Duration 3 Days 18 CPD hours This course is intended for This course is intended for IT professionals who need to manage the day-to-day environment of an SCCM 2012 SP1 or newer environment. Knowledge of the workings of a standalone primary SCCM site and basic PowerShell experience is recommended. Overview Create additional site system roles on existing or new servers. Modify high level site settings. Create and modify Discovery Methods, Boundaries and Boundary Groups. Create Collections using any of the membership rules available. Delegate authority through Roles and Scopes. Install the Configuration Manager client, modify client settings and restrict access to site systems. Deploy software to clients. Deploy software updates to clients. Configure compliance settings targeted against collections. Modify settings that govern monitoring functions such as Alerts and Status Settings. Work with Task Sequences for Operating System Deployment. Write basic PowerShell scripts using cmdlets learned and scripting constructs to accomplish configuration tasks. This course provides students with the knowledge and skills needed to use PowerShell for System Center Configuration Manager (SCCM) administration. In this course, students learn how to access the PowerShell cmdlets included with SCCM 2012 R2 and use them to perform configuration tasks for a primary site. Individual cmdlets will be used in working with objects such as Boundaries, Boundary Groups, Collections, Software Deployment, Patching, Compliance Settings, OSD Task Sequences, and many others. Basic scripting will also be covered so that students can learn how to put PowerShell to use when working with large sets of objects. Prerequisites Basic Windows and Active Directory knowledge. Conceptual knowledge of Configuration Manager objects and how they interact. Basic experience performing configuration tasks in ECM using the graphical console. Experience working from a command prompt. Basic knowledge of the fundamentals of Windows PowerShell. 1 - REVIEW OF SYSTEM CENTER CONFIGURATION MANAGER CONCEPTS Architecture of an System Center 2012 Configuration Manager Installation Managing Assets Content Delivery and Management Security, Monitoring, and Remote Management 2 - MANAGING RESOURCES Implementing Discovery Organizing Resources with Collections Working with Boundaries 3 - WORKING WITH CLIENTS Installing the Configuration Manager Client Managing Client Settings Managing Client Operations Monitoring Client Status 4 - DISTRIBUTING SOFTWARE Configure the Software Distribution Components Working with Distribution Points Creating Content for Distribution Deploying Software Applications 5 - UPDATING SYSTEMS WITH WSUS AND SCCM Integrating Configuration Manager and WSUS Managing Updates through Software Update Groups Creating and Deploying Update Packages Working with Automatic Deployment Rules 6 - HOW POWERSHELL CAN MANAGE COMPLIANCE SETTINGS Creating Compliance Settings Objects Deploying and Monitor the Baseline 7 - CONFIGURING OPERATING SYSTEM DEPLOYMENT OBJECTS Preparing the OSD Environment Working with Task Sequences 8 - WORKING AT THE SITE LEVEL Modify the Site Adding Site System Roles Adding a Secondary Site 9 - SECURITY AND MONITORING Configuring Role Based Administration Implementing Endpoint Protection Configuring Monitoring Options 10 - USING POWERSHELL SCRIPTING TO AUTOMATE SCCM TASKS Review of Scripting Constructs Introduction to the Configuration Manager WMI Classes
Duration 3 Days 18 CPD hours This course is intended for The audience for this course are data professionals and business intelligence professionals who want to learn how to accurately perform data analysis using Power BI. This course is also targeted toward those individuals who develop reports that visualize data from the data platform technologies that exist on both in the cloud and on-premises. This course covers the various methods and best practices that are in line with business and technical requirements for modeling, visualizing, and analyzing data with Power BI. The course will show how to access and process data from a range of data sources including both relational and non-relational sources. Finally, this course will also discuss how to manage and deploy reports and dashboards for sharing and content distribution. Prerequisites Understanding core data concepts. Knowledge of working with relational data in the cloud. Knowledge of working with non-relational data in the cloud. Knowledge of data analysis and visualization concepts. DP-900T00 Microsoft Azure Data Fundamentals is recommended 1 - Discover data analysis Overview of data analysis Roles in data Tasks of a data analyst 2 - Get started building with Power BI Use Power BI Building blocks of Power BI Tour and use the Power BI service 3 - Get data in Power