LOOKING FOR: ADULT FICTION, NON-FICTION Rachel Neely began her publishing career in 2016 at HarperCollins, before moving to Hachette where she worked as an editor for the next six years, specialising in crime and thrillers along with book club novels and contemporary fiction, most recently as a Commissioning Editor at Orion. Rachel joined Mushens Entertainment at the start of 2022 as an Associate Agent, assisting Juliet Mushens with her client list, including multiple Sunday Times and New York Times bestselling authors. Simultaneously she began signing her own clients. In August 2023 she was promoted to Literary Agent and in 2024 achieved Bookseller Rising Star status. In actively growing her list, Rachel is looking for book-club fiction, dark academia, rom-coms, tragic love stories, crime and thrillers. Please note she is not the right agent for sci-fi, espionage novels, YA or children’s books. She signs both commercial and literary authors, and is always looking for a distinctive voice matched with a compelling plot. She also is especially drawn to darker stories that centre characters with tragic fates, dark pasts or buried trauma. She is also keen to find authors from underrepresented groups who can bring a fresh perspective to well-worn story arcs, or capture experiences shared by many but, as of yet, underexplored in fiction. She would love to see a commercial locked-room thriller in the vein of The Midnight Feast, The White Lotus or with shades of Succession; novels about cults such as The Girls; a voice-led serial-killer thriller reminiscent of How to Kill Your Family; compelling dark academia to rival The Secret History; a high-concept but tragic love story that will make her ugly cry in the vein of The Time Traveller’s Wife or One Day; and anything that has an outsider trying to break into the world of the privileged and morally bankrupt. Besides those above, her favourite novels include The List, The Talented Mr Ripley, The Lovely Bones, Other People’s Clothes, The It Girl, The Girl Before, Notes on an Execution, My Dark Vanessa and My Sister the Serial Killer. Rachel would like you to submit a covering letter, 1 - 2 page synopsis and the first 5000 words of your manuscript in a single word document. (In addition to the paid sessions, Rachel is kindly offering one free session for low income/underrepresented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 1st May 2025
Face to face One to one.
LTE Architecture and Protocols course description This course provides a comprehensive tour of the LTE architecture along with services provided and the protocols used. What will you learn Describe the overall architecture of LTE. Explain the information flows through LTE. Describe the LTE security. Describe LTE mobility management. Recognise the next steps for LTE. LTE Architecture and Protocols course details Who will benefit: Anyone working with LTE. Prerequisites: Mobile communications demystified Duration 3 days LTE Architecture and Protocols course contents Introduction History, LTE key features. The 4G ITU process. The LTE 3GPP specifications. Specifications. System Architecture LTE hardware architecture. UE architecture and capabilities. E-UTRAN and eNB. EPC, MME functions, SGW, PGW and PCRF. System interfaces and protocol stacks. Example information flows. Dedicated and default bearers. EMM, ECM, RRC state diagrams. Radio transmission and reception OFDMA, SC-FDMA, MIMO antennas. Air interface protocol stack. Logical, transport and physical channels. Frame and slot structure, the resource grid. Resource element mapping of the physical channels and signals. Cell acquisition, data transmission and random access. MAC, RLC, PDCP protocols. LTE spectrum allocation. Power-on procedures Network and cell selection. RRC connection establishment. Attach procedure, including IP address allocation and default bearer activation. LTE detach procedure. Security in LTE networks LTE security features, identity confidentiality, ciphering and integrity protection. Architecture of network access security in LTE. Secure key hierarchy. Authentication and key agreement procedure. Security mode command procedure. Network domain security architecture. Security associations using IKE and IPSec. Mobility management RRC_IDLE, RRC_CONNECTED. Cell reselection, tracking area updates. Measurement reporting. X2 and S1 based handovers. Interoperation with UMTS, GSM and non-3GPP technologies such as cdma2000. QoS, policy control and charging QoS in LTE, EPS bearers, service data flows and packet flows. The architecture and signalling procedures for policy and charging control. Data transport using GPRS, differentiated services and MPLS. Offline and online charging in LTE. Delivery of voice and text messages over LTE Difficulties and solutions for Voice over LTE. Architecture and call setup procedures for circuit switched fallback. Architecture, protocols and call setup procedures in IP multimedia subsystem. Enhancements in release 9 LTE location services. Multimedia broadcast / multicast service and MBSFN. Cell selection, commercial mobile alert service. LTE Advanced and release 10 Impact of carrier aggregation on LTE air interface. Enhanced MIMO processing on uplink and downlink. Relaying. Release 11 and beyond. OAM and self organising networks Operation, administration, maintenance and provisioning for LTE. Self-configuration of base station parameters. Fractional frequency re-use, inter-cell interference co-ordination. Self-optimisation of base station procedures. Self-healing to detect and recover from faults.
