart below.

From this, we can suggest that businesses which involve a broader reach of stakeholders while introducing UC will be able to better manage the challenges that exist around implementation. Beyond this, however, we would anticipate that a successful, stress-reduced installation is based on a very close relationship between the business and the solutions provider, which takes into account not just the UC inventory, but will play close attention to the business needs, and the impact that UC will have across the business. Working out just what these might be is generally better from those with battle scars and prior experience.

This doesn’t mean that companies should fall in with the vendor hype, and allow themselves to be led down a path that is ultimately not right for them. Typical feedback from Reg readers around what facilitated a UC implementation focusses around involvement of key technical leads during planning and implementation with clear migration plans and slow, well planned integration steps. Opting for open standards as far as possible and closely defining service level agreements (SLAs) that take into account company key performance indicators (KPIs) are also likely to reap rewards. Ensuring that the systems are easy to use, configure and manage is also considered a priority, and should surprise no one.

Ultimately, however, embarking on a UC implementation is not a trivial matter. While this article highlights some of the things we have seen as being important for businesses embarking on UC,we would be really interested in what Reg readers believe works, and of course, what they believe doesn’t. Please let us have your thoughts and experiences in the comments section below. ®

Freeform Dynamics Ltd

High performance access to file storage

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
Skype pimps pro-level broadcast service
Playing Cat and Mouse with the media
Beat it, freetards! Dyn to shut down no-cost dynamic DNS next month
... but don't worry, charter members, you're still in 'for life'
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.