Archives


This is archives page of Unisys Blogs. Currently the archives consist of 1 posts, 1 pages and 29 comments, with a total of 18 categories and 1 tags.

Tag Cloud

#BalanceForBetter 3Cs 4 tier architecture 5G 9/11 2001 - A Space Odyssey 2013 Disruptive IT Trends 2014 Forecast 2020 AAIM aanbesteding Access Access Control Access Governance AccuSystems active ActiveInsights MedDevice active response advanced biometrics Advanced Data Analytics Advanced Digital Worplace Technology Advanced Threats advisor Agile Agility AI AI as a service AIOps Air cargo air cargo industry Air carriers AirCore Air freight Airline airline employee airline innovation airline passengers Airline Passenger Services airlines airline transformation Airport Airport Biometrics Airport Passenger Facilitation Suite Airports Airport security All-Flash alma Amazon Web Services Amazon Web Services (AWS) ameaças American Council for Technology Industry Advisory Council Americans AMPS analog-digital approach Analtyics Analytics Anthony Wilson Anti-fraud Antivirus API Management APIs aplicações Apollo 11 Apollo 11 Anniversary app development Apple Appliances application Application Assessment Application development application integration Application Lifecycle Application Maintenance Application Managed Services Application Management Application modernizaiton Application modernization Application Mordernization Application performance Application Performance Management Application portfolio management Application Quality Application Rationalization Applications Application Security Application Services Application Sprawl Application Support Services Application Workload Assessments Applied Innovation Applied Innovation Webinar Applied Service Management Applikation app modernization appointment; sales Appraisal Process Apps APRA Architecture armazenamento artficial intelligence Artifical Intelligence Artificial Intelligence artificial intelligence (AI) ASD Ashwin Pal Associate Engagement ATM attack attack vector Augmented reality Augusta Georgia Australia autenticación AuthenTec authentication Automated Governance Automation AutoML autorización Availability aviation Aviation security award Awareness Week AWS Azure B1 Security back-up back-up proces Backup Backward Compatibility Bag Drop Bank Bank accounts bank branch in the digital age bankcard fraud banking Banking; account; switch; digital; multichannel banking challenges 2015 Banking Platforms banking security Banks bank security bank trust BBA behavioral analytics BehavioSec Benefit of Application Rationalization benign and malignant data beschikbaar Best Practices Bi-modal IT BIC Big Bang Big data big data analylics Big Data Analytics bill of materials bimodal Bimodal IT biometria biometric Biometrics BlackBerry Blockchain Blockchain Application Blockchain Applications Blockchain Disruption Blockchain in the Enteprise Blockchain in the Enterprise blog Boarding Body scanners boeteclausules Bollard Bomb Border border control Borderless enterprise Border security bots BPO branch of future banking Breach Breach; Data breaches Breach Prevention Brexit Bring your own device broadband access broking BSFI Business Agility Business Continuation Accelerator business continuity business critical workloads business development Business in the Cloud Business language Business objectives Business plan business strategy business transformation Business Trends Business Value Businessweek Buying Trends BYOA BYOD C-level c-Rim C-Suite Cameras canal canal de negócio Capacity planning Capital Asset Planning Capture the Flag carbon emissions Cargo Cartoon Caseworker CCR Summit Celebrities Centrelink CEO CES CGI Channel Banking Charitable Giving Charity Charles Mok chatbot Chatbots Check In Chief Executive Officer Chief Marketing Officer Chief Risk Officer Chief Security Officer Child Welfare china Choreographer Christchurch earthquake Christmas cibercrime cibercriminales cibercriminosos Cibersegurança cifrado CIO CIO 100 Circuit Breakers cisco CISO Citizen Citizen-centric Citizen Data CJM Clearance-level access ClearPath ClearPath Advisory Services ClearPath ePortal ClearPath Forward! ClearPath Forward Dorado ClearPath Forward Libra ClearPath Forward Security ClearPath Forward Systems ClearPath MCP ClearPath MCP Developer Studio ClearPath MCP Express ClearPath MCP Mobile Monitor App ClearPath OS 2200 ClearPath OS 2200 Express ClearPath OS 2200 Software Series ClearPath Security Client-facing Clinical Engineers Cloaking Cloud cloud-connectivity cloud-driven analytics Cloud-Ready Cloud Adoption Cloud Applications Cloud broker Cloud Challenges cloud compliance Cloud computing Cloud Costs Cloud Factory CloudForte CloudForte Azure Cloud Infrastructure Cloud integration cloud managed services cloud management Cloud Management Platform Cloud Migration cloud native Cloud Operations Cloud Optimisation cloud optimization Cloud Planning Cloud security Cloud Security and compliance Cloud Solutions Cloudstore Cloud