Unisys Australia Whitepapers


Sort by: Date | Company | Title


The importance of Kaizen in ITSM: When IT service management isn’t what it could be
By Unisys Australia | 13/10/2014

To improve business processes and gain efficiency, its important to identify the signs that your ITSM solution is outdated, inefficient or both. In this paper we look at key questions'you should be asking, such as:

• Is your IT staff still using time-consuming manual methods to address common service requests and IT requirements? • Does your organisation lack an automated Service Request Management (SRM) system? • Is your current ITSM solution able to support all your IT reporting and information needs?

Download this now


ITSM not by the Book: Gain operational insight and change how you view ITSM
By Unisys Australia | 13/10/2014

Many organisations believe they can transform their IT operations by simply buying a new management tool. However, this is just the start. This whitepaper discusses the dynamics of a complete transformation: • Learn why IT management tools should be more than "plug & play" • The 5-step plan to implementing ITSM for the best results long-term • Understand why your approach should be more about the data and less about the tool itself

Download this now


The power of information, technology, service and management
By Unisys Australia | 7/10/2014

The approach to ITSM is evolving to encapsulate more end-user and enterprise functions. This whitepaper uncovers new ways to extend ITSM to deliver greater benefits to the organisation. • Learn the three-step approach to tapping into the information from your end-user community • How to build a supply chain model that creates growth and retention • Four case studies of companies using information to streamline and create mature ITSM functions

Download this now


The Adoption of Social Computing in the Enterprise
By Unisys Australia | 2/8/2010

Rapid advances in social computing technology are changing the fabric of communication & information sharing. This paper highlights the various phases in the adoption of social computing in the enterprise, also providing a peek into the future of social computing.

Download this now


Who Should Get an iPhone in Your Company? "The CEO" is the Wrong Answer
By Unisys Australia | 13/4/2010

This paper offers insight on how organisations can better manage consumer IT in the workplace and use it to improve employee productivity and business performance. Read on to learn more.

Download this now


Automation Key to Minimising Support Costs While Boosting User Productivity
By Unisys Australia | 13/4/2010

By implementing an IT support model that is based on an enterprise-wide view of IT performance, IT departments are able to deliver support services that maximise employee productivity and business value. Read on to learn more.

Download this now


Invest now to cut future IT services costs
By Unisys Australia | 16/11/2009

Organisations can reduce future IT services and outsourcing costs while improving efficiency by investing in new tools and technologies today..

Download this now


Unisys Secure Cloud Solutions Point of View
By Unisys Australia | 12/10/2009

Cloud computing builds on previous innovations and is poised to alter how corporate IT groups deliver services and end users access the tools and data they need to work productively. This document provides a perspective on the opportunities presented by cloud computing and an overview of the solutions Unisys has developed to enable business to exploit these opportunities.

Download this now


Perfect Storm for Enterprise-Class Clouds 
By Unisys Australia | 12/10/2009

Many data centres have leveraged the benefits of the commoditisation in the computer industry, so what makes cloud computing so remarkable? This paper describes three key characteristics of cloud computing: elasticity (provisioning and deprovisioning resources in real time to meet workload demands), utility (providing resources on a “pay-as-you-go” basis), and ubiquity (providing services available from the worldwide web).

Download this now


Unisys Stealth Solution for Network
By Unisys Australia | 12/10/2009

The Unisys Stealth Solution for Network looks at security in a different way: protect the data on LAN, WAN, and wireless networks, not the datacentre.  This document provides an overview of Unisys Stealth solution.

Download this now
[]