About this Virtual Instructor Led Training (VILT) A decision to drill an exploration well with the objective to find a new oil or gas field must be based on sound assessment of the prospect risk and of the volumes. What is the chance that a well will find hydrocarbons, and how much could it be? Risk and volume assessments form the basis for decisions to drill a well or not, and as such form the link between subsurface evaluation and the business aspects of the petroleum industry. This Virtual Instructor Led Training (VILT) course explains how risks and volumes can be assessed in a realistic manner, based on a sound understanding of the geological details of the prospect as well as its regional geological setting and current play understanding. Participants of this VILT course will receive a softcopy of Risk and Volume Assessment Handbook which explains the concepts that are associated with probabilistic Risk & Volume (R & V) Assessment and contains many practical recommendations on how to translate geological understanding into meaningful inputs for probabilistic R &V assessments. The book is fully compatible with any probabilistic R & V tool in the industry. Training Objectives By the end of this VILT course, participants will be able to understand: The fundamentals of risk and volumes assessment; translating geological understanding into reasonable numbers and ranges. The difference between risk and uncertainty. Fundamentals of statistics; including explanation of distribution curves, understanding of expectation curves, do's and don'ts for adding risked volumes, and Bayes theorem. Uncertainty of trap, reservoir, seal and charge, illustrated by examples. Guidelines and exercises for estimating risks realistically and consistently. Calculating volume ranges for prospects and for portfolios of prospects; how to add prospect volumes for a correct representation of prospect portfolios. Incorporation of geophysical evidence (DHIs) in a realistic risk assessment. Target Audience This VILT course has been designed in the first place for geoscientists working in exploration, for prospect portfolio analysts and for their direct supervisors. It will also benefit staff from disciplines working closely with exploration staff, such as reservoir engineers, petrophysicists and geophysicists. Course Level Intermediate Training Methods Learning, methods and tools The VILT course will be delivered online in 5 half-day sessions comprising 4 hours per day, with 2 breaks of 10 minutes per day. It is the intention to have at least 2 smaller exercises per day. Time will be reserved for recapitulation, questions and discussions. VILT will be conducted either via Zoom or Microsoft Teams. Presenting materials can easily be done on this platform. When participants need to ask a question, they can raise their hand, write notes or interrupt the Instructor by using their microphone. The presenter can switch to a screen where he/she can see all participants (also when each participant is sitting in another location e.g. at home). There is also a whiteboard functionality that can be used as one would use a flip chart. Exercises will be done on an online platform which provides each participant with a private work area that can be accessed by the Instructor to discuss the exercise in a similar manner as in a classroom course. Each topic is introduced by a lecture, and learning is re-enforced by practical exercises and discussions. Handout material in electronic format will be provided. Trainer Dr. Jan de Jager has a PhD in Geology from the University of Utrecht. He joined Shell in 1979 as an exploration geologist, and worked in several locations around the world such as Netherlands, Gabon, USA, Australia, Argentina, and Malaysia in technical and management positions. During the last 10 years of his career, he was responsible for the quality assurance of Shell's exploration prospects in many parts of the world and for upgrading and replenishing Shell's global exploration portfolio. During this period, he had also developed extensive expertise in Prospect Risk and Volume assessments for which he ran successful internal training programmes. Following his retirement from Shell in 2010, Dr Jan de Jager took on a position as part-time professor at the University of Amsterdam and also serves as a consultant exploration advisor for various E&P companies. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information about post training coaching support and fees applicable for this. Accreditions And Affliations