BI Get data from files Get data from relational data sources Create dynamic reports with parameters Get data from a NoSQL database Get data from online services Select a storage mode Get data from Azure Analysis Services Fix performance issues Resolve data import errors 4 - Clean, transform, and load data in Power BI Shape the initial data Simplify the data structure Evaluate and change column data types Combine multiple tables into a single table Profile data in Power BI Use Advanced Editor to modify M code 5 - Design a semantic model in Power BI Work with tables Create a date table Work with dimensions Define data granularity Work with relationships and cardinality Resolve modeling challenges 6 - Add measures to Power BI Desktop models Create simple measures Create compound measures Create quick measures Compare calculated columns with measures 7 - Add calculated tables and columns to Power BI Desktop models Create calculated columns Learn about row context Choose a technique to add a column 8 - Use DAX time intelligence functions in Power BI Desktop models Use DAX time intelligence functions Additional time intelligence calculations 9 - Optimize a model for performance in Power BI Review performance of measures, relationships, and visuals Use variables to improve performance and troubleshooting Reduce cardinality Optimize DirectQuery models with table level storage Create and manage aggregations 10 - Design Power BI reports Design the analytical report layout Design visually appealing reports Report objects Select report visuals Select report visuals to suit the report layout Format and configure visualizations Work with key performance indicators 11 - Configure Power BI report filters Apply filters to the report structure Apply filters with slicers Design reports with advanced filtering techniques Consumption-time filtering Select report filter techniques Case study - Configure report filters based on feedback 12 - Enhance Power BI report designs for the user experience Design reports to show details Design reports to highlight values Design reports that behave like apps Work with bookmarks Design reports for navigation Work with visual headers Design reports with built-in assistance Tune report performance Optimize reports for mobile use 13 - Perform analytics in Power BI Explore statistical summary Identify outliers with Power BI visuals Group and bin data for analysis Apply clustering techniques Conduct time series analysis Use the Analyze feature Create what-if parameters Use specialized visuals 14 - Create and manage workspaces in Power BI Distribute a report or dashboard Monitor usage and performance Recommend a development life cycle strategy Troubleshoot data by viewing its lineage Configure data protection 15 - Manage semantic models in Power BI Use a Power BI gateway to connect to on-premises data sources Configure a semantic model scheduled refresh Configure incremental refresh settings Manage and promote semantic models Troubleshoot service connectivity Boost performance with query caching (Premium) 16 - Create dashboards in Power BI Configure data alerts Explore data by asking questions Review Quick insights Add a dashboard theme Pin a live report page to a dashboard Configure a real-time dashboard Set mobile view 17 - Implement row-level security Configure row-level security with the static method Configure row-level security with the dynamic method Additional course details: Nexus Humans PL-300T00: Microsoft Power BI Data Analyst training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the PL-300T00: Microsoft Power BI Data Analyst course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
ITIL® 4 Leader: Digital and IT Strategy: Virtual In-House Training The ITIL® 4 Leader: Digital and IT Strategy (DITS) is one of the two modules in the ITIL® 4 Strategic Leader (SL) certification scheme. The other module in the SL designation is the ITIL® 4 Strategist: Direct, Plan & Improve. Accredited training for the ITIL® 4 Strategic Leader modules is mandatory to enable full understanding of the core material. The ITIL ® 4 Digital and IT Strategy certification focuses on enabling business success through the creation of digital and IT strategies. The IT and Digital Strategy certification adds a new perspective to the ITIL suite and elevates the discussion around ITIL concepts to a strategic level among business leaders and aspiring leaders. The ITIL® 4 Digital and IT Strategy course is based on the ITIL® 4 Digital and IT Strategy exam specification from AXELOS. With the help of ITIL® 4 concepts and terminology, exercises, and examples included in the course, you will acquire relevant knowledge to pass the certification exam. The core learning material in the course is supported by interactive case study, discussions