DWDM training course description A concise overview of Wave Division Multiplexing (WDM) with both Coarse Wave Division Multiplexing (CWDM) and Dense Wave Division Multiplexing (DWDM) being covered. The course starts with a review of the relevant elements of fibre transmission and multiplexing before then studying WDM components and architectures. Reliability, resilience and management are then followed by WDM services and futures. What will you learn Explain the benefits of WDM. Describe Dispersion and four way mixing. Describe the different WDM equipment components. Describe different WDM architectures. Explain How DWDM works. DWDM training course details Who will benefit: Anyone working with CWDM/DWDM. Prerequisites: Telecommunications Introduction Duration 2 days DWDM training course contents Fibre communications review Optical transmission, Fibre characteristics, Fibre component parts. Multi Mode Fibre (MMF). Single Mode Fibre (SMF). Fibre connections. Lasers. Attenuations, dispersion, optical signal noise ratios (OSNR) and their effects. Channel Spacing and Signal Direction. Limiting factors to single wavelength. WDM overview Multiplexing, TDM, WDM benefits. WDM standards. CWDM vs. DWDM. Four Wave Mixing (FWM). Impact and countermeasures to FWM on WDM. CWDM ITU G.694.2, channels, channel spacing. DWDM ITU G.694.1, channels, channel spacing. WDM Equipment Components Equipment components and building blocks. Optical Terminal Multiplexers (OTM). Optical Add/Drop Multiplexers (OADM). Adding versus dropping. Optical Amplifiers. Erbium Doped Fibre Amplifiers (EDFA). Transponders and Combiners. WDM/DWDM Hubs. Optical and Electrical Cross Connects (OXCs/DXCs). Types of Cross Connects (Transparent/Opaque). Advantages and disadvantages of various Optical cross connects. WDM Architectures WDM network sections. Point-to-Point, Optical switches, mesh, ring and star topology. Example of combined WDM and other technology network. Wavelength converting transponders, 1R, 2R, 3R. Protection for WDM Sub 50ms failover. Equipment protection. Card protection. Y cable, Splitter protection. Far end laser control. Line protection. OMSP 1+1, OMSP 1:1, OMSP 1: N. Self healing optical ring. Sub Network Connection Protection (SNCP). Automatically Switched Optical Networks (ASON). WDM Management Options In band management. Out of band management. The Optical Supervisory Channel (OSC). OSC capabilities. WDM services WDM Access. Bit rates, Transparent Networks. Modulation, DQPSK. SDH over WDM. Migrating from SDH to DWDM. Ethernet over WDM, IP over WDM. Optical Transport Networks G.709, 'digital wrapper', Optical Channel Payload Unit (OPU), Optical Channel Transport Unit ( OTU), Optical Channel Data Unit (ODU). OTU1, OTU2, OTU3, OTU4. WDM Futures All optical amplification, Raman amplification, distributed, lumped. Bit rates. Solitons. Coherent technologies.
LOOKING FOR: YA, NA, ADULT FICTION Helen Lane is an editor and a Junior Agent at The Booker Albert Literary Agency. She is passionate about books and has spent the last decade supporting authors. She will happily offer her editing advice on manuscripts through I Am In Print but in accordance with her membership of the Association of American Literary Agents (AALA), guidelines state that any work submitted to her for feedback cannot be considered for agent representation. What Helen will do during your session is assess your sample and provide detailed feedback on any identifiable issues, the manuscript's commercial potential and what steps she would advise before you begin querying. She does not require personalisation in the letter, comparison titles or a synopsis, but if you have them already, please include them. As an idea of the genres Helen represents, she would love to see and offer advice on Adult Fantasy, Sci Fi, Horror, Paranormal Romance, LGBTQ+ Romance, Action & Adventure & Thrillers and will also look at YA Fantasy. Books Helen is slightly obsessed with include monster stories (especially if they have giant sharks or squids) and stories set in extreme environments such as the arctic, jungle, caves, ocean, and mountains. She DOES NOT want to read about affairs or abuse in any genre. (Her husband likes her to add here that this is nothing to do with him; she just doesn't like sad stories). Her favourite authors are Mira Grant, Greig Beck, James Rollins, Matthew Reilly, Jennifer L. Armentrout, Darcy Coates, Patricia Briggs & Kelley Armstrong. Helen holds a BSc in Environmental Science from the University of East Anglia and a postgrad qualification in Acoustics. She lives in London with her family and the world’s naughtiest cocker spaniel. Follow Helen on social media: @HFLane_writing Helen would like you to submit a covering letter, 1 page synopsis and first three chapters (Max 5,000 words) of your manuscript in a single word document. (In addition to the paid sessions, Helen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Friday 31st January 2025
Prepare for the AWS Certified Solutions Architect - Associate (SAA-C03) exam. Learn about the AWS Management Console, S3 buckets, instances, database services, cloud security, costs associated with AWS, Amazon Elastic Compute Cloud (EC2), Amazon Virtual Private Cloud (VPC), Amazon Simple Storage Service (S3), and Amazon Elastic Block Store (EBS).