Certificate in Business and Commercial Law (CBCL) - Virtual Learning Why Attend This course is designed for professionals with little or no prior legal background but who are required to make organizational decisions involving legal matters. It will provide participants with the fundamental principles of commercial law, including commercial contracts and negotiation, sale of goods, intellectual property rights and employee relations. It also covers all the legal aspects of setting up a business, running a business and closing a business Participants will gain an in-depth understanding of international commercial law with emphasis on the common law system. Participants will have the opportunity to learn and analyze key legal issues regarding contracts and the business as a whole which they are likely to encounter within their organization. Course Methodology In this interactive training course participants will frequently work in pairs as well as in larger groups to complete exercises as well as regional and international case studies. Course Objectives By the end of the course, participants will be able to: Apply legal rules and principles to speciï¬c commercial situations through consideration of relevant case law Negotiate commercial contracts complying with commercial and legal requirements Increase proï¬tability within their organization by selecting appropriate methods of distribution of goods Recognize and analyze how intellectual property rights aï¬ect their organization Evaluate and modify organizational employment practices complying with labor law requirements Target Audience This course is suitable for those with little or no formal training in commercial law yet would be required to understand the fundamentals of commercial law as it may directly impact their work. It will particularly beneï¬t directors and executives who have direct responsibility for legal decisions within the organization. In-house council new to the region, and those working within a legal department, will also ï¬nd this course highly beneï¬cial. Target Competencies Drafting Contracts Contract Negotiation Understanding Commercial Terms Understanding Employment Law Implementing Organizational Employment Practices Understanding Intellectual Property Understanding corporate restructuring Understanding the effect of breach of commercial contract terms Note The Dubai Government Legal Aï¬airs Department has introduced a Continuing Legal Professional Development (CLPD) programme to legal consultants authorised to practise through a licensed ï¬rm in the Emirate of Dubai. We are proud to announce that the Dubai Government Legal Aï¬airs Department has accredited EMG Associates as a CLPD provider. In addition, all our legal programmes have been approved. This PLUS Specialty Training Legal course qualiï¬es for 4 elective CLPD points. Overview of commercial & business law Areas of commercial and business law Types of commercial contracts Commercial contracts in the civil law and common law systems Sources of English law Civil law v Common law Civil law in the GCC Formalities for a binding contract Elements required for an enforceable contract Rules for contract interpretation implied terms v express terms identifying risks and how to minimise risks Structure of a commercial contract Preliminary documents in international transactions Memorandum of Understanding/ Heads of Terms. Are they legally binding? Commercial implications Boilerplate/ miscellaneous provisions- the important but forgotten clauses- beware! Force majeure v Frustration Notices Set oï¬ No waiver Entire Agreement/ non- reliance clause Times is of the essence Assignment v Novation Governing law Common mistakes in choice of law Jurisdiction clause Exclusive v Non-exclusive Factors in deciding the jurisdiction clause International dispute resolution Litigation Importance of Alternative Dispute Resolution (ADR) Arbitration Mediations Conciliation Negotiation Remedies for breach of contract Damages Specific performance Injunctions Advantages and disadvantages of different business forms Types of business vehicles Sole trader Partnerships Limited Liability Partnerships Companies Cross Border Transactions Distributorship Agency Joint Venture Acquisitions Share purchase v Business purchase Apportioning risks and liabilities through warranties and indemnities Negotiating warranties and indemnities Corporate insolvency Tests identifying insolvency Consequence for directors who fail to react to insolvency Types of insolvency Administration Receivership Creditor Voluntary Liquidation Compulsory Liquidation Commercial Tort Tort of negligence Defamation Libel Slander Recent case law on defamation Managing risk Prevention is better than cure: Eï¬ective risk management Intellectual Property Rights management Types of Intellectual Property copyright trademark patent design rights confidential information Assignment v Granting a license The law of passing off Intellectual Property in the GCC Employment law issues in the common law systems and the GCC Types of employment contracts Grounds for dismissal Wrongful dismissal Redundancy Unfair dismissal Commercial real estate in the GCC Leasehold Freehold