SAFe® for Architects: In-House Training Enable continuous value flow by aligning technical strategy with business goals, communicating that strategy to development teams, and applying Agile architecture practices. Attendees can improve collaboration and alignment in a SAFe® Lean-Agile enterprise when they become a SAFe® 5 Architect. The SAFe® for Architects course prepares System, Solution, and Enterprise Architects to engage across the organization as effective leaders and change agents who collaboratively deliver architectural solutions. During this course, attendees will explore the roles, responsibilities, and mindset of Agile Architects, and appreciate how to align architecture with business value and drive continuous flow to large systems of systems while supporting SAFe® program execution. What you will Learn To perform the role of a SAFe® Architect, you should be able to: Architect using SAFe® principles Align architecture with business value Develop and communicate architecture vision and intent Plan architectural runway to enable delivery success Architect for continuous delivery and Release on Demand Lead and coach architects and team members during Program Increment (PI) Planning and execution Provide leadership during a Lean-Agile transformation Exemplifying Lean-Agile architecture Architecting for DevOps and Release on Demand Aligning architecture with business value Developing Solution Vision, Solution Intent, and Roadmaps Preparing architecture for Program Increment (PI) Planning Coordinating architecture throughout PI Planning Supporting Continuous Delivery during PI execution Supporting new Strategic Themes and Value Streams Leading as an architect during a Lean-Agile transformation
SAFe® for Architects: Virtual In-House Training Enable continuous value flow by aligning technical strategy with business goals, communicating that strategy to development teams, and applying Agile architecture practices. Attendees can improve collaboration and alignment in a SAFe® Lean-Agile enterprise when they become a SAFe® 5 Architect. The SAFe® for Architects course prepares System, Solution, and Enterprise Architects to engage across the organization as effective leaders and change agents who collaboratively deliver architectural solutions. During this course, attendees will explore the roles, responsibilities, and mindset of Agile Architects, and appreciate how to align architecture with business value and drive continuous flow to large systems of systems while supporting SAFe® program execution. What you will Learn To perform the role of a SAFe® Architect, you should be able to: Architect using SAFe® principles Align architecture with business value Develop and communicate architecture vision and intent Plan architectural runway to enable delivery success Architect for continuous delivery and Release on Demand Lead and coach architects and team members during Program Increment (PI) Planning and execution Provide leadership during a Lean-Agile transformation Exemplifying Lean-Agile architecture Architecting for DevOps and Release on Demand Aligning architecture with business value Developing Solution Vision, Solution Intent, and Roadmaps Preparing architecture for Program Increment (PI) Planning Coordinating architecture throughout PI Planning Supporting Continuous Delivery during PI execution Supporting new Strategic Themes and Value Streams Leading as an architect during a Lean-Agile transformation
Duration 3 Days 18 CPD hours This course is intended for This course is intended for solutions architects, solution-design engineers, developers seeking an understanding of AWS architecting and individuals seeking the AWS Solutions Architect-Associate certification. Overview Identify AWS architecting basic practices. Explore using the AWS management tools: The AWS Console, Command Line Interface (CLI), and CloudFormation in a lab environment. Examine the enforcement of accounts security using policies. Identify the elements that build an elastic, secure, virtual network that includes private and public subnets. Practice building an AWS core networking infrastructure. Determine strategies for a layered security approach to Virtual Private Cloud (VPC) subnets. Identify strategies to select the appropriate compute resources based on business use-cases. Practice building a VPC and adding an Elastic Cloud Compute (EC2) instance in a lab environment. Practice installing an Amazon Relational Database Service (RDS) instance and an Application Load Balancer (ALB) in the VPC you created. Compare and contrast AWS storage products and services, based on business scenarios. Compare and contrast the different types of AWS database services based on business needs. Practice building a highly available, auto-scaling database layer in a lab. Explore the business value of AWS monitoring solutions. Identify the role of monitoring, event driven load balancing, and auto scaling responses, based on usage and needs. Identify and discuss AWS automation tools that will help you build, maintain and evolve your infrastructure. Discuss network peering, VPC endpoints, gateway and routing solutions based on use-cases. Discuss hybrid networking configurations to extend and secure your infrastructure. Discuss the benefits of microservices as an effective decoupling strategy to power highly available applications at scale. Explore AWS container services for the rapid implementation of an infrastructure-agnostic, portable application environment. Identify the business and security benefits of AWS serverless services based on business examples. Practice building a serverless infrastructure in a lab environment. Discuss the ways in which AWS edge services address latency and security. Practice building a CloudFront deployment with an S3 backend in a lab environment. Explore AWS backup, recovery solutions, and