Impostor syndrome is what’s going on when despite being competent, you feel a bit of a fraud. Impostor Syndrome is very common – including among highly capable senior hot-shots.
While the path to digital transformation is often considered the most significant modernization initiative in the history of the mainframe, the growing yet opposing challenge being posed by a burgeoning skills gap is threatening to slow down or delay many projects.
I had a ‘latte’ of fun working with the Broadcom team to put together this year’s GSE UK keynote session, “Colleagues in Corvettes Getting Cappuccinos.” We invite you to “ride along” with us as we discuss mainframe topics ranging from security, DevOps, and AIOps, to becoming a new mainframer.
In the mainframe context, Security Operations is the uniting of two distinct teams: mainframe and security. In today’s cybersecurity landscape where every endpoint, including the mainframe, is a potential target, mainframe and security operations need to work together to be successful.
As enterprises look for ways to accelerate the delivery of new feature/function to stay ahead in a disrupt-or-be-disrupted world, cloud-native has become the standard for how clients develop, deploy, and manage innovative cloud services at the speed of business.
As this year’s conference is free to attend, we are asking all delegates to make a donation to our chosen charities, the Royal National Lifeboat Institution (RNLI) and Guide Dogs for the Blind.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.