Assuring Quality Through Acceptance Testing: In-House Training It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. It is the business analyst's job to define the business problem to be solved by IT. It is also the business analyst's responsibility to confirm that the resulting solution developed by IT does, in fact, solve the defined problem. This is done first through testing, especially acceptance testing, and then through monitoring of the installed solution in the user community. The business analyst is not only concerned with the testing itself, but also with the management and monitoring of the users doing the acceptance testing, and recording, analyzing, and evaluating the results. What you will Learn Upon completion, participants will be able to: Create a set of acceptance test cases Manage and monitor an acceptance test stage where users perform the testing Work with the development team in the systems testing stage Assess the solution once it is in the business environment Foundation Concepts The role of the business analyst An introduction to the BABOK® Guide BA roles and relationships through the project life cycle Introduction to assuring software quality through acceptance testing The Scope of IT Testing Overview of testing stages The testing process Testing documentation Pre-Acceptance Testing The BA's role in testing Early development testing stages (unit and integration) Late development testing stage (system) The Acceptance Test Stage - Part I (Planning, Design, and Development) Overview of user acceptance testing Acceptance test planning Designing user acceptance tests Developing individual user acceptance test cases Building effective user acceptance test scenarios The Acceptance Test Stage - Part II (Execution and Reporting) Operating guidelines Execution Reporting Post-Acceptance Testing Overview Project implementation Project transition (project closure) Production through retirement Testing Commercial Off-the-Shelf (COTS) Software Overview Selecting the software Implementing the software Summary What did we learn and how can we implement this in our work environments?
Managing Complex Projects: In-House Training As knowledge and technology expand exponentially, organizations are finding that the tools, processes, and methods used to select, plan, and manage their projects are insufficient for the challenges posed by them. The goal of this course is to provide participants with a working knowledge of project complexities and a framework for managing the ambiguities involved in today's fast-changing, competitive, and technology-based environment As knowledge and technology expand exponentially, organizations are finding that the tools, processes, and methods used to select, plan, and manage their projects are insufficient for the challenges posed by them. Complex projects don't necessarily follow the rules of traditional projects - in many instances the projects' end-products, and the methods by which they will be produced, are not easily defined. Stakeholder diversity and geographical dispersion contribute to the difficulties project managers face in their efforts to gain acceptance of project goals, objectives, and changes. Additionally, hierarchic leadership styles, traditional lifecycle approaches, and traditional project manager competencies may no longer maximize the efficiencies that need to be realized on complex projects. The goal of this course is to provide participants with a working knowledge of project complexities and a framework for managing the ambiguities involved in today's fast-changing, competitive, and technology-based environments. What you Will Learn The learning objectives of this workshop are to enable participants to: Appreciate complexity and its impact on the management of projects Describe the differences among traditional, complicated, and complex projects Explain the effects of complexity on the PMBOK® Guide's process groups Apply a high-level model in the management of real- world projects Complexity and Projects Some characteristics of complex systems Important models/characteristics of complex projects Major players in project complexity Landscapes and project typologies A supplemental framework for complex projects Framing Framing overview Potential pitfalls in framing complex projects Possible solutions Inception Centrality of risk management PM competencies, selection Stakeholder identification, analysis Blueprint Collaborative planning Stakeholder engagements Alternative methodologies/life cycles Collaborative scheduling Procurement management Oversight, Navigation, and Adjustment Leadership and the project team Stakeholder management Networks Close and Continuous Improvement Transition/support Post-project evaluations Rewards/Recognition
Face to Face training customised and bespoke. One to One Online or Face to Face
Apple course, macOS Support Essentials, ACSP, IT Support,
This course will let you develop the skillsets needed to guide the delivery of value in a Lean enterprise—and learn about the activities, tools, and mechanics used to manage backlogs and programs. Attending the class prepares you to take the exam and become a certified SAFe® 6 Product Owner/Product Manager (POPM). SAFe Product Owner/Product Manager 6 training course is provided under Scaled Agile, Inc. Partner Program Agreement.
Duration 2 Days 12 CPD hours This course is intended for System administrators and consultants, application owners, and system architects Overview By the end of the course, you should be able to meet the following objectives: Describe VMware Carbon Black Cloud platform Describe data flows on VMware Carbon Black Cloud Create and edit a custom role in VMware Carbon Black Cloud Recognize the impact of a user role on a console user Describe the VMware Carbon Black Cloud sensor resource usage Explain sensor usage in VMware Carbon Black Cloud Identify configuration settings for endpoints in sensor policy settings Determine requirements for initial deployment of sensors Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Recognize the deployment process for VMware Carbon Black Cloud Workload⢠Identify eligible workloads in a VMware vSphere environment Describe VMware Carbon Black Cloud sensor deployment Manage VMware vSphere workloads Identify sensor status in RepCLI This two-day hands-on training course provides you with the knowledge, skills, and tools to achieve competency in planning and deploying VMware Carbon Black Cloud in your environment. This course explains the VMware Carbon Black Cloud components, managing users and roles in VMware Carbon Black Cloud, configuring policies to support sensor deployment and management, and presents methods for deploying sensors across endpoints and workloads. Course Introduction Introductions and course logistics Course objectives Introduction to VMware Carbon Black Cloud Describe the VMware Carbon Black Cloud platform Describe VMware Carbon Black Cloud operating systems requirements Identify interesting files according to VMware Carbon Black Cloud Identify events collected Describe data flows Managing VMware Carbon Black Cloud Roles and Users Describe the use of roles in VMware Carbon Black Cloud Describe RBAC capabilities Create and edit a custom role Manage new console users Recognize the impact of a user role on a console user Describe authentication mechanisms VMware Carbon Black Cloud Sensors Describe the VMware Carbon Black Cloud sensor resource usage List the supported operating systems for VMware Carbon Black Cloud sensors Explain sensor usage in VMware Carbon Black Cloud Preparing for Deployment Identify configuration settings for endpoints in sensor policy settings Organize sensors using sensor groups to assign the desired policy based on specific criteria Compare VDI sensor settings as compared to traditional endpoint sensor settings Determine requirements for the initial deployment of sensors Evaluate the policy impact on sensors Identify best practices for deploying sensors Installing Sensors Describe how to send an installation request Recognize the features and limitations of an installation code and company code Recognize the process for successfully completing an attended installation Recognize the differences between attended and unattended sensor installation methods Identify the correct deployment strategy for a given scenario Generate logs with unattended installations Generate sensor logs Check network connectivity for sensor installation Deploying Workloads Recognize the deployment process for VMware Carbon Black Cloud Workload Identify eligible workloads in a vSphere environment Recognize how to enable the VMware Carbon Black Cloud sensor on a VM workload Managing Sensors Describe VMware Carbon Black Cloud sensor deployment Explain the differences in sensor status Describe sensor update capabilities Explain sensor actions Manage vSphere workloads Post-deployment Validation Describe the process of a sensor background scan Recognize a properly registered sensor installation Identify sensor status in RepCLI Additional course details:Notes Delivery by TDSynex, Exit Certified and New Horizons an VMware Authorised Training Centre (VATC) Nexus Humans VMware Carbon Black Cloud: Plan and Deploy training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the VMware Carbon Black Cloud: Plan and Deploy course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.
