Unisys Blogs

Innovative Thinkers and Industry Leaders Sharing Insights and Perspectives

Recent Posts


blogimage_cloudcomputing_strategicapplicationagilitythroughthecloud

Strategic Application Agility through the Cloud: A Game-Changer for the Digital Age
Cloud Computing

As part of Digital Transformation, Enterprises are seeking ways to meet the unprecedented levels of speed and flexibility that digital businesses require by adopting new ways of developing and delivering software utilizing the cloud.

Posted by: on January 19th, 2017


blogimage_thinkingsecuritydontdothat

Thinking Security: Don’t DO that
ClearPath

This is the 22nd blog in a series about security and how security is about how you think. How you think about security also determines where the best practices are put – MUST, SHOULD, or COULD as they apply to your environments and computer systems.

Posted by: on January 18th, 2017


universities

Are students the biggest data security risk for universities?
European Voices

In 2003 Mark Zuckerberg got into his university’s private data network. Doing so was effectively against the rules. As was using the images and information he found to create a website that, in time, would become one of the world’s largest companies.

Posted by: on January 18th, 2017


blogimage_itsm_managingtheintersectionsinamultisourcedenvironmentwithsiam

Managing the “intersections” in a multi-sourced environment with SIAM
Disruptive IT Trends

While digitalization has become the synonym of transformation, and a focus of leveraging an eco-system of service providers, IT operations as well as IT vendor & sourcing leaders must reconsider the architectural approach as they are designing and building new services, combining internal/external towers across various teams that provide support.

Posted by: on January 10th, 2017


blogimage_itsm_digitalservicematurity

Digital Service Maturity
ITSM

As organizations move to digital, they must consider the impact to the other 2 "Ps"; People and Process. Joining us today to discuss these people and process challenges is Renee Casanova, Director of the Service Management Advisory Practice at Unisys.

Posted by: on January 3rd, 2017


blogimage_thinkingsecuritytrust

Thinking Security: TRUST
ClearPath

This is the 21st blog in a series about security and how security is about how you think. With the last six blogs, I’ve examined the six more obvious goals of security: authentication, access control, data integrity, confidentiality, availability, and non-repudiation. We need to talk about the secret seventh one: TRUST.

Posted by: on December 20th, 2016


blogimage_enterpriseservicemanagementmeetsdigital

Enterprise Service Management meets Digital
ITSM

Organizations must consider several things when moving to Digital Service Management. Joining us today on Views from the Edge Podcast to talk about this new focus on Digital Service Management and how it is changing the nature of enterprise services is Kathy Shedron, ServiceNow Program Lead with the Service Management Practice at Unisys.

Posted by: on December 20th, 2016


blogimage_theconsumerizationofit

The Consumerization of IT
ITSM

In the transformation to digital, IT leaders must change their perspective on how they view, plan and execute IT. Joining us today on the Views from the Edge podcast is Ian Clayton, Senior Client Advisor from the Unisys Service Management Advisory Practice.

Posted by: on December 15th, 2016


Payment systems

The Payments Systems Regulator has Officially Flexed its Muscles
European Voices

I have followed the PSR’s progress to radically change the way that money moves around in the UK since the inception of the Strategy Forum in October 2015.

Posted by: on December 14th, 2016


blogimage_part4biometricsandwearabletechnology

Part 4: Biometrics and Wearable Technology – the Inevitable Marriage?
On Point

The first three installments of this series looked at the market for wearable devices and how traditional and non-traditional biometrics can be used with current and emerging wearable technology. This final installment examines the technological and sociological barriers confronting wearable biometrics and wraps-up the discussion with five predictions regarding the future of wearable biometrics.

Posted by: on December 14th, 2016


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.