Posts tagged “ClearPath”

On Being Engineers: Deploying Systems

Wednesday, February 11th, 2015

Poor quality deployment will degrade an otherwise well-constructed system. It matters that rigorous engineering standards are applied to the activities involved: initial installation and ongoing operation, providing resilience, and handling updates and new releases.

Read More

The Fabric of IT in Lapland…

Friday, December 12th, 2014

I’ve just visited Lapland again for my annual discussion with Elf Tietokone, the CIO of SantaSystems. Elf had called me to say there had been some exciting developments he wanted to tell me about. So, full of anticipation, I set off.

Read More

On Being Engineers

Monday, November 10th, 2014

The production of software systems is frequently described as a branch of engineering yet the quality of too many applications is not good enough. What can we learn from other forms of engineering to improve quality of IT systems?

Read More

Who Was That Masked Man?

Tuesday, October 21st, 2014

The nightmare of identity theft affects tens of millions of people every year. It disrupts lives, damages reputations, creates financial loss, and provides a cloak of anonymity to criminals.

Read More

Imperfect Security, Intelligent Risk Management

Wednesday, October 1st, 2014

Balancing security risk against business opportunity is an ongoing challenge. Today’s decision about which risks are high for you and which are low will no longer be appropriate when external factors change. That’s why you should plan to regularly re-evaluate your risk management decisions.

Read More

Word of the Day: Social Engineer

Thursday, September 11th, 2014

Your computer systems can have the best technical security in place and still be compromised through that Achilles heel of the modern enterprise: humans.

Read More

It Seemed Like a Good Idea at the Time…

Thursday, August 14th, 2014

Before embarking on any strategic initiative, having a clear understanding of the likely costs and benefits seems obvious. But all too often, this is not the case. The result can be outright failure or limited success at the best.

Read More

Verifying Security Policy Compliance

Thursday, July 31st, 2014

Security best practices call for monitoring compliance with security policies, then taking the appropriate actions if the system is out of compliance. ClearPath Dorado administrators will find this task has now become easier.

Read More

Cyberwar of the Worlds

Wednesday, July 23rd, 2014

A bustling newsroom, shouted directives are barely audible over the commotion. The room quiets as the local news anchor takes his seat behind the rich mahogany newsdesk and the countdown to live begins …

Read More

Trust, but Verify

Wednesday, July 16th, 2014

Each time you upgrade your ClearPath hardware or software, you demonstrate your trust of Unisys. Our newest ClearPath platforms continue the evolution of the Dorado and Libra lines while protecting your investment in applications, IT architectures, business processes, and policies. We look forward to having you verify that the new systems meet all your expectations.

Read More

Back To Top