Duration 3 Days 18 CPD hours This course is intended for This course is designed for software developers, testers, and architects who design and develop software in various programming languages and platforms, including desktop, web, cloud, and mobile, and who want to improve their ability to deliver software that is of high quality, particularly regarding security and privacy. This course is also designed for students who are seeking the CertNexus Cyber Secure Coder (CSC) Exam CSC-210 certification Overview In this course, you will employ best practices in software development to develop secure software.You will: Identify the need for security in your software projects. Eliminate vulnerabilities within software. Use a Security by Design approach to design a secure architecture for your software. Implement common protections to protect users and data. Apply various testing methods to find and correct security defects in your software. Maintain deployed software to ensure ongoing security... The stakes for software security are very high, and yet many development teams deal with software security only after the code has been developed and the software is being prepared for delivery. As with any aspect of software quality, to ensure successful implementation, security and privacy issues should be managed throughout the entire software development lifecycle. This course presents an approach for dealing with security and privacy throughout the entire software development lifecycle. You will learn about vulnerabilities that undermine security, and how to identify and remediate them in your own projects. You will learn general strategies for dealing with security defects and misconfiguration, how to design software to deal with the human element in security, and how to incorporate security into all phases of development. Identifying the Need for Security in Your Software Projects Identify Security Requirements and Expectations Identify Factors That Undermine Software Security Find Vulnerabilities in Your Software Gather Intelligence on Vulnerabilities and Exploits Handling Vulnerabilities Handle Vulnerabilities Due to Software Defects and Misconfiguration Handle Vulnerabilities Due to Human Factors Handle Vulnerabilities Due to Process Shortcomings Designing for Security Apply General Principles for Secure Design Design Software to Counter Specific Threats Developing Secure Code Follow Best Practices for Secure Coding Prevent Platform Vulnerabilities Prevent Privacy Vulnerabilities Implementing Common Protections Limit Access Using Login and User Roles Protect Data in Transit and At Rest Implement Error Handling and Logging Protect Sensitive Data and Functions Protect Database Access Testing Software Security Perform Security Testing Analyze Code to find Security Problems Use Automated Testing Tools to Find Security Problems Maintaining Security in Deployed Software Monitor and Log Applications to Support Security Maintain Security after Deployment
A virtual sales training programme aimed at enhancing the skills of the salesperson to have engaging customer conversations which open opportunities and close more business.
Duration 3 Days 18 CPD hours This course is intended for The primary audience for this course is someone who works, or has ambition to work, in a leadership role in data center operations such as a data center facilities manager, data center operations manager, who has the responsibility to achieve and improve the high-availability and manageability of the data center operations. Overview After completion of the course the participant will be able to: Perform the needs analysis translating business requirements to data center services Set-up and manage the data center operations team Implement and monitor safety- and security practices Identify a suitable maintenance program for the data center facility and its equipment Select the appropriate policies and procedures required for data center operations Monitor the data center availability, capacity and capability Manage and implement basic data center projects Set-up and implement an environmental sustainability program Select an appropriate back-up site to support organizational resilience Identify and respond to risk in the data center Manage and support the document life cycle Create a basic budget proposal Select and manage vendors and measure their performance Manage data center assets Managing the facilities of today?s high-end and high-availability data centers is an extremely demanding and complex task which is often underestimated. There is often very little appreciation and understanding of the complexities of managing today's mission-critical data centers where downtime is not an option, especially since many of the data centers are operating at, or near, their design limits. Operations management at the facilities layer makes all the difference. Even a data center designed to the highest redundancy level as per the ANSI/TIA-942 standard could still experience many unscheduled downtime events due to poor planning, operations, maintenance and management processes. Service Level Management Service Level Management Needs analysis Capability assessment Service portfolio Service catalogue Service Level Agreements (SLAs) Availability measurement Data points in SLA Service reporting Complaint procedure Customer satisfaction measurement Service Improvement Process (SIP) SLA content The Data Center Organization Operational issues Organization chart Roles and responsibilities Skills matrix Contingency / backup roles Shift management Performance management Career development Training and assessment Job rotation Succession planning Disciplinary program Managing