and activities. What You Will Learn The ITIL ® 4 Digital and IT Strategy course covers the content in relation to the following learning outcomes of the exam specification for ITIL ® 4 Digital and IT Strategy: Demonstrate the use of the ITIL guiding principles in Digital and IT Strategy decisions and activities Understand how to leverage digital strategy to react to digital disruption Understand the relationship between the concepts of Digital and IT Strategy, the service value system and the service value chain, and explain how to utilize them to create value Understand how an organization uses Digital and IT Strategy to remain viable in environments disrupted by digital technology Understand strategic approaches made possible by digital and information technology to achieve customer/market relevance and operational excellence Understand the risks and opportunities of Digital and IT Strategy Understand the steps and techniques involved in defining and advocating for a Digital and IT Strategy Understand how to implement a Digital and IT Strategy Key Concepts of Digital and IT Strategy Digital, Information, and Communication Technology Digital Transformation Services, Products, and Competitive Advantage Tiers of Strategy Business Models Operating Models Strategy and the Service Value System Opportunity and Demand Value Governance ITIL® Guiding Principles Continual Improvement ITIL® Practices What is Vision? Disruptions Vision Digital Disruptions Balanced Strategic Focus Positioning Tools for Digital Organizations Assignment 1: Digital Disruption and Digital Positioning Where Are We Now? Environmental Analysis Opportunity Analysis Digital Readiness Assessment How Do We Get There (Strategic Planning) Strategy Planning Financial Aspects of Digital and IT Strategy Business Models for Strategy Planning Portfolio Optimization How Do We Get There (Strategic Approaches) Strategic Approaches for Digital Organizations Strategic Approaches for Operational Excellence Strategic Approaches to Evolution Strategic Approaches to Social Responsibility and Sustainability Assignment 2: Strategic Approaches for Digital Organizations Take Action (Managing Strategic Initiatives) How Strategies are Implemented Coordinating Strategy and Strategic Initiatives Leading Digital Transformation Digital Leadership Assignment 3: Strategy Planning and Communication Did We Get There? (Measuring Strategy) Key Facts About Measurement Measuring a Strategy Instrumenting Strategy How Do We Keep the Momentum Going Long-Term Momentum: Ensuring Organizational Viability Short-Term Momentum: Parallel Operation Assignment: Digital Strategy in VUCA Environment Managing Innovation and Emerging Technologies Managing Innovation Formal Approach to Innovation Management Culture that Supports Innovation Approaches to Innovation Evaluating and Adopting Emerging Technology Managing Strategic Risk Risk Management Risk Identification Risk Posture Risk Treatment
Duration 3 Days 18 CPD hours This three-day instructor-led course is aimed at modern device management professionals looking to manage their enterprise devices using Microsoft Intune. This course will cover Enrolment, Application Management, Endpoint Security and Windows Autopilot as well as Azure Active Directory Conditional Access and Identity Protection. The delegates will learn how to enroll devices, deploy applications and manage them to maximize user productivity and device security. 1: Introduction to Microsoft Intune Mobile Device Management Microsoft Intune Azure Active Directory AAD Identity Protection AAD Conditional Access 2: Microsoft Intune Device Management Enrolling Devices Device Compliance Device Profiles Device Updates 3: Microsoft Intune Application Management Application Management Deploying Applications Application Configuration Managing Applications Policy Sets and Guided Scenarios 4: Microsoft Intune Endpoint Security Security Baselines and tasks Antivirus Disk Encryption Firewall Atack Surface reduction Endpoint detection and response Account Protection 5: Deploying Windows with Windows Autopilot Windows Autopilot overview Preparing for Windows Autopilot deployment Deploying Windows 11 using Windows Autopilot 6: Microsoft Intune Additional and Premium Features Remote Help Tunnel for Mobile Application Management Endpoint Privilege Management Advanced Endpoint Analytics Additional course details: Nexus Humans 55399 Implementing and Managing Microsoft Intune training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55399 Implementing and Managing Microsoft Intune course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
