• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

29 Courses in London delivered Live Online

5G demystified

5.0(3)

By Systems & Network Training

5G training course description This course is designed to give the delegate an understanding of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. During the course we will investigate the 10 pillars for 5G, which will include various Radio Access Technologies that are required to interwork smoothly. Hence we will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Explain the 5G Internet and Software Distributed Networks (SDN). Explain carrier aggregation, the mobile cloud and RAT virtualisation. Explain an overall picture of 5G architecture. 5G training course details Who will benefit: Anyone who is looking to work with next generation networks. Prerequisites: Mobile communications demystified Duration 3 days 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, small cell, o SON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE advanced features *MIMO, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP, * Uplink Multi-Cell Reception. ICIC & eICIC ICIC, Homogeneous to heterogeneous network, eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), * CC aggregation, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configurations (Rel 9, 10 & 12). Enhanced Interference Mitigation & Traffic Adaptation (eIMTA) TDD UL-DL reconfiguration for traffic adaptation, Reconfiguration mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, innovation centre, 5G in North America, research, company R & D, 5G specifications. The 5G internet Cloud services, IoT & context awareness, network reconfiguration & virtualization support, hypervisors, SDN, the controller, service-oriented API, OpenFlow switches, SDN operation, SDN control for traffic flow redirection, OpenFlow controllers, how SDN works, application, control and infrastructure layers, a programmable network, how SDN & NFV tie together, SDN's downside, SDN orchestration, Mobility, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture, network virtualization (VNet), INM, NetInf, ForMux, MEEM, GP & AM, QoS support, network resource provisioning, IntServ, RSVP, DiffServ, CoS, aggregated resource provisioning, SICAP, MARA, Emerging approach for resource over-provisioning, example use case architecture for the 5G internet, integrating SDN/NFV for efficient resource control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations, network operations. Small cells for 5G Average spectral efficiency evolution, What are small cells? WiFi & Femto cells as candidate small-cell technologies, Capacity limits & achievable gains with densifications, gains with multi-antenna techniques, gains with small cells, Mobile data demand, approach & methodology, subscriber density projections, traffic demand projections, global mobile data traffic increase modelling, country level backhaul traffic projections, 2020 average spectrum requirement, Small cell challenges, backhaul, spectrum, automation. Cooperation for next generation wireless networks Cooperative diversity & relaying strategies, Cooperative ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol, NCCARQ overview, PHY layer impact, Performance evaluation, simulation scenario and results. Mobile clouds; technology & services for future communications platforms Mobile cloud, software, hardware and networking resources, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4, software stacks, infrared, near field communications (NFC), store & forward vs compute & forward, random/linear network coding. Security for 5G communications Potential 5G architectures, Security issues & challenges in 5G, user equipment, mobile malware attacks, 5G mobile botnets, attacks on 4G networks, C-RNTI & packet sequence numbers based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, attacks on mobile operator's network, user data & identity attacks, DDoS attacks, amplification, HSS saturation, external IP networks.

5G demystified
Delivered in Internationally or OnlineFlexible Dates
£2,367

17th September Clare Coombes #Agent121. Looking for: ADULT FICTION

5.0(3)

By I Am In Print

LOOKING FOR: ADULT FICTION Clare set up the Liverpool Literary Agency in 2020 to help address inequality and underrepresentation in the publishing industry. With more than 15 years’ experience of writing and editing professionally, including the publication of two novels, Definitions (2015) and We Are of Dust (2018 - which has received development funding from the Liverpool Film Office for a TV adaptation), she has developed an in-depth knowledge of what commissioning editors and publishers expect to see from a submitted manuscript. With a background in PR and marketing, alongside teaching on creative writing programmes, Clare also has extensive experience in pitching and promoting writers and has been nominated for the Romantic Novelist Association Agent of the Year Award! Clare would love to see historical fiction, crime fiction, psychological thrillers and women’s fiction, but she is open to all great writing with a strong hook in any area (excluding non-fiction, children’s and YA). She actively encourages submissions from writers who have been traditionally under-represented. Clare would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Clare is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print).  By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 10th September 2025

17th September Clare Coombes #Agent121. Looking for: ADULT FICTION
Delivered Online + more
£72

Business Relationship Management Professional (BRMP): Virtual In-House Training

By IIL Europe Ltd

Business Relationship Management Professional (BRMP)®: Virtual In-House Training Business Relationship Management (BRM) embodies a set of competencies (knowledge, skills, and behaviors) to foster an effective business value-producing relationship between a service provider and its business partners. The BRM Discipline rests on solid research-based foundations verified and enhanced over a decade of successful implementations in leading organizations across the world. Proven to be equally effective for shared services including Human Resources, Finance, Legal, external service providers and others, BRM practices have enjoyed widespread adaptation in IT. The Business Relationship Management Professional (BRMP) training and certification program provides a foundational understanding of business relationship management (BRM) for individuals at every experience level, with the training and certification designed to provide a solid baseline level of knowledge. In other words, this course provides the 'why' and the 'what' - 'why' business relationship management is important to your organization and 'what' a BRM capability does to add value to your organization. This interactive course, with discussions, partnering activities, and periodic knowledge checks, will provide you with the opportunity to apply learning to your unique organizational situations, creating solutions that you can use immediately upon returning to your workplace. This practical knowledge will allow you to demonstrate immediate value in your role, as well as prepare you for the BRMP Certification exam.

Business Relationship Management Professional (BRMP): Virtual In-House Training
Delivered OnlineFlexible Dates
£2,550

Communicating Across Your Organization

By Nexus Human

Duration 2 Days 12 CPD hours This course is intended for Managers, directors, and other professionals responsible for planning and leading projects and programs will benefit from this course. Overview Describe common communication barriers Understand how to use effective interpersonal skills in their spoken and written communications Analyze the pillars of organizational awareness Apply principles of effective facilitation Understand how to adapt their approach to different learning and communication styles Effective communication is how employees and management interact to reach organizational goals. Getting this right results in a happier, more engaged workforce who get more done. Unfortunately, there are often significant barriers ? language, culture, distrust, distance ? to effective communication. The activities and discussions in this workshop will help you identify the essential elements of effective communications within your organization and develop communication strategies that harness both interpersonal and organizational awareness to build trust, strengthen collaboration, and increase productivity. Private classes on this topic are available. We can address your organization?s issues, time constraints, and save you money, too. Contact us to find out how. 1. A History of Organizational Communication A Historical Perspective Classic vs. Human Relations Communications Generational and Technological Change Digital Communication Effectiveness of Communication Channels 2. The Effectiveness of Interpersonal Skills Limitations of Self-Awareness Transactional Analysis Connecting with Powerful Communication Active Listening Non-Verbal Communication Written Communication The Power of Facilitation 3. The Pillars of Organizational Awareness Culture and Behavior Creating Psychological Safety Inclusion and Belonging Sweaty-Palmed Conversations Care and Challenge Each Other 4. The Adaptation of Communication Strategies Factors in Communication Communication Barriers Adapting to Different Learning and Communication Styles Communication Strategies Across Time Position and Posture Additional course details: Nexus Humans Communicating Across Your Organization (Second Edition) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the Communicating Across Your Organization (Second Edition) course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