Safety & Statutory Requirements Safety policies and regulations Occupational Health and Safety (OH&S) Safety awareness training Permit to Work (PTW) Lock-out / Tag-out Personal Protective Equipment (PPE) Testing and tagging of equipment Emergency preparedness and response Reporting of safety issues Reviews / internal audit / external audit Managing Physical Security Security policies and procedures Security standards and guidelines Security staff Security awareness Security incident management Disciplinary program Reviews, internal and external audits Facilities Management Maintenance policies and procedures Various maintenance programs Outsourcing of maintenance activities Maintenance contract options Warranty Maintenance schedule Service situations Spart part management Contamination control Data Center Operations Policies and procedures for data center operations Service operations and the daily data center operations Monitoring / Reporting / Control Monitoring requirements Escalation procedures Reporting Trend analysis Reviews Project Management Project management Project organization Project manager Project phases Environment Sustainability The importance of sustainability Sustainability policies Environmental management Power efficiency indicators - Waste management - Water management ICT utilisation management Environmental performance measurements Renewable energy factor (REF) Organizational Resilience Business continuity Data center facility options Business Impact Analysis Type of facility Human resources Facility, equipment and consumables Governance, Risk and Compliance Management commitment Coordination, collaboration and integration Compliance Risk management Document management Financial management Vendor management Asset management Additional course details: Nexus Humans Certified Data Center Facilities Operations Manager (CDFOM) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Certified Data Center Facilities Operations Manager (CDFOM) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
In this course we deepen participants understanding of systemic racism and the spectrum of privilege. It challenges the participants to examine their behaviours and take close looks at some of the views they have held since a very young age, e.g. this area is a “bad” area, because it has a high proportion of black/brown people living in it, or that young black men in tracksuits are “thugs”. We think about where these messages come from and how people are indoctrinated by the media. Course Category Inclusion Team Building Leadership Emotional needs Description In this course we deepen participants understanding of systemic racism and the spectrum of privilege. It challenges the participants to examine their behaviours and take close looks at some of the views they have held since a very young age, e.g. this area is a “bad” area, because it has a high proportion of black/brown people living in it, or that young black men in tracksuits are “thugs”. We think about where these messages come from and how people are indoctrinated by the media. We explore the reasons why white people are so defensive when it comes to talking about race. We discuss having racial biases and the implications of them, such as unconsciously insulting people around us in the workplace. When we become aware of how our behaviours can affect people, we then look for solutions. The course is designed for groups of professionals to come together as a team to try and take responsibility for the racism that goes on in their workplace – empowering the leadership to have difficult conversations with team members and create a paradigm shift across the entire organisation. Please come with an open mind, and you might be surprised at what you find out. We are striving for a world where racism is an open conversation and not a topic that we shy away from. Testimonials “That was a really insightful session and thought provoking. I would love to attend more sessions on racism. Thank you for the engaging questions and delivery” “Lots of things to reflect on!” Learning Objectives Participants will: Confront their own racism and unconscious biases Become aware of the ways they treat people differently based on race Think about practical changes they can make in their workplaces Who Is It For? Leadership teams seeking guidance and reflection Educators who want to get it right People who have had not had much contact with people outside their own race People who believe they are “not racist” Course Content Background – brief history of systemic racism Racism as a binary – the problem with thinking only “bad” people can be racist Trust – how do we feel around people we don’t trust? Difference – how do we act when we feel different? What do Good Manners look like around people of different cultures? What does Good Allyship look like in the workplace? Why don’t we talk about race? What does your race mean to you? Examining our privilege – activity Interracial friendship video Visioning – what does the ideal workplace look like? Setting Actions – what achievable actions can we set to bring us closer to our dream future?
