Unisys Whitepapers


Sort by: Date | Company | Title


The Adoption of Social Computing in the Enterprise
By Unisys | 2/8/2010
Rapid advances in social computing technology are changing the fabric of communication & information sharing. This paper highlights the various phases in the adoption of social computing in the enterprise, also providing a peek into the future of social computing.
Download this now


Who Should Get an iPhone in Your Company? "The CEO" is the Wrong Answer
By Unisys | 13/4/2010
This paper offers insight on how organisations can better manage consumer IT in the workplace and use it to improve employee productivity and business performance. Read on to learn more.
Download this now


Automation Key to Minimising Support Costs While Boosting User Productivity
By Unisys | 13/4/2010
By implementing an IT support model that is based on an enterprise-wide view of IT performance, IT departments are able to deliver support services that maximise employee productivity and business value. Read on to learn more.
Download this now


Invest now to cut future IT services costs
By Unisys | 16/11/2009
Organisations can reduce future IT services and outsourcing costs while improving efficiency by investing in new tools and technologies today..
Download this now


Unisys Secure Cloud Solutions Point of View
By Unisys | 12/10/2009
Cloud computing builds on previous innovations and is poised to alter how corporate IT groups deliver services and end users access the tools and data they need to work productively. This document provides a perspective on the opportunities presented by cloud computing and an overview of the solutions Unisys has developed to enable business to exploit these opportunities.
Download this now


Perfect Storm for Enterprise-Class Clouds 
By Unisys | 12/10/2009
Many data centres have leveraged the benefits of the commoditisation in the computer industry, so what makes cloud computing so remarkable? This paper describes three key characteristics of cloud computing: elasticity (provisioning and deprovisioning resources in real time to meet workload demands), utility (providing resources on a “pay-as-you-go” basis), and ubiquity (providing services available from the worldwide web).
Download this now


Unisys Stealth Solution for Network
By Unisys | 12/10/2009
The Unisys Stealth Solution for Network looks at security in a different way: protect the data on LAN, WAN, and wireless networks, not the datacentre.  This document provides an overview of Unisys Stealth solution.
Download this now


Unisys Stealth SAN Whitepaper
By Unisys | 12/10/2009
This white paper presents a new method of storage security and virtualisation that allows you to consolidate multiple storage networks, each dedicated to a single security level or community of interest, onto a single virtualised storage infrastructure. It also provides a discussion of the SecureParser® technology and Unisys Stealth architecture, which in combination allow secure sharing, cost savings, and continuous operation in consolidated storage networks.
Download this now


Building an effective culture in a multisourced IT environment
By Unisys | 28/8/2009
Although multisourcing is now commonplace, organisations are still faced with the complex task of getting multiple service providers to work towards common goals, often when they have different approaches to planning, delivery and account management. This paper discusses how organisations and service providers can create healthy cultures in multisourced environments to achieve more successful outcomes.
Download this now


Cut with care: don’t harvest the future
By Unisys | 28/8/2009
Organisations that cut IT services without a sound strategy may harm their long-term potential. How can CIOs avoid ‘harvesting the future’?
Download this now