Communicating Across Your Organization
Delivered OnlineFlexible Dates
£1,500

NIST Cyber Security Professional (NCSP) Practitioner

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course assumes the student has successfully taken and passed the NCSF Foundation 2.0 course based on the NIST Cybersecurity Framework version 1.1, release April 2018. Following the course introduction, the course provides an introduction to the intersection between digital transformation and cybersecurity, which is followed by an overview of the threat landscape. Following an approach to the implementation of cybersecurity controls, the course delves into an organizational approach to cybersecurity that starts governance, management, and a supportive culture,Finally, the course provides additional guidance for the cybersecurity practitioner to determine the current state, the desired state, and a plan to close the gap - and to do this over and over again to inculcate it into organizational DNA. Overview This course looks at the impact of digital transformation on cybersecurity risks, an understanding of the threat landscape, and an approach to the application of cybersecurity controls. It provides guidance for students on the best approach to design and build a comprehensive cybersecurity program. Executives are keenly aware of the risks but have limited knowledge on the best way to mitigate these risks. This course also enables our executives to answer the critical question - Are we secure? The class includes lectures, informative supplemental reference materials, quizzes, exercises, and formal examination. The exercises are a critical aspect of the course; do not skip them. Outcomes and benefits from this class is a practical approach that students can use to build and maintain comprehensive cybersecurity and cyber-risk management programs. This course is targeted at IT and Cybersecurity professionals looking to become certified on how to operationalize the NIST Cybersecurity Framework (NCSP) across an enterprise and its supply chain. Digital Transformation Explores what the Practitioner needs to know about the relationship between digital transformation and cybersecurity Explain how to determine the impact of cybersecurity on DX. Explain the relationships between culture and digital transformation from the perspective of a practitioner. Explain the delivery of value to stakeholders in a DX & cybersecurity environment. Illustrate the interdependent relationship between cybersecurity and DX. Threat Landscape The Practitioner needs to understand what threat actors do and their capabilities. Compare the evolving attack type impact to the threat environment. Apply knowledge about the threat landscape to maintain a readiness to respond. Develop a risk profile based on business impact analysis Establish the relationship between awareness and training in the continual improvement of cybersecurity posture. Develop and treat training & awareness as a critical aspect of deterrence Use knowledge about the threat landscape as a predicate to the adoption and adaptation of your cybersecurity posture. The Controls This chapter provides a sample set of controls based on an informative reference. Understand the purpose goals & objectives for each control. Characterize & explain the informative reference controls Discover how to apply the controls in an organizational context. Adopt & Adapt Adopt is a decision about governance; adapt is the set of management decisions that result from the decision to adopt. Distinguish Adopt, Adapt, Management & Governance. Develop an approach to adoption & adaptation. Distinguish & demonstrate the impact of organizational culture on developing cybersecurity as a capability. Develop an assessment approach to define current state. Adaptive Way of Working Threat actors are agile and highly adaptive. The cybersecurity Practitioner must develop the same capabilities Break down what constitutes an adaptive approach. Characterize & apply the need for crossfunctional teams. Recognize and prioritize the first steps (get started). Demonstrate & establish cybersecurity phases. Break down the impact of the flows. Rapid Adoption & Rapid Adaptation FastTrack FastTrack? is an approach to allow organizations to learn to adapt to an evolving threat landscape rapidly. Approach: Establish what it takes to adopt CS. Determine how that impacts management adaptation of CS. Determine how that impacts the capability to assess. CS Capability: Determine the gap between existing & needed capabilities. Establish what must be developed. Develop appropriate risk management profile. Discover how cybersecurity impacts people, practice & technology impacts organization. Differentiate CIS Implementation groups. Determine appropriate implementation group & approach. Develop appropriate phase approaches. CIIS Practice Cybersecurity is an ongoing game of cat and mouse. Organizations must learn how to inculcate cybersecurity improvement into their DNA. Break down & develop mechanisms for ongoing cybersecurity improvement that includes developing a learning organization. Illustrate an improvement plan based on the NIST 7-Step Approach. Illustrate an improvement plan based on the Improvement GPS Demonstrate understanding of Cybersecurity Maturity Model Certification Break down the balancing loop & how it fits into the escalation archetype Use the Fast Track? (improvement & implementation) cycles.

NIST Cyber Security Professional (NCSP) Practitioner
Delivered OnlineFlexible Dates
Price on Enquiry

Essential 5G

5.0(3)

By Systems & Network Training

Essential 5G training course description This course is designed to give delegates an explanation of the technologies and interworking requirements of the next generation of cellular communications. It is not a definitive set of descriptions but a possibility of the final deployment. we will investigate the 10 pillars for 5G which will include various Radio Access Technologies that are required to interwork smoothly. We will look at the 4G Pro features and other RATs. What will you learn List the ten pillars of 5G deployment. Describe the 5G Internet. Explain virtualization and RAT virtulization. Describe Software Defined Networks (SDN). Explain carrier aggregation. Describe the mobile cloud. Explain an overall picture of 5G architecture. Essential 5G training course details Who will benefit: Anyone looking for an understanding of the technologies and interworking requirements of the next generation of cellular communications. Prerequisites: None. Duration 3 days Essential 5G training course contents Drivers for 5G 5G Road Map, 10 Pillars of 5G, evolving RATs, oSON, MTCm, mm-wave, backhaul, EE, new spectrum, spectrum sharing, RAN virtualisation. 4G LTE Advanced MIMO technology in release 8, Downlink & uplink MIMO R8, MIMO technology in LTE advanced, Downlink 8-layer SU-MIMO, Downlink MU-MIMO, Uplink MU-MIMO, Uplink transmit diversity, Coordinated multi-point operation (CoMP), Independent eNB & remote base station configurations, Downlink CoMP. ICIC & eICIC ICIC, Homogeneous to heterogeneous network evolution, Introduction to eICIC, Macro-pico scenario, Macro-femto scenario, Time orthogonal frequencies. Almost Blank Subframe (ABS). Carrier aggregation Component carriers (CC), CC aggregation deployments, Intra-band contiguous solutions, Intra-band non-contiguous solutions, Inter-band non-contiguous solutions, CA bandwidth classes, Aggregated transmission bandwidth configurations (ATBC), Possible carrier aggregation configs. eIMTA TDD UL-DL reconfig. for traffic adaptation, Reconfig. mechanisms, Interference mitigation schemes, Dynamic & flexible resource allocation. 5G architectures 5G in Europe, horizon 2020 framework, 5G infrastructure PPP, METIS project, 5G in North America, academy research, company R&D, 5G specifications. The 5G internet High-level view of Cloud Services, The Internet of Things & context awareness, Network reconfiguration & virtualization support, server proliferation, how VMs fix underutilised server problem, enter the hypervisor, why are VM such a big deal? SDN, evolution of the data centre network, high availability, low latency, scalability, security, cost model explodes, service-oriented API. OpenFlow switches, OpenFlow controllers, how SDN works. The big picture, pulling it all together, why the network had to change, how SDN & NFV tie together. Evolutionary approach to the internet, architectures for distributed mobility management, MEDIEVAL & MEDIVO projects, a clean slate approach, mobility first architecture. VNet, INM, NetInf, ForMux, MEEM. Generic Path (GP) & anchorless mobility (AM), Quality of Service support, network resource provisioning, resourcing inside a network. IntServ, RSVP, DiffServ, CoS. Emerging approach for resource over- provisioning, example use case architecture for scalable resource control scenarios in the 5G internet. Integrating SDN/NFV for efficient resource over-reservation control, control information repository, service admission control policies, network resource provisioning, control enforcement functions, network configurations & operations. Small cells for 5G Average spectral efficiency evolution, WiFi & Femto cells, Capacity limits. Achievable gains with densifications, multi-antenna techniques, small cells. Mobile data demand, approach & methodology, subscriber density and traffic demand projections to 2020. Demand versus capacity, global mobile data traffic increase modelling, country level backhaul traffic projections, Small cell challenges, backhaul, spectrum, automation. Cooperation for next gen wireless networks Diversity & relaying strategies, cooperation & network coding, ARQ & MAC protocols, NCCARQ & PRCSMA packet exchange, Physical layer impact on MAC protocol analysis, NCCARQ overview, PHY layer impact, Case study on NCCARQ. Mobile clouds Mobile cloud, Mobile cloud enablers, mobile user domain, wireless technologies, WWAN WLAN and WPAN range, Bluetooth, IEEE.802.15.4 & software stacks, infrared, near field communications (NFC). Network coding, store & forward vs compute & forward, linear network coding, random linear coding. Security for 5G communications Potential 5G communication systems architectures, Security issues & challenges. Mobile malware attacks targeting the UE, 5G mobile botnets, access networks, attacks on 4G networks, C-RNTI & packet sequence number based UE location tracking, false buffer status reports attacks, message insertion attacks, HeNB attacks, physical attacks, credential attacks, configuration and protocol attacks, attacks on MON, user data & identity attacks, mobile operator's core network, DDoS attacks targeting MON, signalling amplification, HSS saturation, external IP networks.