About this training course Business Impact: The main aim is to provide insight and understanding of data analytics and machine learning principles through applications. Field data is used to explain data-analysis workflows. Using easy to follow solution scripts, the participants will assess and extract value from the data sets. Hands-on solution approach will give them confidence to try out applicable techniques on data from their field assets. Data analysis means cleaning, inspecting, transforming, and modeling data with the goal of discovering new, useful information and supporting decision-making. In this hands-on 2-day training course, the participants learn some data analysis and data science techniques and workflows applied to petroleum production (specifically artificial lift) while reviewing code and practicing. The focus is on developing data-driven models while keeping our feet closer to the underlying oil and gas production principles. Unique Features: Eight business use cases covering their business impact, code walkthroughs for most all and solution approach. Industry data sets for participants to practice on and take home. No software or complicated Python frameworks required. Training Objectives After the completion of this training course, participants will be able to: Understand digital oil field transformation and its impact on business Examine machine learning methods Review workflows and code implementations After completing the course, participants will have a set of tools and some pathways to model and analyze their data in the cloud, find trends, and develop data-driven models Target Audience This training course is suitable and will greatly benefit the following specific groups: Artificial lift, production and facilities engineers and students to enhance their knowledge base, increase technology awareness, and improve the facility with different data analysis techniques applied on large data sets Course Level Intermediate Advanced Training Methods The course discusses several business use-cases that are amenable to data-driven workflows. For each use case, the instructor will show the solution using a data analysis technique with Python code deployed in the Google cloud. Trainees will solve a problem and tweak their solution. Course Duration: 2 days in total (14 hours). Training Schedule 0830 - Registration 0900 - Start of training 1030 - Morning Break 1045 - Training recommences 1230 - Lunch Break 1330 - Training recommences 1515 - Evening break 1530 - Training recommences 1700 - End of Training The maximum number of participants allowed for this training course is 20. This course is also available through our Virtual Instructor Led Training (VILT) format. Prerequisites: Understanding of petroleum production concepts Knowledge of Python is not a must but preferred to get the full benefit. The training will use the Google Collaboratory environment available in Google-Cloud for hands-on exercises Trainees will need to bring a computer with a Google Chrome browser and a Google email account (available for free) Trainer Your expert course leader has over 35 years' work-experience in multiphase flow, artificial lift, real-time production optimization and software development/management. His current work is focused on a variety of use cases like failure prediction, virtual flow rate determination, wellhead integrity surveillance, corrosion, equipment maintenance, DTS/DAS interpretation. He has worked for national oil companies, majors, independents, and service providers globally. He has multiple patents and has delivered a multitude of industry presentations. Twice selected as an SPE distinguished lecturer, he also volunteers on SPE committees. He holds a Bachelor's and Master's in chemical engineering from the Gujarat University and IIT-Kanpur, India; and a Ph.D. in Petroleum Engineering from the University of Tulsa, USA. Highlighted Work Experience: At Weatherford, consulted with clients as well as directed teams on digital oilfield solutions including LOWIS - a solution that was underneath the production operations of Chevron and Occidental Petroleum across the globe. Worked with and consulted on equipment's like field controllers, VSDs, downhole permanent gauges, multiphase flow meters, fibre optics-based measurements. Shepherded an enterprise-class solution that is being deployed at a major oil and gas producer for production management including artificial lift optimization using real time data and deep-learning data analytics. Developed a workshop on digital oilfield approaches for production engineers. Patents: Principal inventor: 'Smarter Slug Flow Conditioning and Control' Co-inventor: 'Technique for Production Enhancement with Downhole Monitoring of Artificially Lifted Wells' Co-inventor: 'Wellbore real-time monitoring and analysis of fracture contribution' Worldwide Experience in Training / Seminar / Workshop Deliveries: Besides delivering several SPE webinars, ALRDC and SPE trainings globally, he has taught artificial lift at Texas Tech, Missouri S&T, Louisiana State, U of Southern California, and U of Houston. He has conducted seminars, bespoke trainings / workshops globally for practicing professionals: Companies: Basra Oil Company, ConocoPhillips, Chevron, EcoPetrol, Equinor, KOC, ONGC, LukOil, PDO, PDVSA, PEMEX, Petronas, Repsol, , Saudi Aramco, Shell, Sonatrech, QP, Tatneft, YPF, and others. Countries: USA, Algeria, Argentina, Bahrain, Brazil, Canada, China, Croatia, Congo, Ghana, India, Indonesia, Iraq, Kazakhstan, Kenya, Kuwait, Libya, Malaysia, Oman, Mexico, Norway, Qatar, Romania, Russia, Serbia, Saudi Arabia, S Korea, Tanzania, Thailand, Tunisia, Turkmenistan, UAE, Ukraine, Uzbekistan, Venezuela. Virtual training provided for PetroEdge, ALRDC, School of Mines, Repsol, UEP-Pakistan, and others since pandemic. