Perspectives on Industry Trends and Technologies

Jackie Kahle

Subscribe to Jackie Kahle: eMailAlertsEmail Alerts
Get Jackie Kahle via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Jackie Kahle

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities. Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices. Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience sl... (more)

Eliminating Mobility Silos

While Bring Your Own Device (BYOD) programs are very widely adopted, far fewer companies have implemented a comprehensive enterprise mobility strategy. When there isn't a consistent governance policy in place, the approach to mobility tends to become fragmented and siloed, with each department executing on its own strategy. Without a high-level, enterprise view of mobility and the governance policy to support it, mobility management will be supported by a series of redundant and fragmented point solutions, which can be quite costly. Worse still, failure to implement an end-to-en... (more)

Why Customers are Unhappy with Your Mobile Apps

How quickly do things change in the world of mobility? Just last year, CA Technologies conducted a worldwide survey that told an entirely different story from the one we are hearing today. 2013’s Enterprise Mobility – It’s All About the Apps was a call to action for enterprise IT to keep up with customers mobility demands and employee’s desire for BYOD. If last year was about keeping up with customers’ mobile application demands, this year that issue has all but disappeared. Our 2014 survey respondents released an average of six customer-facing apps last year, and 71 percent of ... (more)

Best Practices for DevOps Success By @JackieKahle | @DevOpsSummit [#DevOps]

Four Best Practices for DevOps Success Much of what is written about DevOps focuses on the development team and on making things faster. And the ops team is thinking, "Whoa, slow down! We need to ensure there's quality, so going fast with poor quality doesn't help." So dev and ops are immediately at odds with each other, because their goals are different. You want to center all teams around the common objective of having a predictable and reliable customer experience. That's just not a coding issue. There is a difference between quality of code and quality of experience, and wh... (more)

BYOID Exposes the “Digital Divide” Between IT and the Business

A growing number of websites allow visitors to log in using a digital identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or Google. The fancy term for this is "federated identity," but most people call it Bring Your Own Identity, or BYOID. In today's application economy, organizations need to securely deliver new apps to grow their business quickly. This can increase IT risks, which puts a premium on an organization's ability to simplify the user experience without sacrificing security. Using an existing digital or social identity issued by a trusted third pa... (more)