Essential 5G
Delivered in Internationally or OnlineFlexible Dates
£2,367

GPON and FTTx networks

5.0(3)

By Systems & Network Training

GPON and FTTx networks training course description Designed to benefit those requiring an in depth knowledge of the principles and applications of Ten Gigabit and Gigabit Passive Optical Networking and Fibre to the X in NG Networks applications and their associated equipment, its flexibility and function within a modern transmission network. Using an effective mix of 'hands on' equipment instruction and correlation to theory based learning the delegate will gain a complete understanding of the equipment and the tasks to be undertaken in a real life situation. What will you learn Compare PON/FTTx systems. Explain network elements and designs. Support applications and network interfaces. List circuit provisioning and bandwidth requirements. Understand upstream & downstream issues. Describe headend & network elements/OLT-ONT. Perform network testing with OTDR test sets. GPON and FTTx networks training course details Who will benefit: Anyone working with GPON and FTTx. Prerequisites: Introduction to data communications and networking. Duration 5 days GPON and FTTx training course contents FTTN, FTTC, FTTH SMF, MMF, Fibre safety and properties (dispersion/attenuation), Fibre reel cables and types, Fibre installation and air blown fibre, Transmitters and receivers - power budget/laser classes. Fibre to the home (FTTH), FTTC (Fibre to the Cabinet), FTTN (Fibre to the node) , FTTD (Fibre to the desk), FFTH topologies and wavelengths, Active or passive optical network. WDM equipment and GPON OSP design Wavelength considerations, WDM/DWDM/CWDM, EDFA optical amplification, AWG (Arrayed Waveguide Grating) splitters , Couplers (splitters) and losses, Optical splitters 1x2, 1x4, 1x8, 1x16, 1x32, 1x64, 2x64. PON variants Gigabit passive optical network (GPON), Gigabit Ethernet passive optical network (GEPON), Time division PON (TDM-PON), Wave Division Multiplexing PON (WDM-PON), 1Gbps, 10Gbps, 40Ggps, 100Gbps FSAN (Full Service Access Network) NGA (Next Generation Access), Strategies for TDM-PON to WDM-PON migration, Architecture of NG-PON (hybrid WDM/TDM PON), Additional services than triple play. GEPON design GPON OSP centralized and distributed design, GPON PON splitters x4 x8 x32, Fibre splice trays /cassette trays & enclosures, GPON field testing and installation verification, GPON physical layer testing, Optical time domain reflectometer (OTDR), Optical power source & meter, Optical return loss (ORL), APON/BPON/GPON/EPON comparisons. GPON ITU-T G.984.1 Reference model, terminology & architecture, Access network system management functions. ONT & OLT functional block examples. FTTx scenarios, 4 switching arrangements for external access network backup. GPON ITU-T G.984.2 Physical layer, Enhancement band, Bit rate and wavelengths, FEC and RAMAN. GPON ITU-T G.984.3 Frame structure, GPON encapsulation method (GEM), GTC adaptation and framing sublayer protocol stack, Status reporting & traffic monitoring DBA (SR-DBA & TM-DBA), Transmission container (T-CONT) types, Downstream & upstream multiplexing, GEM port identifier, Media access control and ONU registration, Extended bandwidth assignment model scheduling architecture, PLOAM & alarm messages, Downstream & Upstream FEC, Process order in a GTC transmit flow. GPON ITU-T G.984.4 and G.988 ONT management and control interface (OMCI) Management interface, Reference model, Typical ONT with SCTE 55-1 or SCTE 55-2 compliancy. GPON ITU-T G.984.5 enhancement band Band options, GPON NGA, Wavelength allocation. GPON ITU-T G.984.6 optical reach extension (G.984.re) Reach extension (RE), OA-based and OEO-based reach extenders, Protection, Reach extender with OTDR blocking filters (BF) and bypass (BYP) filters. GPON ITU-T G.984.7 long reach Quiet Window. 10-GPON ITU-T G.987.1 (XG-PON) Scenarios, reference access network architecture, XG-PON with G-PON through WDM1r, G-PON and XG-PON wavelength allocation, G-PON and XG-PON co-existence with video overlay option, RE migration scenarios. G.989 40Gbps XG-PON2 Functional reference architecture, NG-PON2 system coexistence with legacy systems, Definitions of legacy compatibility terminology. GPON issues and standards GPON components GPON OLT / GPON ONT, GPON management, Operational support systems (OSS), Network management systems (NMS), OMCI (ONT Management control interface), RG (Residential gateway), Data and prioritised voice channel product, GPON broadband-forum standards, Broadband-forum , TR-069 and TR-156, HPNA (home phone network alliance), Powerline carrier (PLC), GPON DLNI G.hn or G.9960, MOCA, FTTH council certification standard for network certification. Fibre-connected home badge, Ethernet in the first mile (EFM), GPON frame synchronization to network timing, Direct clock synchronization interface (BITS), Multiservice access platform (MSAP), Software planning tool, Superconnected cities / voucher scheme. Hands on practical assignments Single and multimode fibre recognition, Fibre Cleaning methods, Checking cleaning with an optical microscope, Optical light source and optical power meter referencing, PON splitter and fibre drum testing with an optical power meter, 6km classroom passive optical network testing with an OTDR at 1310/1550nm, Using decibels (dB's) and decibel milliwats (dBm's), Designing networks up to 20km long using vendor specifications (power budget), Fault finding with a visible fault locator.

GPON and FTTx networks
Delivered in Internationally or OnlineFlexible Dates
£3,697

Deep Learning with Vision Systems (TTAI3040)

By Nexus Human

Duration 3 Days 18 CPD hours This course is intended for This course is geared for attendees with Intermediate IT skills who wish to learn Computer Vision with tensor flow 2 Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Computer Vision expert instructor, students will learn about and explore how to Build, train, and serve your own deep neural networks with TensorFlow 2 and Keras Apply modern solutions to a wide range of applications such as object detection and video analysis Run your models on mobile devices and web pages and improve their performance. Create your own neural networks from scratch Classify images with modern architectures including Inception and ResNet Detect and segment objects in images with YOLO, Mask R-CNN, and U-Net Tackle problems faced when developing self-driving cars and facial emotion recognition systems Boost your application's performance with transfer learning, GANs, and domain adaptation Use recurrent neural networks (RNNs) for video analysis Optimize and deploy your networks on mobile devices and in the browser Computer vision solutions are becoming increasingly common, making their way into fields such as health, automobile, social media, and robotics. Hands-On Computervision with TensorFlow 2 is a hands-on course that thoroughly explores TensorFlow 2, the brandnew version of Google's open source framework for machine learning. You will understand how to benefit from using convolutional neural networks (CNNs) for visual tasks. This course begins with the fundamentals of computer vision and deep learning, teaching you how to build a neural network from scratch. You will discover the features that have made TensorFlow the most widely used AI library, along with its intuitive Keras interface. You'll then move on to building, training, and deploying CNNs efficiently. Complete with concrete code examples, the course demonstrates how to classify images with modern solutions, such as Inception and ResNet, and extract specific content using You Only Look Once (YOLO), Mask R-CNN, and U-Net. You will also build generative dversarial networks (GANs) and variational autoencoders (VAEs) to create and edit images, and long short-term memory networks (LSTMs) to analyze videos. In the process, you will acquire advanced insights into transfer learning, data augmentation, domain adaptation, and mobile and web deployment, among other key concepts Computer Vision and Neural Networks Computer Vision and Neural Networks Technical requirements Computer vision in the wild A brief history of computer vision Getting started with neural networks TensorFlow Basics and Training a Model TensorFlow Basics and Training a Model Technical requirements Getting started with TensorFlow 2 and Keras TensorFlow 2 and Keras in detail The TensorFlow ecosystem Modern Neural Networks Modern Neural Networks Technical requirements Discovering convolutional neural networks Refining the training process Influential Classification Tools Influential Classification Tools Technical requirements Understanding advanced CNN architectures Leveraging transfer learning Object Detection Models Object Detection Models Technical requirements Introducing object detection A fast object detection algorithm YOLO Faster R-CNN ? a powerful object detection model Enhancing and Segmenting Images Enhancing and Segmenting Images Technical requirements Transforming images with encoders-decoders Understanding semantic segmentation Training on Complex and Scarce Datasets Training on Complex and Scarce Datasets Technical requirements Efficient data serving How to deal with data scarcity Video and Recurrent Neural Networks Video and Recurrent Neural Networks Technical requirements Introducing RNNs Classifying videos Optimizing Models and Deploying on Mobile Devices Optimizing Models and Deploying on Mobile Devices Technical requirements Optimizing computational and disk footprints On-device machine learning Example app ? recognizing facial expressions