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. Course Category Inclusion Person Centred Planning Visioning and Problem Solving Peer Support Description Person Centred Rehabilitation Person centred rehabilitation is designed to create a better life for an individual by the provision of an intense input designed to being about social change. This usually entails a series of visits focused on getting the person out and about to increase confidence, social skills and presence in their local community and to pursue goals and dreams. Usually, the work is carried out under the close clinical supervision of a practicing psychologist. PERSON CENTRED PLANNING A Person Centred Planning event would be carried out using the PATH or MAP process – majoring on dreams and goal setting leading to precise action planning. Facilitators would carry out the PATH or other person centred process. A large graphic will be one of the outcomes of the meetings this is a great visual record and a shared memory of the event. This will also inform the priorities for the later follow up inclusion facilitation work. Following the PATH event a ‘scoping report’ is created outlining what Inclusion Facilitation could offer and highlighting what dreams and goals the individual has. INCLUSION FACILITATION The PATH is also provides a good opportunity for the Facilitator to meet the focus person in a comfortable positive environment. Agreed visits from the Inclusion Facilitator are then carried out over a 3 month period. After this intensive input the Inclusion Facilitator will hand over to the existing family, carers and PA team to carry on where he or she has left off. This transition time is planned from the outset. An experienced psychologist needs to be there to support the facilitator at all times and will guide all work done by the inclusion facilitator. Is this just Support work? No! This is proactive engagement – doing whatever is required. This is not passively or reactively providing what is asked for – we are actively pursuing a good life for the individual. The work is built on careful research around a person’s interests and what opportunities exist locally There is community mapping There is work to tackle an individual’s own resistance and reluctance to engage more socially There is a need to engage with people in social settings that the individual attends to build bridges and connections – we are bridge builders You will need to build circles around a person There is a need to create the conditions in which friendships can flourish There is a need for direct psychological supervision and support throughout This work is short term and intense. The facilitator’s main aims will vary depending on the dreams and goals of the focus person. The basic aim of the inclusion facilitator is to better the focus person’s quality of life. Learning Objectives 1 To create a better life for the Individual. 2 Give Individual and family a clear vision of a good life and to support first steps towards this 3 To maximise individuals inclusion and connection with the wider community. 4 To help with friendship, social connection and education 5 To increase confidence, social skills and presence in their local community and to pursue goals and dreams. Who Is It For? Anyone who is involved in the rehabilitation of children or adults who have become disabled through accident or trauma and who is committed to helping them get their life back on track. Course Content Understanding ordinary needs – the dimensions of social inclusion Pursuing the dreams and goals of the individual Improving social skills Community Mapping Being comfortable in social environments Developing conversational skills Having a positive mindset Staying physically active Building relationships Help in meeting new people Create natural circles of support Creating a community circle Having positive body language Employment of support staff Pursuing personal interests If you like this you will almost certainly enjoy: Person Centred Planning using PATH and MAPs
Click to read more about this training, in which we demonstrate a live problem solving approach which is based on the active participation of family members. Course Category Inclusion Parents and Carers Behaviour and relationships Problem Solving Description In this training we demonstrate a live problem solving approach which is based on the active participation of family members. ‘Family Circles’ is an evolving new approach to problem solving with families and is based on our years of family work and the development and use of the Circle of Adults process. Inspired by our own Parent Solutions work and the Circle of Adults process as well as Family Group Conferencing and other Restorative Interventions we bring you Family Circles. Essentially the approach involves gathering a family together for a process that is facilitated but majors on the family members offering each other their wisdom and ideas. The approach is capacity focused, person centred approach to working with