Five steps to mobile unified communications

In this interactive podcast, Michael Finneran and Kara Gattine count down the top five tips that communication pros need to know when investigating a mobile unified communications (UC) solution.

Mobile unified communications extends the benefits of unified communications to users on the go. For many companies, this allows flexibility for employees to travel freely without being tied to a desktop. In this interactive podcast, Michael Finneran and Kara Gattine count down the top five tips that communication professionals need to know when investigating a mobile unified communications (UC) solution. Listen as Michael and Kara talk about mobile UC options, capabilities, pilots and strategy.

Be sure to check out Michael's three-part tutorial, starting with the benefits of mobile UC, implementing mobile UC, and information about mobile UC products.

Play now:

You must have Adobe Flash Player 7 or above to view this content.See http://www.adobe.com/products/flashplayer to download now.
Download for later:

Investigating a mobile unfiied communications solution
• Internet Explorer: Right Click > Save Target As
• Firefox: Right Click > Save Link As
This was last published in August 2009

Dig Deeper on EMM tools | Enterprise mobility management technology

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

Close