Deep Learning with Vision Systems (TTAI3040)
Delivered OnlineFlexible Dates
Price on Enquiry

Hands-On Computervision with TensorFlow 2 (TTML6900)

By Nexus Human

Duration 4 Days 24 CPD hours This course is intended for This course is geared for attendees with Intermediate IT skills who wish to learn Computer Vision with tensor flow 2 Overview This 'skills-centric' course is about 50% hands-on lab and 50% lecture, with extensive practical exercises designed to reinforce fundamental skills, concepts and best practices taught throughout the course. Working in a hands-on learning environment, led by our Computer Vision expert instructor, students will learn about and explore how to Build, train, and serve your own deep neural networks with TensorFlow 2 and Keras Apply modern solutions to a wide range of applications such as object detection and video analysis Run your models on mobile devices and web pages and improve their performance. Create your own neural networks from scratch Classify images with modern architectures including Inception and ResNet Detect and segment objects in images with YOLO, Mask R-CNN, and U-Net Tackle problems faced when developing self-driving cars and facial emotion recognition systems Boost your application's performance with transfer learning, GANs, and domain adaptation Use recurrent neural networks (RNNs) for video analysis Optimize and deploy your networks on mobile devices and in the browser Computer vision solutions are becoming increasingly common, making their way into fields such as health, automobile, social media, and robotics. Hands-On Computervision with TensorFlow 2 is a hands-on course that thoroughly explores TensorFlow 2, the brand-new version of Google's open source framework for machine learning. You will understand how to benefit from using convolutional neural networks (CNNs) for visual tasks. This course begins with the fundamentals of computer vision and deep learning, teaching you how to build a neural network from scratch. You will discover the features that have made TensorFlow the most widely used AI library, along with its intuitive Keras interface. You'll then move on to building, training, and deploying CNNs efficiently. Complete with concrete code examples, the course demonstrates how to classify images with modern solutions, such as Inception and ResNet, and extract specific content using You Only Look Once (YOLO), Mask R-CNN, and U-Net. You will also build generative adversarial networks (GANs) and variational autoencoders (VAEs) to create and edit images, and long short-term memory networks (LSTMs) to analyze videos. In the process, you will acquire advanced insights into transfer learning, data augmentation, domain adaptation, and mobile and web deployment, among other key concepts. Computer Vision and Neural Networks Computer Vision and Neural Networks Technical requirements Computer vision in the wild A brief history of computer vision Getting started with neural networks TensorFlow Basics and Training a Model TensorFlow Basics and Training a Model Technical requirements Getting started with TensorFlow 2 and Keras TensorFlow 2 and Keras in detail The TensorFlow ecosystem Modern Neural Networks Modern Neural Networks Technical requirements Discovering convolutional neural networks Refining the training process Influential Classification Tools Influential Classification Tools Technical requirements Understanding advanced CNN architectures Leveraging transfer learning Object Detection Models Object Detection Models Technical requirements Introducing object detection A fast object detection algorithm ? YOLO Faster R-CNN ? a powerful object detection model Enhancing and Segmenting Images Enhancing and Segmenting Images Technical requirements Transforming images with encoders-decoders Understanding semantic segmentation Training on Complex and Scarce Datasets Training on Complex and Scarce Datasets Technical requirements Efficient data serving How to deal with data scarcity Video and Recurrent Neural Networks Video and Recurrent Neural Networks Technical requirements Introducing RNNs Classifying videos Optimizing Models and Deploying on Mobile Devices Optimizing Models and Deploying on Mobile Devices Technical requirements Optimizing computational and disk footprints On-device machine learning Example app ? recognizing facial expressions

Hands-On Computervision with TensorFlow 2 (TTML6900)
Delivered OnlineFlexible Dates
Price on Enquiry

Cognicert Root Cause Analysis Professional Course

5.0(1)

By Cognicert Limited

Root Cause Analysis (RCA) is used to analyse the root causes of focus events with both positive and negative outcomes, but it is most commonly used for the analysis of failures and incidents. Causes for such events can be varied in nature, including design processes and techniques, organizational characteristics, human aspects and external events. RCA can be used for investigating the causes of non-conformances in quality (and other) management systems as well as for failure analysis, for example in maintenance or equipment testing.

Cognicert Root Cause Analysis Professional Course
Delivered OnlineFlexible Dates
£800

Educators matching "Adaptation"

Show all 9
Beeleaf Institute For Contemporary Psychotherapy

beeleaf institute for contemporary psychotherapy

5.0(5)

London

Cutting edge training methods that are focussed on the learning process of the trainee, supporting the individual’s unique journey of exploration and adaptation, are a great part in what has caused BeeLeaf’s reputation and popularity to spread so far, so quickly. BeeLeaf is a Training and Accrediting Member of the United Kingdom Council for Psychotherapy. We enjoy the attendance of international delegates, from a wide range of cultural, social and professional backgrounds, who all contribute to what makes the BeeLeaf experience so special. BeeLeaf is a not-for-profit Organisation and was established in 1993 by Hypno-Psychotherapist and Trainer, Pamela Gawler-Wright, to establish a unifying identity for her therapy and teaching work. Pamela has designed and delivered seminars, workshops and training courses since 1986 for many local authorities and established Training Organisations, across the length and breadth of the British Isles. BeeLeaf is a response to the request of many of her clients, trainees and supervisees. People hungered for creative, practical and challenging Psychotherapy training in a learning environment that honoured in practice the presuppositions of Erickson, Satir, Perls, Bateson and Systemic NLP. Therefore, an independent training organisation was created, that grounded its work in the ethical and therapeutic application of Neuro-Linguistic Psychotherapy and Ericksonian Hypno- Psychotherapy. This approach has since blossomed into the modality of Contemporary Psychotherapy. Over the years, BeeLeaf has become a team of talented professionals with decades of collective experience in provision of psychotherapy and training, who have joined Pamela in this successful endeavour. Gill Turner, psychologist and Consultant, joined BeeLeaf in 1997 and assisted in forming the Foundation Certificate in Neuro-Linguistic Psychotherapy. The expansion of activity required the input of a new Managing Director and in 1999 Mandy-Jane Herring, an experienced Educationalist and Manager led BeeLeaf in another evolutionary leap. Not long after this Julia Lloyd, Graphic Designer joined as a Non-Executive Director. BeeLeaf’s team has since grown and is complemented by several other experienced and talented professionals in the field, all of whom bring something very special to the whole training experience.