families rather than the dominant deficit oriented and ‘medical model’ of viewing and planning for or doing things to families. This training can be modelled with a group of professionals or better still with a family. In our work with families we develop the importance of naming stories or theories and seeking linkages and synthesis between what is found out and explored about the family situation and its history. We like participants to sit with the uncertainty, to reflect on the question ‘why’ but without judgement of each other. Deeper reflections may span a whole range of perspectives from ‘within person’ considerations, to situational or systemic possibilities. Health or emotional issues can be reflected on alongside organisational or transactional aspects of what is going on for the family. The better the shared understanding the better the strategy or actions which emerge from these meetings. Quality hypotheses with a close fit to reality lead to more effective implementation in the real world. We encourage ‘loose’ thinking, a search for connections, deeper listening, an ‘open mind’, speculation and exploration without moral judgements. From this stance self-reflection as well as reflection on the situation can produce remarkable insights. The quality of theories or new stories generated is directly influenced by family members’ experiences and the models of learning, behaviour and emotion, systems, educational development, change and so on that they have been exposed to. Learning Objectives To provide opportunities for: Shared problem solving in a safe exploratory climate in which the family will find its own solutions. Individuals to reflect on their own actions and strategies An exploration of whole-family processes and their impact Emotional support and shared understandings of issues at a child, parent, family, school and community level. Feed back to each other on issues, ideas and strategies that are agreed to be worth sharing with them. Who Is It For? Anyone interested in working with families in a way that builds and makes use of their capacities rather than focus on their challenges and difficulties. Social Care teams School staff Community organisers Educational Psychologists Course Content True family empowerment Deepening shared stories and understandings Facilitating groups Problem solving process Handling family group communication Allowing direct feedback and challenge between participants in a safe way Building relationships Process: Family members are welcomed: Introductions are carried out, ground rules and aims clarified whilst coffee is drunk. A recap from the last session is carried out: To follow up developments and reflections after the last meeting. One issue is selected for the main focus Issue presentation: The family member who raised the concern is asked questions to tell the ‘story’ of the issue or problem. Additional questions/information from the group about the problem are gathered: Ground rules may need to be observed carefully here. Individual participants need to be kept focused and prevented from leaping to premature conclusions or to making ‘helpful’ suggestions about strategy. Relationship aspects to the problem are explored. Metaphors and analogies are invited. How would a fly on the wall see your relationship? If you were alone together on a desert island, what would it be like? Impact of previous relationships/spillage from one relationship to another are explored. Eg what situation they are reminded of? For instance, does this situation remind you of any of those angry but helpless feelings you had with your other son when he was an adolescent? This provides opportunities to reflect on how emotions rub off on other people. The parent feels really frustrated, and on reflection we can see that so does the child System/Organisation factors (Family system/school and community systems and so on): What aspects help or hinder the problem? For instance, does the pastoral system of the local school provide space, or time and skilled personnel able to counsel this young person and work actively with their parents? Synthesis. At this stage the Graphic facilitator summarises what they have heard. They then go on to describe linkages and patterns in what they have heard. This can be very powerful. The person doing the graphic work has been able to listen throughout the presentation process and will have been struck by strong messages, emotions and images as they have arisen. The story and meaning of what is happening in the situation may become a little clearer at this point. Typical links may be ‘mirrored emotions’ strong themes such as loss and separation issues, or repeated processes such as actions triggering rejection. This step provides an excellent grounding for the next process of deepening understanding. What alternative strategies/interventions are open to be used? Brainstormed and recorded. ’Either/ors’ need to be avoided at this time also. This needs to be a shared session in which the family member who is presenting the concern contributes as much as anyone. Care is needed to ensure that this person is not overloaded with other people’s strategies. The final selection of strategy or strategies from the brainstormed list is the problem presenter’s choice. Strategies might include: a special time for the young person, a meeting with the child’s parents to explore how she is being managed at home and to