In this course, we will build a 3D model of a medieval windmill. Our main goal will be to use Blender to create realistic and completely functional windmill subcomponents, which will include a complex set of wooden supports, balconies, steps, a waterwheel, and windmill arms, and then export them to Unreal Engine 5.
Lawful Intercept training course description Packet based networks require a different approach to Lawful Intercept (LI) than that used in circuit switched networks. This course focuses on what Lawful Interception and Data Retention (DR) means to communications service providers in the IP and NGN areas. The course assumes a basic knowledge of IP networking (i.e. DNS, TCP/UDP, IP, RTP) and the building of services on an IP platform (e.g. SIP, SDP, FTP, HTTP). The course first looks at the regulatory context for LI and DR and how this is translated to a practical architecture. What will you learn Recognise the legal and regulatory obligations to provide LI and DR. Identify the components of the handover architecture for each of LI and DR. Identify the preferred location of points of interception and points of retention in the IP network. Map intercepted material to handover protocols. Understand the data mapping defined in the available standards for both LI and DR. Lawful Intercept training course details Who will benefit: Technical and managerial staff needing to implement public networks. Prerequisites: TCP/IP Foundation Duration 1 day Lawful Intercept training course contents What is meant by LI and DR? Review of regulation: Data protection Directive; Data Retention Directive; RIPA. LI architectures Handover and Interception: ETSI standards ES 201 671 and TS 102 232. LI handover protocol IRI and CC handover; correlation; manual interfaces. DR architectures Handover of query results; points of retention. DR query command set Retrieval of retained records. Security concerns Operation privacy; target privacy; storage and transmission integrity. Implementation Identifying PoI and PoR for provided services. LI and DR wrap up Interaction with other services, storage obligations (volume, time, availability).
REVIVE & THRIVE Revitalising Women’s Retreat5 nights: Tues 21st - Sun 26th May 2024 - SOLD OUT 8 nights: Sat 21st - Sun 29th September 2024 - only 8 spaces left Go from feeling …. Tired to Renewed calm and centred in your body, with your spark restored, and spirit lifted Low energy to Revitalised revived and recharged, physically and mentally, and ready to face life’s challenges Unempowered to Empowered inspired and motivated to continue energising eating habits and self-care Escape to Turkiye’s Turquoise Coast for an uplifting, transformative women’s retreat designed to revitalise your body, mind, and eating habits. Rejuvenate mind, body and spirit Reclaim control of your energy Re-energise your eating habits 9-days dedicated to your complete wellbeing, Revive & Thrive includes A magical destination: Türkiye’s Aegean coast with its sapphire waters, ancient cultural influences, dramatic views and warm and hospitable culture is a place to immerse yourself in vibrant natural beauty, to rest, restore, and feel alive and reinvigorated. Set in a breath-taking, sweeping bay, with a mountainous backdrop, Kalkan is a historic fishing town with an exquisite harbour now bordered with friendly waterfront restaurants and small boutiques. Thriving but unspoilt, you’ll find its winding streets with overhanging balconies and eclectic Ottoman architecture irresistible. A picturesque resort with comfortable accommodation: Patara Prince is a charming, rustic, privately-owned resort hotel nestled into the coast just across Kalkan bay. You will fall in love with its natural stone, abundant greenery and character-full winding pathways. It is far enough from the town to enjoy serenity and peace, but just a 15-minute walk or short boat ride for explorers. The vibe is mellow and comfortable, intimate yet spacious with plenty of areas in which to lose yourself and enjoy those much needed quiet moments and ‘you time’. You will have full use of the facilities including two salt-water, ocean-view pools, and tennis courts. Your en suite room with a sea view will be situated in the main hotel, furnished in a traditional style. A supportive wellness journey: Revive & Thrive is a gently revitalising retreat designed by wellness professionals, Emily Perrier and Sarah Grant. Taking a mind-body-spirit approach, they use the seven chakras as a basis for their 8-night retreat programme. The chakra system is the body’s major energy system, and represents the flow of life energy through the body. During your retreat journey, you will be introduced to each chakra and its function, and discover how to restore balance and keep energy flowing healthily and harmoniously. You will have ready access to Sarah and Emily’s friendly support through-out, and receive a supportive printed workbook. A post-retreat group online workshop with Sarah & Emily will be available 6-weeks later to help you identify areas where you could create more balance, and continue to thrive. Daily Energy Medicine Yoga®️: Designed for all abilities, this gentle and restorative practice is a magical union of yoga and energy medicine that amplifies the benefits of a traditional practice by combining simple movements that help the body to self-regulate, energise, and move with more ease. Daily Energy & Intuitive Eating Workshops: Relaxed workshops and sharing circles designed to build understanding of how your body’s natural energy system connects with your health and habits. These inspiring and illuminating sessions connect you with intuitive approaches to eating that help to de-stress your relationship with food, retune with your body, and enhance energy in your daily life. Other holistic activities: Restorative guided meditations, rejuvenating visualisations, journalling, breath-work practice, and coastal walks. (You can also book into a local spa/hammam or have reflexology onsite at additional cost). Energising excursions: Wander through the stalls of a delightful food market in a neighbouring town; discover Patara’s ancient Lycian ruins and golden 12-mile protected beach; unwind for a day on a private gulet boat trip with plenty of swim stops and an opportunity for a cleansing mud bath. Nourishing food: Locally sourced, nutritious, plant-powered Turkish meals. Vegans and vegetarians will be well catered for. Breakfasts will be Turkish-style including salads, tomatoes, cucumber, eggs, olives, cheese, breads, tahini, oats, yoghurts and fruits. A spectacular Turkish breakfast in the mountains, and an evening meal on the roof terrace of a local restaurant, are also included. We will cater for any food allergies and intolerances; please notify us when booking your place.