Learning Improvement Service

learning improvement service

Bromley Common

Who and what is the Learning Improvement Service? The Learning Improvement Service was set up by Phil Hatton (read about Phil here), an ex-Ofsted HMI and National Adviser. Through his extensive experience in leading inspections, surveys, good practice, advisory work and improvement consultancy, Phil has a unique and wide understanding of best practice in the Further Education sector, particularly in colleges and in work-based learning. He is utilising his knowledge to help colleges and other providers of training improve the learning experience they give to their learners. The LIS only wants to work with those who have a real will to improve their provision, by establishing where you are now and where you would like to be in the future. We do not intend to just help to ‘patch you up’ to get you through an inspection, but to help you make sustainable improvements. We use only the best people, who know what they are doing, because they have done it themselves. Below is a brief summary of the main ways that we can support you (however, please contact us if you require something else not listed below): Consultancy support to improve key aspects of your provision - consultancy support to cover key aspects of quality improvement systems such as self-assessment reporting, position statements, improvement planning, observation of teaching, learning and assessment, sharing of good practice, course reviews and evaluation, the user voice and being prepared for short or full Ofsted Inspections. Phil can also help you to improve English and maths and ensure that your safeguarding is exemplary. Providing a ‘critical friend’ service to check and validate self-assessment, observations of teaching and other key quality processes such as course reviews – confirmation that you are moving in the right direction – we’ll work with you to confirm you are doing the right things in the right way, responding specifically to your needs, keeping you on target to improve your provision. This is one of the key areas of our work particularly from September through to February. Phil will also provide you with support by email or phone if needed prior to and during inspections. Safeguarding, Prevent and British Values Reviews – Phil has developed real expertise in what the best practice of the sector is and can work with you over two days to check out every aspect and leave you with a position statement of where you are and what you can do to be outstanding. Phil can also provide bespoke training and materials to raise awareness of staff, governors and learners Apprenticeships and subcontracting – Phil knows all there is to know about these two areas and has helped transform some of the biggest college and worst performing providers in terms of their success rates. The ideal scenario is a five day visit to check and sample how you do things, suggest improvements and provide you with the resources needed, finishing with a half-day staff development that is bespoke to your improvement needs. Please contact Phil as long in advance as possible to get time allocated for this Internal inspection or review of areas requiring improvement - a tried and tested way to improve an area is to first gain an informed view of exactly where that area is in terms of strengths and weaknesses, using an expert with extensive inspection experience. Unlike an Ofsted inspection, all feedback to staff and managers observed in an area is given constructively to help improve practice for the benefit of learners (while also giving you robust evidence for your OTLA system, SAR and QIP). An internal review could be for an area of learning or for a cross-college aspect such as safeguarding, equality and diversity, or course reviews. All consultants undertaking this work are personally known to Phil Hatton as to their ability to do so. The LIS will only conduct such work when they have the right person to do it (often Phil himself). You will receive a report that focusses on ways of improving the area reviewed, based on the best practice of the sector that is proven to work (not just telling you what has been seen, which is the usual practice of most consultancy companies). Helping individual institutions in the sector achieve good or outstanding teaching, learning and assessment through establishing robust observation of teaching, learning and assessment (OTLA) systems – depending on where your system is we can its validate current robustness by conducting observations (joint ones are best value as they train your staff) and scrutinising the gradings and paperwork historically awarded. If more work is required, we’ll equip you with the tools (training, paperwork and systems) to establish an OTLA system that delivers accurate and well recorded findings by your observers. Your observation system will help keep a focus on promoting improvement, identifying and promoting the sharing and adaptation of good practice by teachers (a reoccurring weakness in Ofsted inspections in the past year). We will provide you with the training, paperwork and systems to move your staff forward, encouraging their collaboration in the development and sharing of resources, so your staff will deliver learning in true teams. We will support you with either graded or ungraded systems. An approach of conducting joint ‘learning walkthroughs’ of 20 to 25 minutes duration is providing many institutions with an overview of their provision and enables the judgements of college observers to be tested out for their accuracy and breadth. Sharing exemplary practice and systems in self-assessment with you, leading to quality improvement planning that moves you forward – we’ll support you in developing your capacity to self-assess all of your work honestly and robustly so that your staff ‘own’ the resultant self-assessment reports and improvement plans, understanding their part in moving you forward. Few are really good at self-assessment, we can make sure that you are and that self-assessment moves you forward. Several colleges and providers have received very positive feedback about their SARs in 2016 following support and the use of LIS templates, particularly the use of a two page Executive Summary SAR that helps focus improvement actions. If you have a 50 page SAR it will not be an effective improvement tool. Helping you to produce position statements – if you think you are likely to be inspected it is important to be able to say where you are ‘now’ as self-assessment looks back on the past year - we’ll support you in writing effective position statements for key areas that tell you and others exactly where you are for that area. They are a great way to demonstrate to inspectors that you know your provision and have helped a number of LIS clients move from a grade 4 inadequate to a grade 2 good. Phil has also helped a number of colleges achieve grade 1s for their leadership and management. An exemplar position statement can be seen here but is not as good as what you will finish up with (samples can be shared)!! Conducting a confidential ‘health check’ of your organisation by one or more of the top and most experienced recent HMIs (and previously lead inspectors with the FEFC, TSC and ALI) – if it is sometime since your last inspection or there have been significant changes in management or what you offer, a ‘health check’ could be invaluable. We’ll examine your leadership, management, performance and quality improvement against and beyond the requirements of the September 2015 Common Inspection Framework in a way that can only be achieved by being carried out by the right people. Depending on institutional size and complexity, this totally confidential and focused ‘health check’ will ensure you know your provision inside out and have no surprises should you be inspected. It will help you to decide and prioritise how to move your provision on.