About this Training Course Managed Pressure Drilling (MPD) offers opportunities to improve safety and efficiency in drilling, and it is increasingly recognised by operators and regulators. MPD aims to cost effectively resolve chronic drilling problems that contribute to non-productive time. This 3 full-day course provides participants with an understanding of the MPD techniques and equipment. The course starts with the design requirements for an MPD operation. It covers all MPD methods, including constant bottom hole pressure and mud cap drilling operations. It also includes all of the rig types - both onshore and offshore - and MPD. MPD equipment is presented in detail and the design aspects of the well are also examined. Training Objectives This course aims to provide participants with a good understanding of the various aspects of managed pressure drilling. It also enables participants to gain knowledge of planning MPD operations, type of equipment and the equipment requirements for both onshore and offshore and MPD operations. At the end of the course, participants will be able to: Understand the variations in MPD Design MPD operations for various techniques Understand the engineering requirements of MPD Define MPD equipment requirements Understand operational and well control aspects of MPD Target Audience This course is designed for engineers, managers and service providers who are about to use MPD techniques and are trying to better understand the associated complexities and challenges surrounding MPD. Trainer Your expert course leader was born and raised in Nijmegen, Netherlands. He holds an MSc in Drilling Engineering from The Robert Gordon University in Aberdeen and has over 39 years of oilfield experience. He started in the industry back in 1977 as a Mud logger before becoming a wellsite drilling engineer in 1980 working mainly in the Middle East and West Africa. In 1988, he joined Shell in in the Southern North Sea. In 1995, he joined Smedvig in Norway and worked on a number of deepwater wells as well as on underbalanced drilling operations. In 1999, he started Leading Edge Advantage in Aberdeen and worked in coiled tubing, underbalanced and managed pressure drilling. In 2004, he joined Weatherford as Regional Engineering Manager in Singapore and developed the first ultra deepwater MPD systems. In 2010, he joined SPT Group specializing in well control and hydraulics modelling. SPT Group was later acquired by Schlumberger in 2012. At Schlumberger, he was Drilling Adviser, with a focus on well control, relief well planning and MPD. During that time, he was also an instructor for NExT teaching numerous well engineering courses. In 2015, he joined Wild Well as Engineering Manager in Asia and in February 2017, he became an independent consultant concentrating on provision of drilling engineering training. He has written and presented numerous papers and authored several chapters in the SPE Advanced Technology books. He is an active committee member and speaker on numerous SPE Workshops around the world. POST TRAINING COACHING SUPPORT (OPTIONAL) To further optimise your learning experience from our courses, we also offer individualized 'One to One' coaching support for 2 hours post training. We can help improve your competence in your chosen area of interest, based on your learning needs and available hours. This is a great opportunity to improve your capability and confidence in a particular area of expertise. It will be delivered over a secure video conference call by one of our senior trainers. They will work with you to create a tailor-made coaching program that will help you achieve your goals faster. Request for further information post training support and fees applicable Accreditions And Affliations
Duration 3 Days 18 CPD hours This course is intended for This course is intended for information workers and data science professionals who seek to use database reporting and analysis tools such as Microsoft SQL Server Reporting Services, Excel, Power BI, R, SAS and other business intelligence tools, and wish to use TSQL queries to efficiently retrieve data sets from Microsoft SQL Server relational databases for use with these tools. Overview After completing this course, students will be able to: - Identify independent and dependent variables and measurement levels in their own analytical work scenarios. - Identify variables of interest in relational database tables. - Choose a data aggregation level and data set design appropriate for the intended analysis and tool. - Use TSQL SELECT queries to produce ready-to-use data sets for analysis in tools such as PowerBI, SQL Server Reporting Services, Excel, R, SAS, SPSS, and others. - Create stored procedures, views, and functions to modularize data retrieval code. This course is about writing TSQL queries for the purpose of database reporting, analysis, and business intelligence. 