best practices to ensure resiliency and business continuity. Build a highly available and secure cloud architecture based on a business problem, in a project-based facilitator-guided lab. Architecting on AWS is for solutions architects, solution-design engineers, and developers seeking an understanding of AWS architecting. In this course, you will learn to identify services and features to build resilient, secure and highly available IT solutions on the AWS Cloud. Architectural solutions differ depending on industry, types of applications, and business size. AWS Authorized Instructors emphasize best practices using the AWS Well-Architected Framework, and guide you through the process of designing optimal IT solutions, based on real-life scenarios. The modules focus on account security, networking, compute, storage, databases, monitoring, automation, containers, serverless architecture, edge services, and backup and recovery. At the end of the course, you will practice building a solution and apply what you have learned with confidence. Prerequisites AWS Cloud Practitioner Essentials classroom or digital training, or Working knowledge of distributed systems Familiarity with general networking concepts Familiarity with IP addressing Working knowledge of multi-tier architectures Familiarity with cloud computing concepts 0 - Introductions & Course Map review Welcome and course outcomes 1 - Architecting Fundamentals Review AWS Services and Infrastructure Infrastructure Models AWS API Tools Securing your infrastructure The Well-Architected Framework Hands-on lab: Explore Using the AWS API Tools to Deploy an EC2 Instance 2 - Account Security Security Principals Identity and Resource-Based Policies Account Federation Introduction to Managing Multiple Accounts 3 - Networking, Part 1 IP Addressing Amazon Virtual Private Cloud (VPC), Patterns and Quotas Routing Internet Access Network Access Control Lists (NACLs) Security Groups 4 - Compute Amazon Elastic Cloud Compute (EC2) EC2 Instances and Instance Selection High Performance Computing on AWS Lambda and EC2, When to Use Which Hands-On Lab: Build Your Amazon VPC Infrastructure 5 - Storage Amazon S3, Security, Versioning and Storage Classes Shared File Systems Data Migration Tools 6 - Database Services AWS Database Solutions Amazon Relational Database Services (RDS) DynamoDB, Features and Use Cases Redshift, Features, Use Cases and Comparison with RDS Caching and Migrating Data Hands-on Lab: Create a Database Layer in Your Amazon VPC Infrastructure 7 - Monitoring and Scaling Monitoring: CloudWatch, CloudTrail, and VPC Flow Logs Invoking Events 8 - Automation CloudFormation AWS Systems Manager 9 - Containers Microservices Monitoring Microservices with X-Ray Containers 10 - Networking Part 2 VPC Peering & Endpoints Transit Gateway Hybrid Networking Route 53 11 - Serverless Architecture Amazon API Gateway Amazon SQS, Amazon SNS Amazon Kinesis Data Streams & Kinesis Firehose Step Functions Hands-on Lab: Build a Serverless Architecture 12 - Edge Services Edge Fundamentals Amazon CloudFront AWS Global Accelerator AWS Web Application Firewall (WAF), DDoS and Firewall Manager AWS Outposts Hands-On Lab: Configure an Amazon CloudFront Distribution with an Amazon S3 Origin 13 - Backup and Recovery Planning for Disaster Recovery AWS Backup Recovery Strategie Additional course details: Nexus Humans Architecting on AWS training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Architecting on AWS course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for Senior Consultants (both functional and technical) that aspire to be Solution Architects, or current Solution Architects that are new to the role. The Solution Architect is responsible for the successful design, implementation, deployment and adoption of an overall solution. The Solution Architect ensures that the solution meets the customer?s needs now and in the future. In this course, students will learn about decisions a Solution Architect makes during an implementation, covering security, integrations, Power Apps architecture, Power Automate architecture, and more. This course is designed to give you an introduction to the Solution Architect role. Becoming a Solution Architect/Getting to know your customer Define a Solution Architect Role of a Solution Architect on projects Project Methodology Getting to know your customer Group exercise - Getting to know your customer Conceptualizing the design from requirements How to lead the requirement collection effort Using fit gap analysis Pillars of good architecture Blueprinting the solution architecture Group exercise - Design from requirements Project governance and working as a team Solution Architect's role in project governance Techniques for keeping a project on track Scenarios that could cause a project to fail Group exercise - Project governance and working as a team Power Platform Architecture Key Power Platform architecture components Understand how platform design and limits influence solution architectures Updates and feature releases Understand how to communicate how the platform meets customer needs Data Modeling Data model influences Data model strategy Data types Data relationships Group exercise - Data modeling Analytics and artificial intelligence Planning and evaluating requirements Operational reporting Power BI Enterprise BI Pre-built insights and custom AI Power Apps Architecture Discuss options for apps and how to choose where to start Discuss app composition options Using components as part of your app architecture Considerations for including Portals as an app in your architecture Group exercise - Power Apps Architecture topics Application Lifecycle Management (ALM) Microsoft vision and Solution Architect's role in ALM Environment strategies Defning a solution structure for your deliverable Power Automate Architecture