Moderntronics

moderntronics

Harrow,

In these terms and conditions (“Conditions”) the following expressions shall have the following meanings: “Business Day” means any day other than Saturday, Sunday or a public holiday. “Business Hours” means the hours detailed in Condition 32 below. “Contact Hours” means Monday to Friday (inclusive) from 07:00 hours to 17:00 hours but excluding bank holidays. “Contract” means any contract between MT and the Customer for the supply of Hardware and/or Software (with the associated Licence) and/or services which is subject to these Conditions. “Customer” means any person, firm or company who enters into a Contract with MT to which these Conditions apply. “Force Majeure” means any event outside the reasonable control of either Party affecting its ability to perform any of its obligations (other than as to payment) under these Conditions. “Goods” means all or any tangible or intangible goods or intellectual property including but not limited to Hardware and Software which are provided to a Customer in accordance with these Conditions. “Hardware” means any hardware provided by MT to the Customer. “MT” means MODERNTRONICS Ltd. or its servants and agents as the case may be. “Insolvency Event” means any one of the following in relation to the Customer: (i) a notice being issued to propose a resolution for winding up or dissolution, or such a resolution being passed; (ii) a petition for a winding up or an administration or bankruptcy order being presented, or such an order made; (iii)any steps being taken with a view to a voluntary arrangement or other assignment, composition or arrangement with all or any creditors or any moratorium, readjustment, rescheduling, forgiveness or deferral of all or any indebtedness; (iv) suspension of payments to all or any creditors and/or ceasing business; (v)an encumbrancer taking possession of all or any assets; (vi) an administrator or receiver being appointed over the Customer or all or any of its assets; (vii)any action anywhere similar or analogous to any of the foregoing; or MT reasonably believing that any of the foregoing is imminent. “Licence” has the meaning attributed to it in Condition 23 below. “Minimum Term” means the term set out in Condition 17 below. “Party” means MT or the Customer and “Parties” means both of them. “Response Time” means two Working Hours from an initial call to the hotline under Condition 26 or 28 below. “Seminar” means any seminar provided by MT. “Service Operator” has the meaning given to that term in Condition 28 below. “Site” means https://www.moderntronics.com and all subdomains including (but without limitation) “Software” means software or software updates or upgrades provided by MT and licensed to the Customer under Condition 23 below. “Training Sessions” means any training session provided by MT. “Working Hours” means the hours between 9:00 to 17:00 on any Business Day 2. Interpretation In these Conditions, the following rules apply: A person includes a natural person, corporate or unincorporated body (whether or not having separate legal personality). A reference to a Party includes its personal representatives, successors or permitted assigns. A reference to a statute or statutory provision is a reference to such statute or provision as amended or re-enacted. A reference to a statute or statutory provision includes any subordinate legislation made under that statute or statutory provision, as amended or re-enacted. Any phrase introduced by the terms including, include, in particular or any similar expression shall be construed as illustrative and shall not limit the sense of the words preceding those terms. A reference to writing or written includes faxes and e-mails. 3. General Information These Conditions apply when MT: sells and delivers Hardware; sells and delivers Licences; sells and delivers Software; or provides repairs or any other services to the Customer. They will also apply to other business transactions unless MT agrees that alternative special conditions apply. These Conditions apply to the exclusion of any other conditions that may be proposed by a Customer or implied by law (insofar as such exclusion is lawful). Part II Specific Provisions for the Use of the Online Shop Customers purchasing Goods from the Site, must read all Parts of these Conditions, which apply to them in full. 4. Consumers The Goods and services provided by MT are designed only for sale to and use by businesses in the course of their business activities. MT does not knowingly sell to any person dealing as a consumer or supply anything for personal use. 5. Customer’s Status By placing an order on the Site, the Customer warrants that he or she is: legally capable of entering into binding contracts and, where the Customer is an individual, that he or she is at least 18 years old; and is dealing in a business capacity and purchasing Goods and/or services for the purpose of his business and not for personal use. Part III General Conditions for the Provision of Goods and Services 6. Formation of Contract Quotations provided by MT to the Customer are not binding on MT. The Customer’s order constitutes an offer to MT to buy the Goods or services. All orders are subject to acceptance by MT. The offer will be deemed accepted, and a Contract formed, when MT sends the Customer confirmation that the Goods have been dispatched (“Dispatch Confirmation”) or, in the absence of a Dispatch Confirmation, when the Goods are delivered. The Contract will only relate to those Goods whose dispatch is confirmed to the Customer by a Dispatch Confirmation or if no Dispatch Confirmation is sent, those Goods which are actually dispatched. MT is not obliged to supply any Goods which may have been part of the Customer’s order until the dispatch of such Goods has been confirmed in a separate Dispatch Confirmation. Subject to Condition 17 below, an order for services will be deemed to have been accepted, and a Contract formed, when MT sends the Customer confirmation that the services ordered will be provided (“Service Confirmation”) or, in the absence of a Service Confirmation, when the services begin to be provided. Oral representations will only be binding upon MT if they are expressly confirmed in writing by MT to the Customer. 7. Price Unless MT expressly specifies prices to the Customer, MT’s current list of prices applicable at the time of the acknowledgement of order will apply. Unless otherwise agreed in writing, all prices are exclusive of value added tax, postage, freight, insurance, forwarding fees, installation and commissioning, travelling expenses and subsistence, which will be added as appropriate. MT will charge overtime for work outside of their normal Business Hours at up to 150% of the hourly rate from time to time applicable during Business Hours. Subject to Condition 16 below, prices are liable to change at any time, but changes will not affect orders in respect of which MT has already sent the Customer a Dispatch Confirmation or a Service Confirmation as the case may be. The Site contains a large number of products and it is always possible that, despite MT’s efforts, some of the products listed may be incorrectly priced. MT will normally verify prices as part of dispatch procedures so that, where a product’s correct price is less than our stated price, MT will charge the lower amount when dispatching the product to you. If a product’s correct price is higher than the price stated on our site, MT will normally, at our discretion, either contact you for instructions before dispatching the product, or reject your order and notify you of such rejection. MT is under no obligation to provide any Goods or services to the Customer at an incorrect (lower) price, even after MT has sent a Dispatch Confirmation or a Service Confirmation in relation to those Goods or services if such incorrect price could reasonably have been expected to be recognised by the Customer as an error. 8. Delivery and Availability The Customer’s order for Goods will be fulfilled by the delivery date in the Dispatch Confirmation or, if no delivery date is specified, then within 30 days of the date the Customer made his order (where such an order leads to a Contract). The period for delivery or performance of the Contract will normally commence on MT’s acknowledgement of the order. However, if the Customer is required to do anything before MT can effect delivery, MT will, as soon as practicable, notify the Customer accordingly. The time within which MT must deliver any Goods will run from the date on which MT receives notice from the Customer that it has duly complied with such notification from MT. Unless otherwise agreed in writing, any periods mentioned in the acknowledgement of order for services and Software development are based on a preliminary estimate of the required workload and therefore are approximate only. Time of delivery and performance is not of the essence. If MT fails to meet any delivery or performance dates set out in the acknowledgement of order and is solely responsible for such failure, the Customer may terminate the Contract but only after MT has been given an opportunity to rectify the situation and subsequently fails to meet the revised set of delivery or performance dates provided by MT to the Customer in writing. Unless MT has been deliberately or grossly negligent, all further claims of the Customer on the basis of the delay in performance are excluded. If MT cannot deliver or perform its obligations under the Contract due to Force Majeure or a failure of the Customer to cooperate or any other act, default or omission of the Customer, then MT will be entitled to perform its obligations under the Contract once the issue has been resolved, provided the issue occurred while MT was still allowed to deliver or perform and MT shall have no liability whatsoever for any delay or its failure to perform its obligations. 9. Agreed Performance Unless specified otherwise in writing, the agreed performance in respect of any repairs provided by MT, at the Customer’s request will be to adjust the relevant unit(s) to MT’s applicable standard specifications for that unit. Where the relevant unit(s) cannot be repaired to MT’s applicable standard specification due to the Customer limiting the repairs required or the time and money to be invested MT may exceed the Customer’s request if MT considers, at its sole discretion, that such additional repairs are reasonable and will ensure the proper functionality of the unit in question. The agreed performance levels for MT’s maintenance and care services are as set out in Conditions 26 and 28 below; for all other services the agreed performance levels will be as set out in the acknowledgement of order. 10. Refunds Where the Customer returns Goods (at the Customer’s cost) because he or she claims that the Goods are defective, MT will examine the returned Goods and will notify the Customer of its findings within a reasonable period of time. If MT (in its sole discretion) deems that the Goods are defective, MT may at its option repair, replace or provide a refund in respect of such defective Goods. MT will process any repair, replacement or refund as soon as practicable and, in the case of any refund, within 30 days of the day MT confirmed to the Customer that the Customer was entitled to the same. Such refunds will be made in full, including a refund of any delivery charges for sending the item to the Customer. 