Title: Wireless EMail: An Enterprise Priority
1Wireless E-Mail An Enterprise Priority
2Key Issues
- What trends will drive mobile e-mail adoption?
- What mobile e-mail architectures and vendors will
become mainstream? - What is the future for wireless e-mail?
3Mobile Is Changing Social Patterns
BusinessThe Real MeetingIs Under the Table
ConsumerSMS/MMS Frenzy
2005 1.5 billion phones comprise the always on
generation.
4Distributed Workforces Emerge
Home Teleworkers 19.8 million
Mobile and Wireless 59.8 million
2003U.S.
Source Gartner
Source BLS
Flexible Work Schedules 28.7 million
Remote and Branch Offices 3 million
Source BLS
Source Cahners
5E-Mail Helps Drive the RTE
An estimated 50 percent of transactions for RTE
are unstructured e-mail. 10 percent will be
wireless by YE06 (0.6 probability).
Blackberry is a symptom.
6Value of Investment Enterprise Effectiveness and
Competitiveness
Access/LeverageInfo.
Collaborative Networks
Coordinated Enterprise
W W W
- Strategic
- Shorten reaction time
- Shorten time to market
- Increase employee satisfaction
- Increase relationship and network value
- Enrich work experience
- Begin cultural shift
- Tactical
- Avoid duplication of effort
- Avoid repeat mistakes
- Increase knowledge transfer and organizational
competency - Gain speed
- Gain consistency
- Get it right the first time
7Mobile Messaging in the Enterprise
Full E-mail
VideoCall
VoiceCall
E-mail
MMS
Info Value
Online E-mail
EMS
VoiceMail
SMS
IM
Mobility/Immediacy
8Wireless E-Mail/PIM Architecture
- Network Routing
- NOC
- Internet
Server
Device
Wireless Network
E-MailGateway
- Sync Methods
- Push
- Server timed
- Device timed
- Device message initiated
- User initiated
Firewall
9How Wireless E-Mail UsersChoose Best-of-Breed
Mobile Tools
Users must carefully weigh user, connectivity and
policy requirements with mobile realities.
- Device Limitations
- Limited display options
- Input limitations
- Portability
- Network Limitations
- Coverage/Roaming
- Speed/Bandwidth
- Vendor viability
- Server Choices
- Synchronization methods
- Security issues
- Browser/Client software
- Additional applications
10Wireless E-Mail/PIM Vendors
Vendors Being Evaluated for Magic Quadrant
Comprehensive Push
SingleDevice/Network
MultipleDevice/Network
August 2003
Other SynchronizationMethods
11Wireless E-Mail/PIM Device Choices
Execute(Compatibility)
Input
View
12Getting Started on Wireless E-Mail
- Determine flexibility on device types.
- Determine carrier-based or internal
implementation. - Assess skill levels for above, outsourcing if
necessary. - Set feature requirements push vs. pull,
security, etc. - Establish short list of vendors (see Gartner
Research) - Select your partner (software and outsourcerif
needed) - Test, implement, monitor and improve.
13Messaging and E-Mail
Content
Pictures
Messaging
Chat
Voice Mail
E-Mail
SMS
AIM/YIM/MSIM
SMTP/POP
Voice Call
MMS
UM
14The Promise of Unified Messaging
Voice Mail Hear, Reply
Unified Queue
Fax View, Re-direct
Data Pager View, Reply
E-Mail View, Hear, Reply
15What Is Integrated Messaging?
- A model that helps the enterprise, business unit,
- workgroup and individual determine how best to
- send a message specific to
- Message variables(e.g., urgency, content
sensitivity and size) - Message modality(e.g., e-mail, IM or SMS)
- Linkage(e.g., personal preference and presence
awareness)
Integrated messaging is not a technology.
16Integrated Messaging Model
Message Modalities E-mail Voice Mail IM SMS Fax
and others
Message Variables UrgencyNumber of
RecipientsPrivacyCostSize and others
Linkages Personal Preference Presence
Awareness Unified Messaging Unified
Communications and others
17Mobile Drives Multichannel
Internet at Breakfast
AnyDevice
Telematics on the Road
AnyNetwork
over
Internet at Office
AnyContent
to
Internet at Meetings
Internet in the Air
Internet at the Hotel
Internet via Taxi
Enterprise Nervous System
Internet at Leisure
18The Steps to Integrated Nirvana
Universal Multichannel Access Gateway
Unified Messaging
Desktop Portals
Mobile Management
Wireless Web
Wireless E-Mail
PIM Sync
19Recommendations
- Determine application requirements.
- Determine end-user access frequency.
- Determine job/user functions.
- Identify display/device limitations.
- Identify input needs and work-arounds.
- Determine minimum bandwidth speeds and feeds.
- Look critically at network coverage.
- Save integration work in the long term via pilot
programs. - Solicit end-user feedback early and often.
20Wireless E-Mail An Enterprise Priority
21Wireless E-Mail An Enterprise Priority