Discuss options for automation and custom logic Review considerations for using triggers and common actions Explore using Business Process Flows (BPF) to guide users through business processes Group Exercise - Evaluate scenarios for Power Automate usage Security Modeling Solution Architect's role in security modeling Discovery and learning your client's environment Controlling access to environments and resources Controlling access to CDS Data Group Exercise - Security Modeling Integration Solution Architects role in Integrations What is an integration and why do we need it Platform features that enable integration CDS Event Publishing Scenarios for group discussion Dynamics 365 Applications Architecture Solution Architect's role when deploying Dynamics 365 apps Architecture Considerations for primary apps Group Exercise - App specific working groups evaluate requirements Power Virtual Agents architecture Introduction Chatbot options Chatbot concepts Best practices Integrate chatbots Power Virtual Agents in Microsoft Teams Robotic Process Automation Introduction Power Automate Desktop Recording and editing tasks Running desktop flows Process advisor Testing and Go Live Solution Architect's role with testing and go live Planning for testing Planning for go live
About this course This practical course will help primary teachers to understand the purpose of assessment in history and consider current best practice. We will explore ways of continuing to improve the quality of teaching and learning in history through effective assessment strategies. We will go through practical ideas and resources to enliven teaching and learning in history and provide opportunities for assessment. This course will provide guidance and support to help develop the accuracy of teacher judgements. During the course, we will look at examples of writing and outcomes from different schools and consider how these outcomes demonstrate progress and attainment in history. Outcomes • understand the purpose of assessment in history • consider current best practice • explore ways of continuing to improve the quality of teaching and learning in history through effective assessment strategies • explore practical ideas and resources to enliven teaching and learning in history and provide opportunities for assessment • provide guidance and support to help develop the accuracy of teacher judgements Course leader The course is led by Steven Kenyon. Steven is a member of the Historical Association’s primary committee, having worked as a primary school teacher and then Deputy Head Teacher between 2004 and 2018. He joined Lancashire Professional Development Service in April 2018 as a Teaching and Learning Consultant for Primary History and English. He works closely with Lancashire Archives to promote and develop local history work in primary schools. This year he is a judge for the Historical Association's Young Quills Awards.
Duration 3 Days 18 CPD hours This course is intended for This course is intended for Solution Architects Overview At the end of this course, you will be able to: Apply the AWS Well-Architected Framework Manage multiple AWS accounts for your organization Connect an on-premises datacenter to AWS cloud Move large data from an on-premises datacenter to AWS Design large datastores for AWS cloud Understand different architectural designs for scalability Protect your infrastructure from DDoS attack Secure your data on AWS with encryption Enhance the performance of your solutions Select the most appropriate AWS deployment mechanism Building on concepts introduced in Architecting on AWS, Advanced Architecting on AWS is intended for individuals who are experienced with designing scalable and elastic applications on the AWS platform. Building on concepts introduced in Architecting on AWS, this course covers how to build complex solutions which incorporate data services, governance, and security on AWS. This course introduces specialized AWS services, including AWS Direct Connect and AWS Storage Gateway to support Hybrid architecture. It also covers designing best practices for building scalable, elastic, secure, and highly available applications on AWS. Module 1: AWS Account Management Multiple accounts Multi-account patterns License management Manage security and costs with multiple accounts AWS Organizations AWS Directory Service Hands-on lab: Multi-VPC connectivity using a VPN Module 2: Advanced Network Architectures Improve VPC network connections Enhance performance for HPC workloads VPN connections over AWS AWS Direct Connect AWS Transit Gateway Amazon Route 53 Exercise: Design a hybrid architecture Module 3: Deployment Management on AWS Application lifecycle management Application deployment using containers AWS Elastic Beanstalk AWS OpsWorks AWS CloudFormation Module 4: Data Optimize Amazon S3 storage Amazon ElastiCache AWS Snowball AWS Storage Gateway AWS DataSync Backup and archival considerations Database migration Designing for big data with Amazon DynamoDB Hands-on lab: Build a failover solution with Amazon Route 53 and Amazon RDS Module 5: Designing for large scale applications AWS Auto Scaling Migrating over-provisioned resources Blue-green deployments on AWS Hands-on lab: Blue-green deployment with AWS Module 6: Building resilient architectures DDoS attack overview AWS Shield AWS WAF Amazon GuardDuty High availability using Microsoft SQL Server and Microsoft SharePoint on AWS High availability using MongoDB on Amazon EC2 AWS Global Accelerator Hands-on lab: CloudFront content delivery and automating AWS WAF rules Module 7: Encryption and data security Encryption primer DIY key management in AWS AWS Marketplace for encryption products AWS Key Management Service (AWS KMS) Cloud Hardware Security Module (HSM) Comparison of key management options Hands-on lab: AWS KMS with envelope encryption