11. Import Duty If the Customer orders Goods for delivery outside the UK, they may be subject to import duties and taxes which are levied when the delivery reaches the specified destination. The Customer will be responsible for payment of any such import duties and taxes. Please note that MT has no control over these charges and cannot predict their amount. Customers should contact their local customs office for further information before placing an order. Customers must comply with all applicable laws and regulations of the country for which the Goods are destined. The Customer will indemnify and keep indemnified MT in respect of all costs, proceedings, losses and liabilities resulting from any breach by the Customer of any such laws. 12. Retention of Title to Property The Goods will be at the Customer’s risk from the time of delivery. Property in and title to all Goods will remain with MT until MT has received payment for the full price of all the Goods (and/or all other goods and/or services supplied by MT to the Customer under any other contract whatsoever).. The Customer may sell or use Goods in which title is retained during the course of their normal business, but may not give such Goods by way of pledge or pledge these Goods as security. Until the property in and title to the Goods passes to the Customer: the Customer shall keep the Goods properly stored, protected and insured and separate from all or any other goods whether belonging to MT, the Customer or any third party; MT shall be entitled at any time forthwith to revoke the Customer’s power to deal with the Goods; and such power shall automatically cease if an Insolvency Event shall occur in respect of the Customer; and the Customer shall not make any modification to the Goods, the Software or their packaging or alter, remove or tamper with any marks, numbers or other means of identification used on or in relation to the Goods. Upon termination of the Customer’s power to deal with the Goods, the Customer shall place the Goods at the disposal of MT and MT are hereby irrevocably authorised without the need for consent of any third party but using only such force as may be necessary, to enter upon any premises of the Customer or any third party for the purpose of removing the Goods. If third parties claim title to Goods with retained title, the Customer will inform MT without delay, will notify the person making the claim of MT’s title and will support MT in enforcing its rights, including taking all the necessary steps required to preserve MT’s rights, including commencing litigation at the Customer’s own expense. If the Customer breaches the Contract, e. g. by delaying payment, the Customer will be obliged to return the Goods with retained title if requested by MT, in return for which MT will not terminate the Contract. 13. Payment Where services, maintenance or care are provided on an ongoing basis, MT will invoice the Customer for these at the beginning of the billing period or as soon as reasonably practicable thereafter. The Customer will pay MT’s invoices in full within 30 days from the date of the relevant invoice. Depending on the scope of an order, payments for such services, maintenance or care are due either upon placement of the order by the Customer or upon partial delivery of the same of between 40 to 50% of their respective order value. BACS or cheque are the only methods of payment accepted. Invoices for Seminars and Training Sessions will be issued at the beginning of the respective session and payment is due immediately and without deduction. 14. Delay of Payment Where a Customer fails to pay an invoice by the due date, MT will be entitled to charge the Customer interest on all monies outstanding from the due date until the actual date of payment (both before and after judgment) at a rate of 8% above the base rate of the Bank of England calculated on a daily basis. 15. Setting-Off and Refusal of Payment The Customer cannot exercise any right of set-off in respect of amounts owed to or by MT. 16. Change of Pricing by MT for Ongoing Maintenance or Care MT may increase its prices for maintenance and services by giving the Customer written notice 2 months prior to the end of the Minimum Term. The Customer has 4 weeks from the date of receipt of the written notice from MT to object to the change. Where the Customer so objects, the Customer will be entitled to give notice to MT to terminate the Contract as of the date of the proposed price increase. 17. Automatic Extension of Contract Where services, maintenance or care are performed on an ongoing basis the Contract will come into effect upon acceptance by MT of the first order from the Customer for Software maintenance. The Contract will initially run until the date specified at “Minimum Service Duration” as set out in the “MT Service Product List” or until the expiry date where an expiry date is stipulated in the Contract (“Minimum Term”). Subject to one of the Parties serving written notice of termination on the other at least three months prior to the expiry of the Minimum Term, the Contract will be extended automatically. In the case of Software Licences supplied without a time limit, the Contract will extend until December 31st of the current year. The subsequent extension periods will begin on January 1st and end on December 31st of the respective year. In the case of Software Licences supplied with limited validity (e.g. a licence for 1-year) the extension is based on the terms and conditions set out in the description of the respective licence (e.g. extension by one further year). Unless otherwise agreed in writing, any extension to a Contract will be on the basis of MT’s current price list as at the date of such extension. 18. Delivery Obligations and Shipping The conditions for EXW (ex works) (MT’s premises or such other place referred to in the relevant order) as set out in the Incoterms 2010 apply to delivery of any Goods. Claims for any transport damages and any replacement of damaged Goods, remain with the Customer who is responsible for adhering to the mode and period for the filing of any claims with carriers, shippers and insurers. 19. Scope of Warranty (Material Deficiencies and Deficiencies in Title) MT warrants that the Hardware is free from defects in workmanship and material as at the time of transfer of risk; and warrants that the Software does not contain any flaws which void or substantially reduce its value or suitability for the usual or contracted purpose. Where MT is not the author of the Software, MT does not warrant that such Software will run without interruptions or errors, nor that MT will be capable of resolving all Software errors, nor that the Customer will be capable of achieving all of the functions included in the Software in all of the combinations chosen by the Customer, nor that these will meet the Customer’s requirements. MT will only warrant the quality and/or durability of Goods if it has expressly agreed in writing with the Customer that it will do so. The warranty period is 1 year. Where MT is the author of the Software such Software is subject to MT’s standard warranty. 20. Obligation to Inspect and Serve Notice of Defects The Customer must inspect the Goods upon delivery or repair and must notify MT in writing of any failure by MT to meet the specification within 7 days of delivery or repair or (where the failure was not apparent on reasonable inspection) within a reasonable time being no more than 1 month after discovery of the failure. Where the Customer fails to provide such notice MT will have no liability under its warranty. 21. Liability Subject only to Condition 21 d), MT shall not be liable to the Customer in contract, tort (including without limitation negligence) and/or breach of statutory duty for any loss or damage which the Customer may suffer by reason of any act, omission, neglect or default (including negligence) in the performance of the Contract by MT, its servants or agents, in a sum which is greater than GBP 200,000 per incident or series of connected incidents. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect loss of any kind resulting from these Conditions, its performance or any breach of its terms. Subject only to Condition 21 d), MT shall not be liable to the Customer whether in contract or tort (including without limitation negligence and/or breach of statutory duty) for indirect economic loss of any kind including (but without limitation) loss of business opportunity, reputation, goodwill resulting from these Conditions, its performance or any breach of its conditions. Notwithstanding any other provision herein, nothing in these Conditions shall operate so as to limit or exclude MT’s non-excludable liability in respect of death or personal injury caused by the negligence of MT to exclude the application of Section 12 of the Sale of Goods Act 1979 and to exclude liability for fraudulent misrepresentation. MT’s liability for loss of data is limited to the effort required to restore the data from proper backups provided by the Customer. 22. Third Party Rights If any third party claims or takes action against the Customer, because Goods delivered by MT, or their use in accordance with the instructions provided by MT, purportedly violate their commercial rights or proprietary rights, then the Customer will inform MT of the same. MT agrees that they will assist the Customer in defending such claims. Where the claim is made to the Customer within 12 months of the date of delivery, MT will indemnify the Customer against claims provided that the Customer: appoints MT to defend the claims or to settle the dispute, and promptly notifies MT of any such claim, keeps the Customer informed of all information received and provides such reasonable assistance to MT as it shall reasonably require, does not defend the action itself without coordinating such defence with MT, and does not at any time admit liability or otherwise settle or compromise or attempt to settle or compromise the said claim or action except upon the express instruction of MT, the alleged breach of rights is not based on alteration of the delivered item used by the Customer, and does not use the item delivered by MT in conjunction with other items and/or in a fashion that breaches any such rights, in a situation where the use of the item as delivered by MT would not have breached the rights of the person who has filed the claim. MT may at any time and at its own expense acquire on behalf of the Customer the right to continue to use the Goods, to replace the Goods or alter them in such a fashion that the rights of others are no longer breached. If this is not possible, the Customer shall return or destroy the Goods if required to do so by MT who will reimburse the purchasing price for the Goods less depreciation. If the Customer refuses to do so, MT will no longer defend the claim or provide the Customer with any further support. The Customer has no further rights in case of disputes over proprietary rights with third parties and MT shall have no liability therefore unless MT could be blamed for acting deliberately or with gross negligence. Part IV Special Conditions for Delivery of Software 23. Conditions of Use for Delivered Software In the case of delivery of Software to the Customer, MT hereby grants the Customer a simple, non exclusive and non-transferable, licence to use the Software (“Licence”) . The validity of the Licence is not time limited, unless otherwise specified to the contrary in the terms and conditions of the Licence. MT, grants the Customer the use of such Software in the form of the object code and the user documentation with the use being restricted to one electronic data processing system at any one time and only for the tasks for which it is intended. Unless permitted by law, the Customer will not decompile the Software or perform reverse engineering. The Customer may duplicate the Software but only to the extent that this is required for the permitted use, and in order to allow it to perform data backup. Upon delivery of any Software, including updates and upgrades, the Customer will immediately produce a backup copy. MT may terminate the Licence granted to the Customer pursuant to this Condition 23 with immediate effect if the Customer is in breach of the conditions for the use of the Software for a period of 30 days from the date of a written notice of such a breach from MT or any third party. On termination of this Contract howsoever arising, the Customer will return to MT within 30 days all Software together with any related materials owned and licensed by MT and shall delete all copies and partial copies of the Software however stored within 7 days of service of the notice. Proof of such deletion must be provided to MT without delay. On receipt of prior written consent from MT, the Customer may retain a copy of the Software for the purposes of archiving. 24. Delivery of Software MT will only install the Software if this has been expressly agreed in writing between the Customer and MT. MT is able to provide telephone consultancy and support concerning questions relating to the application of the respective Software products as well as the solution of problems that may occur as provided for in Condition 26 below. 