Posts tagged for “Consumerization of IT”

Can We Agree to Disagree, Part II
Security

Unisys executives share contrasting views on the question: Should security be offensive or defensive?

Posted by: , and on April 12th, 2012


Can We Agree to Disagree?
Security

When it comes to IT strategies, there are few absolutes​. Our experts debate and discuss the question "How much security is enough?"

Posted by: , and on March 27th, 2012


Is Mobility the End of the Mainframe?
Mobility

Consumer devices and applications are more technologically advanced than their corporate device counterparts. Is this then the death knell for the high-end server?

Posted by: on March 13th, 2012


The Business of APIs and Your Mobile Strategy
Mobility

Increasing demand for mobile devices as business information delivery platforms and emergence of data-as-a-service models means enterprises have to include APIs into their mobile strategy.

Posted by: on February 28th, 2012


Exploiting Social Collaboration: It’s About Culture Change
Social Business

Deriving value from social media is not just about implementing Web 2.0 technology. It is transforming corporate culture by the effective adoption and exploitation of new social tools and processes.

Posted by: on January 26th, 2012


2012 IT Predictions: Disruptive IT Trends Move Into the Fabric of Mission-Critical Systems
Disruptive IT Trends

The key theme for 2012 will be one of customer-facing business innovation and organizations will continue to embed six disruptive IT trends into their mission-critical business applications and processes, having cleared some of the earlier technical hurdles.

Posted by: on January 17th, 2012


2012 IT Prediction: Mobility Initiatives Drive Employee Productivity and Enhance Customer Value
Mobility

In 2012 we expect organizations to fully embrace enterprise mobility as the preferred channel for doing business, providing IT an opportunity to support business growth and gain a competitive advantage.

Posted by: on January 17th, 2012


Year in the Rear View Mirror: Part II
Security

What is Richard Bryant so worked up about? - Hacking threats, and the desire to demystify cyber crime.

Posted by: on December 13th, 2011


Don’t Just Stand There – Do Something!
Mobility

Employers are daunted by the security and support issues given the increasing influx of mobile devices used by employees in​ the workplace. Proactive planning helps bring this challenge under control.

Posted by: on December 9th, 2011


Mobilizing Enterprise Business Processes
Mobility

Mobile computing has the potential to revolutionize business workflows across most industries. How does IT take advantage and prepare for this?

Posted by: on November 30th, 2011


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.