Welcome!

Perspectives on Industry Trends and Technologies

Jackie Kahle

Subscribe to Jackie Kahle: eMailAlertsEmail Alerts
Get Jackie Kahle via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Jackie Kahle

The security landscape is evolving more than ever before – not only must chief information security officers (CISOs) deal with constant increasing cyber-attack threats and security breaches but they must keep up with mobility trends and concerns about access to data and protecting identities. Mobility is growing at a fast pace, and though it may be easy to construct more barriers to data access, there are much more effective approaches. A new research report by Vanson Bourne sponsored by CA Technologies dives into the security practices within large enterprises. Survey participants include 142 CISOs and CSOS totaling to 1,425 senior IT and business executives globally. The survey results identify a large shift in security priorities and investments as the application economy makes its way to the forefront while also revealing some remarkable benefits. Consumer capab... (more)

Best Practices for DevOps Success By @JackieKahle | @DevOpsSummit [#DevOps]

Four Best Practices for DevOps Success Much of what is written about DevOps focuses on the development team and on making things faster. And the ops team is thinking, "Whoa, slow down! We need to ensure there's quality, so going fast with poor quality doesn't help." So dev and ops are immediately at odds with each other, because their goals are different. You want to center all teams around the common objective of having a predictable and reliable customer experience. That's just not a coding issue. There is a difference between quality of code and quality of experience, and wh... (more)

BYOID Exposes the “Digital Divide” Between IT and the Business

A growing number of websites allow visitors to log in using a digital identity from a trusted 3rd party -- like Facebook, Microsoft, PayPal, or Google. The fancy term for this is "federated identity," but most people call it Bring Your Own Identity, or BYOID. In today's application economy, organizations need to securely deliver new apps to grow their business quickly. This can increase IT risks, which puts a premium on an organization's ability to simplify the user experience without sacrificing security. Using an existing digital or social identity issued by a trusted third pa... (more)

Seven Changes Driving the Future of IT

Today's IT leaders must feel like they are living in a mash-up of two songs -"The Times They Are a-Changin" and "We've Only Just Begun." The question isn't whether the role of IT is changing, it is what you as an IT leader need to do to get ahead of the change. A recent global survey commissioned by CA Technologies and conducted by Vanson Bourne illustrates how radically the role of IT is changing in today's business -- and not always to the benefit of IT leaders and staffers. The survey of 1,300 senior IT leaders from large organizations in 21 countries explored the IT departmen... (more)

Eliminating Mobility Silos

While Bring Your Own Device (BYOD) programs are very widely adopted, far fewer companies have implemented a comprehensive enterprise mobility strategy. When there isn't a consistent governance policy in place, the approach to mobility tends to become fragmented and siloed, with each department executing on its own strategy. Without a high-level, enterprise view of mobility and the governance policy to support it, mobility management will be supported by a series of redundant and fragmented point solutions, which can be quite costly. Worse still, failure to implement an end-to-en... (more)