Strategy Cloud Success Barometer™ Cloud Transformation CMG CMO CMP Collaboration Combat Consulting Common Vulnerability Scoring System Communication gap Communications Communities of interest community connection community outreach company structure Competition Compliance Computer computer science Computerworld comunicaciones Comunicaciones de datos Concern concierge confidence confidencialidade configuración Configured Password Profiles Conflict Connected Cargo Connected Cars Connected world Consultant Consumer consumer device Consumerización del IT Consumerization Consumerization of IT Consumer Protection consumer security Consumer technology roll-out contactless Container containers Content Continuous Learning Contractors control de acceso Controller Area Network convenience core system Coronavirus Corona Virus Corporate Responsibility Corporate Social Responsibility Corporate Social Responsibility (CSR) cost optimization Courts COVID COVID-19 COVID19 COVID recovery CPS-234 credenciales Credit Card Credit card information Credit cards Credit fraud Crime Criminal Justice Management Critical Infrastructure CRM CRM social CRO Cross-agency cross border protection Cryptographers Cryptography CSO Cultural change culture customer-centric banking Customer-centric strategies customer authentication Customer data right Customer Engagement customer expereince customer experience Customer Experience in Banking customer experience strategy Customer Focus customer interaction Customer loyalty Customer Relationship Management Customer Satisfaction Customer service Customer Trust Customs and Border Control CVSS cyber cyber-centric Cyber Analytics cyber attack Cyberattack Cyber attacks Cyberattacks Cyber crime Cyber crime cyber criminals cybercriminals cybercsecurity cyber events Cyber Monday cyber moonshot cyber resilience cyber risk Cyberrisk Cyber Risk Management Cyber risks Cyber Scam cybersecuity Cyber security CyberSecurity Cybersecurity Analytics cybersecurity awareness Cybersecurity breaches Cybersecurity Framework Cybersecurity Incidents Cybersecurity Moonshot cyber security regulatory penalties Cybersecurity Risks Cyberstrategy cyber threats Cylance código fuente código malicioso dados data Data analytics Data Architecture data backbone Data breach Data Breaches Data center datacenter Data Center Consolidation data center managed services Data Centers data centre Data encryption Data governance data hacking data lakes Data loss Data Management Datamation Magazine Data Mining Data privacy Data Privacy Day Data products Data protection Data protection maturity models Data Retention Data Science Data security Data Smart data visualization Date warehousing Datos Datos Cifrados DCIM DDos Defence Defensa defense contractor Denial of service Denso Wave Department of Defense Department of Homeland Security Department of Navy Department of State Deployment design thinking Desktops Desktopvirtualisierung Desktop Virtualization Developers development device management systems devices DevOps DevSecOps Difference between multichannel and omnichannel banking Digital Digital Banking digital banking in Asia Digital Bill of Materials Digital Business Digital Citizen Digital Government digital government transformation Digital Healthcare Digital Images digitalisierte Verwaltung digital IT Digital Leadership Digital Ledger Digital Marketplace Digital Maturity Digital Mindset Digital Modernization Digital Operating Models Digital Outcomes and Services Digital Platform Digital Poverty Digital Resume Digital Security Digital Service Management Digital Service Management (DSM) Digital Services Digital Strategy Digital Technology Digital Transformation digital trust digital twin digital worker digital workers digital workplace Digital Workplace Divide Digital Workplace Insights Digital Workplace Services Digitisation Disaster Planning Disaster recovery dispositivos dispositivos móviles Disruptions Disruptive IT Trends Disruptive Technology Disruptive Trends distributed cloud Distributed systems diversity Docker documentatie Documents DoD Domestic Violence Dorado Dorado 4100 Dr. Gerhard Knecht DSCSA DSM DWS Dynamic Isolation dynmaic isolation e-commerce E-Government E-mail EAL 4+ NSA EastWest Institute east west institute cybersecurity summit e banking Asia Ebd User Services economic development Economics Economics ClearPath Systems Economist Intelligence Unit edge computing Editorial Edsger Dijkstra Education eGRC Egypt ELC Election Security Electronic Banking Electronic Fraud Electronic Supervision Technologies Elevate embedded banking emergency preparedness Emerging Technologies Emerging Technology Emerging Trends employee engagement employee experience employer Empowerment Encrypted Data Encryption end End-User Computing end-user experience End-User Services End-user support End of Life End of support End point device endpoint protection Endpoint Security end user End User Outsourcing and Support end users End User Support Solutions energy