1 - INTRODUCTION TO TSQL FOR BUSINESS INTELLIGENCE Two Approaches to SQL Programming TSQL Data Retrieval in an Analytics / Business Intelligence Environment The Database Engine SQL Server Management Studio and the CarDeal Sample Database Identifying Variables in Tables SQL is a Declarative Language Introduction to the SELECT Query Lab 1: Introduction to TSQL for Business Intelligence 2 - TURNING TABLE COLUMNS INTO VARIABLES FOR ANALYSIS: SELECT LIST EXPRESSIONS, WHERE, AND ORDER BY Turning Columns into Variables for Analysis Column Expressions, Data Types, and Built-in Functions Column aliases Data type conversions Built-in Scalar Functions Table Aliases The WHERE clause ORDER BY Lab 1: Write queries 3 - COMBINING COLUMNS FROM MULTIPLE TABLES INTO A SINGLE DATASET: THE JOIN OPERATORS Primary Keys, Foreign Keys, and Joins Understanding Joins, Part 1: CROSS JOIN and the Full Cartesian Product Understanding Joins, Part 2: The INNER JOIN Understanding Joins, Part 3: The OUTER JOINS Understanding Joins, Part 4: Joining more than two tables Understanding Joins, Part 5: Combining INNER and OUTER JOINs Combining JOIN Operations with WHERE and ORDER BY Lab 1: Write SELECT queries 4 - CREATING AN APPROPRIATE AGGREGATION LEVEL USING GROUP BY Identifying required aggregation level and granularity Aggregate Functions GROUP BY HAVING Order of operations in SELECT queries Lab 1: Write queries 5 - SUBQUERIES, DERIVED TABLES AND COMMON TABLE EXPRESSIONS Non-correlated and correlated subqueries Derived tables Common table expressions Lab 1: Write queries 6 - ENCAPSULATING DATA RETRIEVAL LOGIC Views Table-valued functions Stored procedures Creating objects for read-access users Creating database accounts for analytical client tools Lab 1: Encapsulating Data Retrieval Logic 7 - GETTING YOUR DATASET TO THE CLIENT Connecting to SQL Server and Submitting Queries from Client Tools Connecting and running SELECT queries from: Excel PowerBI RStudio Exporting datasets to files using Results pane from SSMS The bcp utility The Import/Export Wizard Lab 1: Getting Your Dataset to the Client Additional course details: Nexus Humans 55232 Writing Analytical Queries for Business Intelligence training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55232 Writing Analytical Queries for Business Intelligence course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
Duration 3 Days 18 CPD hours This course is intended for This course is aimed at people in senior roles including CIOs, chief digital officers and other aspiring CxOs, as well as consultants and others involved in digital transformations, service delivery and strategic delivery. Overview By the end of this course, you will understand: The internal and external factors to consider while crafting digital strategy How IT strategy differs from digital strategy and how they can be integrated Creating a digital strategy that achieves the most value from digital Implementing and sustaining digital strategy Developing and nurturing digital capabilities for continual business innovation and value co-creation This course takes you on a digital strategy journey. Its iterative, eight-step model moves from ?vision? through to ?actions? and is about creating sustainable, digital momentum. You experience the four key capabilities to develop a holistic, digital capability framework: digital leadership, managing innovation and emerging technologies, risk management and structuring a digital enterprise. This class includes an exam voucher. Prerequisites Delegates attending this course must have successfully achieved the ITIL 4 Foundation Qualification; your certificate must be presented as documentary evidence to gain admission to this course. Although there is no mandatory requirement, ideally candidates should have at least two years professional experience working in IT Service Management. 1 - ITIL GUIDING PRINCIPLES TO ALL ASPECTS OF DIGITAL AND IT STRATEGY Focus on Value Start Where You Are Progress Iteratively with Feedback Collaborate and Promote Visibility Think and Work Holistically Keep It Simple and Practical Optimise and Automate 2 - LEVERAGE DIGITAL STRATEGY TO REACT TO DIGITAL DISRUPTION Digital Technology Digital Business Digital Organisation Digitisation Digital Transformation Business Strategy and Business Models Digital and IT Strategy Products Services Relationship Between Digital, IT Strategy and Components of ITIL SVS. 3 - RELATIONSHIP BETWEEN CONCEPTS OF DIGITAL AND IT STRATEGY, SERVICE VALUE SYSTEM AND SERVICE VALUE CHAIN Environmental Analysis External Analysis: PESTLE Internal Analysis: Four Dimensions of Service Management 4 - HOW AN ORGANISATION USES DIGITAL AND IT STRATEGY TO REMAIN VIABLE IN ENVIRONMENTS How an Organisation?s Viability is Related to Agile, Resilient, Lean, Continuous and Co-Creational it is How to Analyse the VUCA Factors and Address them in a Digital