Welcome!

Perspectives on Industry Trends and Technologies

Jackie Kahle

Subscribe to Jackie Kahle: eMailAlertsEmail Alerts
Get Jackie Kahle via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jackie Kahle

A new report sponsored by CA Technologies examines how IT and business leaders aim to sync the security and mobile user experience. CA Technologies’ latest research determines that though top concerns of IT Security practices include the elimination of breaches, data protection and identities – mobility customer experience, in fact, ranks number two in top security priorities. Yes, that really says 42% of respondents say improving mobile customer experience is a top priority for their organization, which is a great thing. After all, did you see how many iPhones Apple sold last quarter? That’s a lot of mobile devices being used for commerce, data collection, work and play. And latest research sees it having an impact on security practices. Digging a little deeper into the results brings more encouraging data: Controllers rank improving mobile customer experience sl... (more)

The Digital Application Economy By @JackieKahle | @ThingsExpo [#IoT]

Healthcare's Ultimate Makeover by the Digital Application Economy After making a doctor’s appointment via your mobile device, you receive a calendar invite. The day of your appointment, you get a reminder with the doctor’s location and contact information. As you enter the doctor’s exam room, the medical team is equipped with the latest tablet containing your medical history – he or she makes real time updates to your medical file. At the end of your visit, you receive an electronic prescription to your preferred pharmacy and can schedule your next appointment. Instantly, you get... (more)

One Simple Step Can Make Your APIs More Secure

APIs - application programming interfaces -- are an old technology that has become today's hottest method for getting critical data to mobile apps. APIs are good for business. APIs drove $2 billion in business for Expedia by securely exposing valuable content to its affiliate network. But there are hidden dangers to using APIs. APIs share many of the same threats that plague the web, but APIs have unique risk profile that must be managed. It is a mistake to think we can secure APIs the same way we secure the web. But there are some really simple things that anyone implementing a... (more)

Eliminating Mobility Silos

While Bring Your Own Device (BYOD) programs are very widely adopted, far fewer companies have implemented a comprehensive enterprise mobility strategy. When there isn't a consistent governance policy in place, the approach to mobility tends to become fragmented and siloed, with each department executing on its own strategy. Without a high-level, enterprise view of mobility and the governance policy to support it, mobility management will be supported by a series of redundant and fragmented point solutions, which can be quite costly. Worse still, failure to implement an end-to-en... (more)

How Can IT Keep up with the Pace of Change?

New research commissioned by CA Technologies and conducted by Vanson Bourne shows the role of IT is changing -- and not to benefit IT leaders in many cases. The survey of 1,300 senior IT leaders worldwide revealed 39% of respondents now see IT as a service broker or consultant to the line of business rather than a full-service provider of all IT services; and 35% of IT spending is occurring outside of the IT department today - and that number is expected to grow to 44% in three years. Other disturbing findings show that just 11% see the role of IT as a developer of new, innovativ... (more)