security Engagement Engineering Enhanced Security Profiles ENIAC Enterprise Enterprise Agility enterprise as a service Enterprise Cloud Enterprise Content Management Enterprise Governance Enterprise IT Enterprise Migration Enterprise Output Manager enterprise risk management Enterprise Security enterprise service management Enterprise Systems Enterprise Systems Journal enterprise technologies environment Environmental social and governance (ESG) ePortal equity ervaring escalabilidade ESM Essential 8 Estrategia de movilidad ethical frameworks eu GDPR EU Refugee crisis euro Europe European Executive Exchange EUX Event Safety Evolution EWI Executive Conversations Executive Persona Experience Experience Management Experience Parity expérience client Fabric Fabric-based infrastructure Facebook fake anti-virus software Fall Management falsificación de peticiones FBI Federal Federal Government Federal IT Federal Times Field Services financial financial analytics Financial Fraud Financial Organizations Financial organization theft Financial security Financial services Financial Services; Fintech Financial Services Organizations Financial systems Fingerprints fintech Firewalls FITARA Flash Flash drives Flashlight Flexible Workplace foldables Foreign Affairs Forward Forward! by Unisys Foster Care Fraud fraude cibernética fraude cibernético Fraud prevention FREAK Freight Infrastructure frictionless frictionless security Frost & Sullivan functieprofiel Future Future Matters future of bank branches future of bank employees future of branch banking 2016 future of retail bank branch Future of Work future workforce Future Workplace G-Cloud Gartner GCN GDPR gdpr privacy gender balance general data protection regulation General Services Administration Generation Y generation Z generazioni Georgia Technology Authority Gestão de Risco Getting to Trust Gig Economy Gig Workers Giving Back Giving Tuesday global commerce global expertise gmail Google Google App Engine Google Compute Engine gouvernement numérique Government Government Computer News Government data sharing government IT Governmentl Government Policy Governments government sector Government Technology Graduate grensbeveiliging Grid GSA GSN Magazine hack Hacker Hackers Hacking Hadoop Halloween Hand Sanitization health Health and Human Services healthcare Healthcare IT Healthcare Security Healthcare Security Forum HealthIT Health IT Security Help desk High-speed interconnect High Availability high impact security breaches High Tech HIMSS HIMSS19 HIPAA Hire to Retire history of computing HIT HOLMES Home home appliances. Home Automation Homeland Security Newswire Hong Kong Hong Kong Economic Journal Hospital Security hosting HR HRM huellas dactilares human error Human Resources Human Slavery Humor hutto Hybrid Application Management Hybrid cloud HybridCloud Hybrid enterprise Hybrid IT Hybrid Models Hybrid Office hybrid work Hybrid Workforce hybrid workplace Hypervisor híbrida IaaS IACP Ian Selbie IATA IBAN ICS ICS Security ict IDC Identification Identity identity access Identity fraud Identity Governance Identity intelligence Identity Management identity profiling Identity Protection identity security Identity technologies Identity theft IDG Research Services IDS IKEA Imaging immersive Improve your security posture In-memory data In Case You Missed It inclusion Index Industrial Control Systems Industrial Internet of Things (IIOT) Industrial Manufacturing industry Industry Insights Influence societies Infographic InfoImage Informatiebeveiliging Information security Information sharing InformationWeek Information Week informação Infraestructura de IT infraestrutura Infrastructure Infrastructure as a service Infrastructure security Infrastructure Services infrastructure transformation infrastructuur; infrastructuurproblemen innovatie Innovation Innovative innovazione inseguridad digital Insider threats insight Insights insurance Integrated services Integrated Software Stack Integrated stack Integration integração de sistemas inteligência social InteliServe Intellectual property theft Intelligence International Border international law International policy International Women’s Day Internet Internet-Scale Computing Internet banking Internet of Things Internet of Things (IoT) Interop interoperabilidade Interview IntoMobile Investment Invictus Games IOPS IoT IoT Adoption IoT Security iPad iPads iPhone iPod IPS Iran Irises ISO 20022 IT IT-afdeling IT appliances IT architecture IT as-a-service IT careers IT convergence IT culture IT delivery ITIL IT infrastructure IT Modernization ITOM IT Operations IT processes IT projects IT security it security services IT service delivery IT Service Management IT services ITSM IT support IT transformation IT Trends Java Javelin Strategy & Research Joined Up Government Justice kennis Kevin Mitnick Klantcontact klant contact klantenservice Knack skills kosten Kubernetes Kundenerfahrung La nube Laptops Large-scale Cloud Migration large event security