and IT Strategy Organisation?s Position in a Particular Market or Industry Digital Positioning Tool to Determine Appropriate Position for a Digital Organization 5 - EXPLAIN AND COMPARE THREE LEVELS OF DIGITAL DISRUPTION Ecosystem Industry/Market Organisational Influenced factors Achieving Customer/Market Relevance Achieving Operational Excellence Internal and External Focus Balanced Approach 6 - STRATEGIC APPROACHES BY DIGITAL AND IT TO ACHIEVE CUSTOMER/MARKET RELEVANCE AND OPERATIONAL EXCELLENCE How to Apply Approaches to Achieve Customer/Market Relevance Customer Journeys Omnichannel Delivery and Support Context-Sensitive Delivery and Support Customer Analytics Customer Feedback and 360ø Approaches How to Achieve Operational Excellence in the Four Dimensions of Service Management Understand the Financial Aspects of Digital and IT Strategy in Terms of the Following Financial Policies Portfolio Optimization Funding Projects, Products and Services Balancing Cost of Innovation and Operation Charging Models Assess Strategic Approaches for Digital Organizations 7 - RISKS AND OPPORTUNITIES OF DIGITAL AND IT STRATEGY Concept of Risk Management in the Context of a Digital Organisation Context of Digital and IT Strategy Identify Risk Assess Risk Concept of Risk Posture and Show How to Determine an Acceptable Balance Between Opportunity and Risk Explain the Concept of Innovation, Including its Key Elements and Techniques Apply Techniques to Develop and Maintain a Culture of Innovation 8 - STEPS AND TECHNIQUES INVOLVED IN DEFINING AND ADVOCATING FOR DIGITAL AND IT STRATEGY How to Use Digital Readiness Assessment to Perform Gap Analysis Between an Organisation?s Current and Desired Positions Approaches for Scraping Data from Dynamic Websites How to Define and Communicate a Vision and a Strategy How to Use Business Cases to Advocate for a Digital and IT Strategy 9 - IMPLEMENTATION OF A DIGITAL AND IT STRATEGY How to Define Operating Models for Digital Organisations Major Skills Required of Leaders in Digital Organisation Apply Approaches to Strategy Coordination and Implementation: Large-Scale Transformation Incremental Transformation Mergers and Acquisitions Individual Changes Approaches to POMs (Parallel Operating Models) How to Assess Success of a Digital and IT Strategy Typical Activities of a Digital Transformation Programme
LOOKING FOR: ADULT FICTION, NON-FICTION Florence has been at A M Heath for five years and represents a range of commercial fiction and non-fiction. For fiction, comforting, funny and warm reads, as well as gripping page-turners, will always be Florence's cup of tea. Her favourite thing is to escape with a story she can’t put down. If you think your book fits that, then do send it to her. Books in this vein that really left her wanting one more chapter include Marian Keyes’s character, Rachel, from Rachel’s Holiday that left Florence with a compassion for addiction that only the most skilled of writers can conjure. Florence finds Catherine Newman to be a genius for making hospice care so funny in We All Want Impossible Things. Smart page turners such as Anatomy of a Scandal, Such a Fun Age, and Tomorrow, and Tomorrow, and Tomorrow, wowed her with clever, gripping prose and complicated, flawed characters she hadn't met before. She also loves older classics like the Cazalet Chronicles and Georgette Heyer’s Regency novels. Florence is actively looking for writers who are under-represented in the publishing world, through non-traditional channels, as well as her submissions. She’s keen to find non-fiction and fiction writers who speak to a millennial and younger audience, be that a journalist who is looking to expand an idea, a screenwriter who is looking to try their hand at fiction or perhaps an activist with a social media platform. She is also interested in environmental and social issues. The authors she represents include Jaspreet Kaur, Salma El-Wardany, Rachel Thompson, Annie Lord, Angelica Malin and Phil Ellis. Their books range from the heart-breaking and profound to the inspirational, funny and wise, with almost everything in between. Florence does not wish to receive, YA, Fantasy or Sci-fi. Florence would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Florence is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesdy 16th July 2025
Arm yourself with a robust research toolkit that will help you uncover deep behavioural insights on user needs and motivations so you can design better experiences.
Would you like to get up to speed on the key debates on telecoms regulation or refresh your understanding of the broader range of regulatory issues? Thanks to our online Telecoms Masterclass, you will understand all you need to know about telecoms regulation in the EU and other regions when applicable and relevant.