Posts By Author:
Once considered a “nice to have” collaboration element, social technologies are now an essential driver of effective business collaboration both within the business enterprise as well as external marketing channels.
Unisys subject matter experts examine six disruptive trends in terms of new and ongoing business benefits that CIOs can extract in 2013 and the underlying challenges and complexities they will need to address as part of the journey.
Big Data Trends in 2013: Pre-optimizing IT Infrastructures and Prioritizing High-Value Opportunity Areas
There is no, single, magic skill-set for big data that organizations can secure. A combination of technical and industry oriented anlytical skills will be the order of the day.
In the final installment in our three part point-counterpoint series,Unisys experts give you answers to the question: “When it comes to mobile devices, should IT departments secure the device, the user, the application, or the data?”
Unisys executives share contrasting views on the question: Should security be offensive or defensive?
When it comes to IT strategies, there are few absolutes. Our experts debate and discuss the question “How much security is enough?”
The key theme for 2012 will be one of customer-facing business innovation and organizations will continue to embed six disruptive IT trends into their mission-critical business applications and processes, having cleared some of the earlier technical hurdles.
In 2012 Big Data moves from technical curiosity and pilots to real-life implementation for mainstream organizations. Business challenges will arise related to the business case and prioritization of analytics initiatives, access to data management and analytics skills, and data confidentiality and privacy.
2012 IT Prediction: CyberSecurity Operations Take the Offensive with Integrated Sensors and Intelligent Analytics
In 2012 organizations will continue to mature their CyberSecurity frameworks and capabilities whilst consolidating key systems for cost savings and standardization, and hardening the CyberSecurity perimeter.
Consumerization is fueling enterprise mobility and enabling tremendous opportunities for IT.