law Law enforcement Layered Security LeanBiz™ Legacy application Legacy Applications Legacy operations Legacy Systems Legacy systems and applications legal les grandes tendances du secteur Libra Libra 4100 lifecycle Life Science and Healthcare Life Sciences Life Sciences Industry LineSight LinkedIn Linux Logistics Los Angeles Times low code Low code No code Loyalty Database Lugar de Trabajo Digital Machine Learning macro industry trends Mainframe Mainframes Makro-Branchentrends Malware malware detection Managed Security managed services Managed Services and Outsourcing Manufacturing Manufacturing IoT Manufacturing Supply Chains Marine Living Marketing Mark Forman Mash-ups Mashable McAfee MCP MCP Express MedDevice Med Device Med Device Management medewerker Medical Device Management Medical Device Purchase Medical Devices Medical Device Safety Medical Device Security Medicare Australia mentorship Metadata Metering micro-segmentation microsegmentation microservices Microsoft Microsoft Azure migration migration services Military Millenials mindfulness minoristas Mission-critical Applications Mission-critical data Mission: Impossible Mission critical mitigation mixed reality ML Mobile Mobile applications Mobile Banking Mobile computing mobile device Mobile devices mobile endgeräte Mobile Malware Mobile payment Mobile payments mobiles Mobile security Mobile services Mobile Trendsetters Mobile wallet Mobilidad Mobility Mobility Maturity Curve Mobility strategy Mobilität mobillity modernisation Modernising Bank systems Money Laundering monitorização Moonshot Morse Code movilidad MSS Multi-Cloud Solution Multichannel multichannel retail Multi Cloud MultiCloud Multi Factor Authentication Multifactor Authentication MVO NAC National Border National Consumer Fraud Week National Cybersecurity Moonshot National security Natural disasters Natural Language Processing NCSAM NelsonHall Netbooks Netherlands Net Promoter Scores Netwerk Network complexity Networking Security Networks New Normal New Zealand NextGen Nicholas Carr nieuwe technologieën NIST NLP no code NoSQL technologies NSCAM NSTAC Nursing Homes nuvem NVI NYDFS Obama Off-Airport Processing Offboarding office Office 365 Olympics Omni-channel Omnichannel omnichannel banking omni channel definition omnichannel vs multichannel omni channel vs multi channel Onboarding OneDrive Online Online banking Online payment Online shopping open-source Open APIs Open Banking Open system Open Systems operating system Operational efficiency Operational Resilience Operational Technology operations Opioid Crisis optimisation Oracle Orchestration Organizational cultural change os OS 2200 OS 2200 Release 16 OT OT ICS Outsourcing Outsourcing Center PaaS pandemic Paperless banking Partitioning partnership Passenger Passenger Data Passenger Experience Passenger Security Password Passwords Patents Patient patient records Patterson Pay-For-Use Payments market payment strategy payment systems PC PCWorld PDAs PDPA People Computing People First Transformation Performance Perimeter Perimeter security Peripheral support permisos Pershing Limited Persona Personalbeschaffung Personal data Personal Data Protection Act personalization personalized banking personalized banking experience Personally Identifiable Information Personal privacy Personal Safety Personal security Personal Technology Personas Personas Advisory Services Petya Pew Internet Pharma pharmaceutical manufacturing Pharmaceutical Sectors Pharmaceutical Supply Chain phishing physical security PII Pilots Pin planning plataforma Podcast police policing Policing; Big Data; law enforcement; analytics Policy Policymakers Ponemon Institute Port scan port security portátiles POS PoV Power Outage predicitve analytics Predict Predictability Predictions Predictions 2016 Predictive Analytics predictive maintenance prevention Prevenção prijsvechters Prisons Privacy privada Private cloud privilegios Problem Management Procurement Productivity profiling profitability Programming progresso project management Project Persona Prosumer protección de datos protección y almacenamiento de datos protection Protect Residents proteção e do armazenamento de dados Provisioning pubblica amministrazione Public cloud Public safety public safety and justice Public Sector public services Puvvada Python pública QR codes quantum Queensland floods Quocirca R&D Rackwise RAD ransomeware ransomware ReadWriteWeb Real-time Analytics and Automation Real-Time Data real-time monitoring Recruitement; Candidate recruiter recruitment recrutement redes redes sociais redirección redução de custos regulated Regulations regulator regulatory environment Regulatory Policy Relationships remote access remote worker Remote Workers remote worker seccurity Remote Workforce Remote Working Removable media reporting Research resiliency Reskilling response Retail retail bank branch design Retail Banking retail banking challenges Retail Bank Transformation Retailers Retail Persona Retail Workers