25. Prerequisites for Running the Delivered Software The proper running of Software systems supplied will only be guaranteed if the Hardware and operating system components used correspond to the reference systems of the respective manufacturer(s), as well as having been approved and certified. Unless otherwise agreed in the Contract, the Customer shall ensure that the provisions in this Condition 25 are complied with. Part VMaintenance and Care Application Software 26. Scope of Performance of MT Services for Application Software For the Software products, unless otherwise expressly agreed in writing, MT will provide the following services, denoted by Service Level “SW-Service STANDARD” and Service Level “SW-Service E-STANDARD”: Right to use Software and documentation updates: MT grants the Customer a non-transferable, non-exclusive Licence to use the Software and any documentation or updates. The right of use is not limited in validity, unless otherwise specified in the terms and conditions of the Licence. Software and documentation updates: MT will supply the Customer with the current version of the Software as specified in the Contract. This will be done as specified by the manufacturer of the Software. The documentation will be supplied in the form determined by the manufacturer of the Software. The installation of Software updates will be performed by suitably qualified personnel of the Customer. Alternatively for an additional charge, MT may install the Software updates on behalf of the Customer. Where the Customer has adapted the Software, the Customer will be liable for the additional cost of performing the same adaptation to the new version of the Software or alternatively the Customer may perform the necessary adaptation himself. Hotline (Service Level “SW-Service STANDARD” only) MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. E-mail Hotline (Service Level “SW-Service E-STANDARD” only) MT is able to provide e-mail consultancy and support in relation to queries relating to the application of the respective Software products as well as the resolution of any problems (in so far as it is reasonably practicable to do so) which may occur. This service will be provided by MT during the Contact Hours Wherever possible, qualified consultancy will be provided by MT within the Response Time. MT Hotline: E-mail: hotline@MT.com Internet: http://www.MT.com/customersupport Software error messages Where Software problems occur which MT is unable, for whatever reason, to resolve, the Customer may send a written error message to MT. The purpose of such an error message is to identify the error in the Software and enable the manufacturer to resolve the error. MT shall liaise with the manufacturer(s) of the Software products to resolve any Software errors as promptly as possible. Restoration of any data, regardless of the cause of the data loss, is not the responsibility of MT. 27. Obligation of the Customer to Co-operate Pre-conditions for the provision of the services by MT to the Customer are that the Customer has legally acquired the Software and holds a corresponding Licence to use it. In addition, the Software must be in the same condition that it was in when it was delivered. The services exclusively relate to the current release and delivered version of the Software. If earlier Software versions are used, a one-time update service which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Services will not be performed for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). If the operating system for the Hardware is not included in the Contract, the Customer must update the operating system to the most recent version (e. g. by purchasing updates) if this is required in order to use the new versions of the application Software. Hardware and Operating Systems 28. Scope of Performance of MT Maintenance and Care Services for Hardware and Operating System For Hardware products and the operating system, unless otherwise agreed in writing, MT will provide the following services, denoted by Service Level “HW-Service SPECIAL”: The scope of performance is briefly set out in the “Special Description” for each product listed in the attached “MT Service Product List”. The exact scope of performance will be determined in accordance with the attached description of performance issued by the respective MT service operator (“Service Operator” including but not limited to Hewlett-Packard, Fujitsu Siemens and Silicon Graphics). The following shall also apply: Hotline MT is able to provide consultancy and support by telephone or by e-mail in relation to queries relating to the application of the respective Hardware products and operating system, as well as the resolution, (in so far as it is reasonably practicable to do so) of any problems which may occur. This service will be performed by MT during the Contact Hours: Wherever possible, qualified consultancy will be provided by MT within the Response Time. Where queries arise outside of the Contact Hours, the Customer should address such queries directly to MT’s Service Operator Response time for Hardware failures MT will use reasonable endeavours to solve a query within the Response Time. The Response Time shall be deemed to have been initiated either as soon as the customer service personnel arrives on the relevant site, or as soon as remote diagnosis is started, where either is required to resolve the problem. The appropriate Response Time will be determined in accordance with the attached description of performance issued by the respective MT Service Operator. 29. Services Not Included Unless otherwise agreed in writing, the following services will not be provided by MT to the Customer: a) Repair/re-acquisition of devices that have been damaged as a result of: incidents of war of any type civil wars, nuclear energy, deliberate action of the Customer (not of his subcontractors) b) Repair/re-acquisition that is required because of repair work or alterations of devices carried out by the Customer or any third party without the prior written consent of MT. c) Work required due to interface problems between MT’s devices and those of other manufacturers and suppliers. d) Customer service which is required because a product that is not covered under this Contract has caused an error. e) Customer service that has become necessary because devices have been used under adverse conditions (e.g. including contaminations and deviations from recommended room temperature and relative humidity) or in conjunction with accessories or (device-specific) consumables (e.g. including foreign disks, disk stacks, cassettes, printer paper and print heads of any type) (“Device Specific Consumables”) which do not meet the manufacturer’s specifications. f) Replacement of Device-Specific Consumables. g) Data backup. h) Calibration work that is not related to repair. 30. Restoration of Data/Programs The restoration of data and programs upon repair or replacement of a defective hard disk is limited to starting the copying program (Restore) used to restore the last full data backup. 31. Obligation of the Customer to Cooperate a) Hardware service Pre-conditions for the provision of Hardware services by MT are that the Hardware has been acquired legally and has been installed properly at the Customer’s site. In addition the Hardware affected must correspond to the current revision and be in proper condition when including in the Contract. These pre-conditions shall be met immediately after the expiry of the warranty period specified in the Contract. If the Hardware is included in the Contract at a later date, these pre-conditions must first be confirmed by a takeover inspection of the Hardware by MT, which will be independently invoiced and paid for by the Customer, and if required the pre-conditions will be achieved by MT undertaking the required repair work. b) Operating System Service Pre-conditions for the provision of operating system services are that the Customer has legally acquired the Software and has been granted the necessary corresponding Licence to use it. In addition the Software must be in the same condition as when it was delivered to the Customer. The services exclusively relate to the current release and version of the Software. If earlier Software versions are used, a one-time “Update Service” which will be independently invoiced and paid for by the Customer will be provided to update the Software to the latest version. Operating System services will not be provided for Software adaptations made by the Customer (for example including but not limited to macros, programs, variants, user interfaces and database applications). Part VI Generally Applicable Conditions 32. Prices and Fees for Special Services The following items are not included in the payment for services under Conditions 26 and 28 above and will be invoiced separately in accordance with MT’s current price list: Services performed outside Working Hours on the express request of the Customer. Services to correct errors caused negligently by the Customer or by any unauthorised third party as a result of improper treatment, unsuitable operating media, unauthorised manipulations, Software manipulations, non-adherence to operating conditions or otherwise. ices required due to faulty handling, excessive vibration, chemical influence, excessive dust burden or non-adherence to the properties set forth in the unit specifications. Unreasonable wait times and delays in the performance of services which are caused by the Customer. Services to remedy failures caused by Force Majeure. 33. Backup of Customer Data Prior to the commencement of any service work undertaken by MT, the Customer will backup all data in such a way that it may easily be restored by MT in the event that it is lost in the service process. 34. Change of Installation/Application Site Where maintenance and care services are provided on an ongoing basis by MT, the Customer will immediately inform MT in writing of any change to the installation or application address. If such a change results in an increase in MT’s expenses. MT reserves the right to either increase the prices charged to recover the additional expense incurred or alternatively MT may serve notice on the Customer to terminate the Contract where the new address is outside United Kingdom. 35. Miscellaneous Service Conditions and Obligations of the Customer to Co-operate MT may appoint authorised third parties to provide services. The Customer may only transfer title to services to third parties with the prior written consent of MT. Where defective components or devices are replaced by MT, these will become the property of MT. Extension of the products included in the maintenance agreement may be included in this Contract with the consent of the Customer. On request, MT will offer to the Customer a corresponding extension of the Contract, provided maintenance for the respective product is available. Where MT has to perform any services, the Customer shall accurately and without delay provide MT with any/all information that is required to perform such services. The Customer will provide MT with the name of a competent and appropriately qualified contact person and will provide the name of an appropriate substitute in order for the Hardware and Software to be maintained. Any contact(s) will have participated in the respective Seminars and/or Training Sessions held from time to time by MT or alternatively will have acquired comparable knowledge. These contacts will be available to MT’s technicians on site or will have access to the MT’s hotline as applicable. Consumables and Auxiliaries (which shall include documentation, application programs, data, telephone lines for transmission of voice and data) are not included in the scope of performance and shall be provided by the Customer in the vicinity of the system, such consumables and auxiliaries will be provided during Working Hours or, with prior consultation, outside of these hours. Additionally, the Customer will provide to MT computing time and consumables as required. 36. Specifically Ordered Service Days If service days are ordered for call-off within a specified period, such orders are binding. The services will become due for payment once they have been performed or by the end of the defined time period at the latest. Specifically ordered service days to be called off within a defined time period, can still be called off during a time of three months beyond the expiry of such defined time period. Thereafter they are lost. The claim to payment is thereby unaffected. For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.