Get job ready with CompTIA's Data Analysis Certification. Live Classes - Career Guidance - Exam Included.
Duration 2 Days 12 CPD hours This course is intended for The target audience for the CASM course is Anyone interested in learning about Agile and Scrum from a products and process perspective Process owners and process designers Developers who are interested in helping make processes more agile Managers who are looking to bridge multiple practices into a DevOps environment Employees and managers responsible for designing, re-engineering or improving process Consultants guiding their clients through process improvement and DevOps initiatives Internal and external suppliers Process stakeholders Overview The learning objectives for Certified Agile Service Manager (CASM) include an understanding of: What does it mean to 'be agile?' The Agile Manifesto, its core values, and principles Agile concepts and practices including ITSM, Kanban, Lean and DevOps Learn about SCRUM from a product and process perspective Agile thinking and values into service management Scrum roles, artifacts, and events as it applies to both products and processes The two aspects of Agile Service Management: Agile Process Improvement-ensuring processes are lean and deliver 'just enough' control Agile Process Design-applying Agile practices to process design projects This course provides an introduction to Agile Service Management, the application, and integration of agile thinking into service management processes and process design projects. Agile thinking improves IT?s effectiveness and efficiency and enables IT to continue to deliver value in the face of changing requirements. This course prepares you for the Certified Agile Service Manager (CASM) certification. Why Agile Service Management? Challenges Today What is IT Service Management? What is Agile? Agile Manifesto and Principles What Does It Take To Be Agile? Agile Service Management What is Agile Service Management? Agile Service Management Goals, Objectives and Benefits Two Aspects: Agile Process Engineering & Agile Process Improvement Leveraging Related Guidance DevOps ITIL Site Reliability Engineering Lean Scrum Agile Service Management Roles Relationship to Scrum roles Agile Practice Owner Agile Service Management Team Agile Service Manager Agile Process Engineering Agile Processes How Processes Deliver Value Waterfall vs Agile Process Engineering Relationship to Scrum Events & Artifacts Minimum Viable Process Microprocess Architectures Service Management Architecture Agile Service Management Artifacts Practice Backlog Spring Backlog Increment Agile Service Management Events Planning The Sprint Sprint Planning Process Standups Sprint Review Sprint Retrospective Agile Process Improvement Why Process Improvement is Important Process Improvement Goals Process Improvement Reviews Sustaining Improvements Automation
Cloud technologies training course description This course provides an introduction to cloud technologies, including, configuration and deployment, security, maintenance, and management. It covers all aspects of cloud computing infrastructure. It will help you to master the fundamental concepts, terminology, and characteristics of cloud computing. . What will you learn Contrast and compare AWS, GCP and Azure. Explain the different cloud services, models and characteristics. Explain cloud virtualization components and options. Explain cloud security options. Describe cloud automation, orchestration, monitoring and performance options. Cloud technologies training course details Who will benefit: Anyone working with or looking to work with cloud technologies. Prerequisites: None. Duration 2 days Cloud technologies training course contents What is the cloud? The Internet Cloud computing Benefits Disadvantages Cloud services IaaS, PaaS, SaaS, others. Cloud service providers AWS, GCP Microsoft Azure, others Cloud architectures Private, public, hybrid others Cloud based delivery The cloud and virtualization Virtual Machines, networks, storage, deployment. Accessing the Virtual Machine Secure cloud environments Security considerations. Data privacy considerations Automation and orchestration Monitoring and performance Performance Cost issues Cost containment
IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death⦠keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.