Return on Investment rfp Rick Mayhew Rick Snyder riesgo Risk risk assessment Risk management risk managment Risk mitigation Road Warrior Persona Robert Mueller robo de sesión Robotics ROI Role-based access RPA RSA RSA 2020 RSA Conference RSA conference 2019 RSA SecureID Russia s-Par SaaS Safe Cities Sales Rep sanità Sanjeev Bhagowalia Santa SAP SAP HANA SCADA Scalability SCASA Schneier on Security SC Magazine Scott Adams SDLC seamless secure secure banking secure data secure design secure students secure the supply chain secure university data Securing public networks Securing Your Tomorrow Security Security; malware Security; threat; hacker; attack security; threat; microsegmentation; government; cyber; transformation security assessment security compliance Security concepts Security Concerns security dashboard Security index Security Information and Event Management Security Infrastructure security insights security operations center Security patches Security policy Security Straight Talk Security Strategy Security threats Security Transformation segment customers segurança segurança cibernética Segurança da Informação Segurança Nacional Seguridad seguridad cibernética Seguridad en redes self-service platform Self Help IT Self Service Selling Sensitive data sensores biométricos SEPA SEPA-Migration Service-Oriented Archhitecture Service Delivery Service desk Service Managagement Service management ServiceNow services services publics Shadow IT shared responsibility model shared services Sherlock SIEM SIPRNet SITEL SLA small and medium sized banks small and medium sized financial institutions Smart Smart analytics Smart Buildings smart cards Smart Cities Smart City Smart computing Smart Device Smart Devices SmartEnterprise smart manufacturing Smartphone Smartphones Smart technologies Smart Technologies Cloud Security SMB SME SOA SOA Principles Social computing social engineering social governance Social Innovation Social media Social networking Social networks Social Responsibility social return Social Services Social Technologies Software Software-as-a-Service Software-as-a-Service (SaaS) software-defined infrastructure Software Defined Data Center software defined perimeters software development software development lifecycle Soldier On SOX sPar Speed SSC DeSom SSD Starbucks State Government Stealth Steganography STEM Steve Wozniak Storage Strategic Studies Group Strategy Student education Stuxnet success SunGuard Supply chain Supply Chain Management Sustainability Symantec systeembeheerder tablet Tablets TCO TCO Assessment Services teamwork Technical language Technical Support Services technician techniek Technologie Technology Technology Education and Design technology innovations technology integration tecnologías biométricas Telecommunications teleworking Terrorism Texting Theft protection The Guardian The International Association of Chiefs of Police The Modernizing Government Technology Act The Privacy Project Thinking of Security Thinking Security threat threat protection threats Tim Green tips Toasters Tom Kellerman Tom Patterson tomtalks Total Cost of Ownership Traffic surges training Transaction Transformation transitie transportation Transportation & Logistics Travel and Transportation Travelers TravelSky Trazabilidad Triage Bot Trust Trusted Advisor trusted partners Trust Office Trustworthy Enterprise Twitter Two-factor security U-LEAF U.S. Air Force U.S. federal UK Ukraine ULeaf Unisys Unisys brand Unisys Cares Unisys Cargo User Group Unisys Cloud Success Barometer™ Unisys predictions Unisys Secure Partitioning Unisys Security Index Unisys solutions Unisys Stealth Unisys Stealth® Dynamic Isolation™ Unisys TrustCheck™ Unisys Universe! Conference Unisys Weather United Kingdom University of Pennsylvania Unix Migration Unsiys uOrchestrate uSeg user User experience User Experience (UX) USI usuarios Utility computing utilizadores vaccine varejistas vazamento de dados VDI Venkatapathi Puvvada Verhuizen Verification Vertification V F Grace Video surveillance Viewpoints Vigilancia electrónica Vigilancia física virtualisation Virtualisierung Virtualization virtualização Virtual machine Virtual private networks virus vishing Vision Visual VMWare VoiceSource Express VoIP Volunteering Volunteerism Voz VPNs vulnerabilidades vulnerable WaaS WannaCry Wanna Cry Wealth Managers wearables wearable technology Weather web Web 2.0 applications Wharton Business School What's Trending White House Cybersecurity Legislative Proposal WikiLeaks Win 7 Win 10 Win10 Windows Windows 7 windows7 windows8 windows8.1 windows 10 windows10 Windows 2003 windows migration Windows XP Wiretapping women in IT Work-from-Home Worker Experience Workforce 2020 Working from Home Working remotely workload migration Workplace Workplace services Workspace workspace as a service X-Analytics XLA XML-Schemata XP end-of life XP migration ZDNet Zero Trust Zero Trust Network Access(ZTNA) Zorg öffentlicher Dienst

Last 30 Posts

Monthly Archives

<< Back