Companies are typically slow and cautious to adopt new technologies. That is partially a function of due diligence and testing to ensure that any new technology or application will function properly and provide value before committing to adopting it. The larger the enterprise, the slower the process of migrating to new technologies or updating applications. Almost every organization has their share of power users though who push the technology envelope and start using bleeding edge technologies as soon as they hit the streets. These users tend to be the “better to ask for forgiveness than permission” crowd and simply attach their rogue devices and install their rogue applications and figure out how to make them work from within the enterprise. In general, this behavior should be discouraged. It can cause problems with the user desktop and the network. It can introduce unknown risks and make the enterprise network open to threats that the network and security administrators are not even aware of. With some technologies though, they reach a sort of “Hundredth Monkey” critical mass and resistance becomes futile. In those cases, organizations are better off trying to figure out the business benefits of the technology and how to incorporate it in a logical and secure way, rather than wasting resources trying to fight it. This article on SearchUnifiedCommunications addresses three consumer unified communications products which have gained in popularity and could serve as a pseudo test environment for organizations looking to define the business value of unified communications.