share tactics, a home-school diary, counselling, or an agreed action plan that all are aware of, agreed sanctions and rewards and so forth. Strategies may productively involve processes of restitution and restoration, when ‘sorry’ is not enough. Making it right, rather than punishments or rewards, may then becomes the focus. First Steps. The problem presenter is finally asked to agree one or two first steps which they can carry out over the next 3-7 days. It can help to assign a ‘coach’ who will check in with them to ensure they have carried out the action they have named. This is a time to be very specific. Steps should be small and achievable. The person is just ‘making a start’. A phone call, or making an agreement with a key other person not present at the meeting would be ideal examples. Final reflections. Sometimes referred to as a ‘round of words’ help with closure for all involved. Reflections are on the process not the problem. In large families this is best done standing in a circle. In smaller groups all can remain sitting. Passing around a ‘listening stick’ or something similar such as a stone or light heighten the significance of the process ending and improve listening. Finally the problem presenter is handed the ‘Graphic’ this is their record of the meeting and can be rolled and presented ceremoniously by the facilitators for maximum effect! If you liked this course you may well like: Parent Solutions
Duration 4 Days 24 CPD hours This course is intended for This course is designed for data scientists with existing knowledge of Python and machine learning frameworks like Scikit-Learn, PyTorch, and Tensorflow, who want to build and operate machine learning solutions in the cloud. Overview Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring in Microsoft Azure. Learn how to operate machine learning solutions at cloud scale using Azure Machine Learning. This course teaches you to leverage your existing knowledge of Python and machine learning to manage data ingestion and preparation, model training and deployment, and machine learning solution monitoring with Azure Machine Learning and MLflow. Prerequisites Creating cloud resources in Microsoft Azure. Using Python to explore and visualize data. Training and validating machine learning models using common frameworks like Scikit-Learn, PyTorch, and TensorFlow. Working with containers AI-900T00: Microsoft Azure AI Fundamentals is recommended, or the equivalent experience. 1 - Design a data ingestion strategy for machine learning projects Identify your data source and format Choose how to serve data to machine learning workflows Design a data ingestion solution 2 - Design a machine learning model training solution Identify machine learning tasks Choose a service to train a machine learning model Decide between compute options 3 - Design a model deployment solution Understand how model will be consumed Decide on real-time or batch deployment 4 - Design a machine learning operations solution Explore an MLOps architecture Design for monitoring Design for retraining 5 - Explore Azure Machine Learning workspace resources and assets Create an Azure Machine Learning workspace Identify Azure Machine Learning resources Identify Azure Machine Learning assets Train models in the workspace 6 - Explore developer tools for workspace interaction Explore the studio Explore the Python SDK Explore the CLI 7 - Make data available in Azure Machine Learning Understand URIs Create a datastore Create a data asset 8 - Work with compute targets in Azure Machine Learning Choose the appropriate compute target Create and use a compute instance Create and use a compute cluster 9 - Work with environments in Azure Machine Learning Understand environments Explore and use curated environments Create and use custom environments 10 - Find the best classification model with Automated Machine Learning Preprocess data and configure featurization Run an Automated Machine Learning experiment Evaluate and compare models 11 - Track model training in Jupyter notebooks with MLflow Configure MLflow for model tracking in notebooks Train and track models in notebooks 12 - Run a training script as a command job in Azure Machine Learning Convert a notebook to a script Run a script as a command job Use parameters in a command job 13 - Track model training with MLflow in jobs Track metrics with MLflow View metrics and evaluate models 14 - Perform hyperparameter tuning with Azure Machine Learning Define a search space Configure a sampling method Configure early termination Use a sweep job for hyperparameter tuning 15 - Run pipelines in Azure Machine Learning Create components Create a pipeline Run a pipeline job 16 - Register an MLflow model in Azure Machine Learning Log models with MLflow Understand the MLflow model format Register an MLflow model 17 - Create and explore the Responsible AI dashboard for a model in Azure Machine Learning Understand Responsible AI Create the Responsible AI dashboard Evaluate the Responsible AI dashboard 18 - Deploy a model to a managed online endpoint Explore managed online endpoints Deploy your MLflow model to a managed online endpoint Deploy a model to a managed online endpoint Test managed online endpoints 19 - Deploy a model to a batch endpoint Understand and create batch endpoints Deploy your MLflow model to a batch endpoint Deploy a custom model to a batch endpoint Invoke and troubleshoot batch endpoints