Connect thought leaders to you
Did you know that Unisys logistics solutions are used by carriers that move more than 30 percent of the world’s air cargo? These leading cargo carriers collaborate via the Unisys Cargo User Group (UCUG).
Posted by: Editor Executive Conversations on September 30th, 2014
As one of the biggest IT disruptive trends, cloud computing is part of almost every IT conversation. With a hyper growth rate forecasted by most major publications and researchers, the key question is ‘are you executing your strategy to get the most of your cloud investments?'
Posted by: Linda Welch on August 20th, 2014
What is the definition of business value to you? A CIO could increase the value of IT with cost measurements, better collaboration, and increased efficiency but without improved reporting that demonstrate what IT is accomplishing, it can be hard to improve the perception of IT’s value.
Posted by: Linda Welch on August 14th, 2014
IT services must evolve to support a more demanding IT environment, providing an uninterrupted visitor experience created around Persona-based end-user support and across multiple channels and devices. People Computing is the enablement of the Unisys strategy.
Posted by: Laura Presciutti on August 6th, 2014
Highlights the need and move from password authentication to biometric usage to secure and safeguard information.
Posted by: Linda Welch on July 31st, 2014
New business paradigms evolving from the convergence of social networks, mobile computing, analytics and cloud computing (SMAC) forces are blurring the physical and digital worlds creating new opportunities and business models through digital business. Linda Welch highlights the value of API management in the new digital business paradigm.
Posted by: Linda Welch on July 16th, 2014
Data is at the center of everything providing opportunities for information-centric differentiation and competitive advantage. Data needs to be viewed as an enterprise asset. As it becomes a fundamental asset of an enterprise, organizations need to extract the most pertinent information out of existing data to create new value in their enterprise.
Posted by: Linda Welch on July 9th, 2014
Law enforcement, security, financial services and intelligence agencies face continual challenges while handling several forms of intelligence, multiple lines of inquiry and linking different pieces of related information. Read about the challenges of handling the massive amounts of data and linking them all together to prevent, solve, respond and react to crimes and disasters.
Posted by: Linda Welch on June 26th, 2014
Unisys engaged IDG Research Services to conduct research to understand where enterprises are on the mobility maturity curve. We identified a new class of “Mobile Trendsetters” at the top of the mobility maturity curve.
Posted by: Linda Welch on June 10th, 2014
Protecting sensitive data and networks has become a complex proposition for a majority of organizations. Stealth provides proactive protection by cloaking servers and endpoints such that attackers cannot see the device to relegate an attack against.
Posted by: Linda Welch on June 5th, 2014