LOOKING FOR: ADULT FICTION, NON-FICTION Julie Gourinchas (she/they) is developing a selective list focused on upmarket and literary adult fiction across a wide variety of genres. Writers she represents have been nominated for the British Book Awards, the Hugo Awards, the BSFA Awards, and the Saltire National Book Awards, among others. In fiction, she's drawn to a uncommon voices, and striking, intelligent writing – whether vibrant and floral or tense, quick, and sparse – as well as texture in both tone and setting (particularly anything with a strong aesthetic). Above all, she is looking for hooky, high-concept work, but her taste can perhaps be best summarised as "the weird, dark, and gruesome." While literary-speculative is her sweet spot, she considers herself genre agnostic within upmarket/literary fiction, and remains open to compelling and well-executed genre overlap. These include: upmarket and literary horror: especially featuring feminist or cultural themes, body horror, mangled nature, or cosmic, Lovecraftian vibes and looking for a fresh, literary take on vampires. Think Mona Awad, Lucy Rose, Julia Armfield, Jade Song, Stephen Graham Jones. dark and spiky literary dramas with high emotional stakes - think Eliza Clark, Julia May Jonas. razor-sharp dark academia particularly with something to say about the complex and exploitative systems within academia, more The Secret History, less The Atlas Six. gothic fiction, specifically regional gothic anchored in an evocative sense of place in the vein of Alexis Henderson and Alix E. Harrow. grounded fantasy or otherwise speculative fiction with coherent, sharp worldbuilding that feels recognisable and familiar, or directly set in our world. Play with magic, faith, and technology in your story like Babel, or a more literary version like Emily Wilde's Encyclopaedia of Faeries, Blood Over Bright Haven, Metal From Heaven. Searing contemporary fiction centred on themes of identity and belonging: think Sally Rooney, Torrey Peters, or what Saltburn should have been. dark westerns, in particular any that play with the truth and false hopes of the American Dream. magical realism both whimsy with a touch of darkness, and darkness with a touch of whimsy. unhappy romances anything -punk: steampunk, solarpunk, silkpunk, clockpunk, dieselpunk, cyberpunk and more of these! Suffice to say: if you can successfully and smartly comp to Arcane, Julie wants to see it! character-focused historical fiction with a literary edge: think Lauren Groff, Anthony Doerr, Eleanor Catton, particularly in the 19th and 20th centuries; including and indeed encouraging alternate history. Stylistically, Julie loves uncommon, thought-provoking experimentation with both prose and form, and anything spiky, toothy, and dark. Happy endings, to her, should feel earned. In all things, compelling character development should come first. First person narration is not impossible, but hard to sell. A smart genre blend is always welcome, as is any fresh-eyed approach to a well-trodden trope. Julie is also very much looking for her first romantasy – especially one that approaches this exciting new genre from a fresh, bold perspective. She is keenly interested in hearing from authors traditionally underrepresented in the industry, including but not restricted to writers of colour; queer, trans, and nonbinary writers; working class writers; disabled writers; etc. Her enduring favourite books include All The Light We Cannot See by Anthony Doerr, Do Not Say We Have Nothing by Madeleine Thien, The Luminaries by Eleanor Catton, and Philip Pullman’s His Dark Materials series. More recent favourites include the masterful Tomorrow and Tomorrow and Tomorrow by Gabrielle Zevin, Babel by R.F. Kuang, Detransition Baby by Torrey Peters, Matrix by Lauren Groff, Tell Me I’m Worthless by Alison Rumfitt, Brother Alive by Zain Khalid, and Our Wives Under the Sea by Julia Armfield. In non-fiction, Julie is keen to read in the narrative and “big ideas” spaces, particularly in the realms of politics, history, and the social sciences. Please note: Julie is not looking for young adult, middle grade, and children’s books. Strictly no AI-generated content of any description. Please also bear in mind that, despite a deep and abiding love for all things Tolkien and Star Wars, she is not typically the right fit for epic or high fantasy, nor space-faring science fiction. She would also prefer to avoid pulpy crime and straightforward romance/romcoms. Julie would like you to submit a covering letter, 1 page synopsis and the first 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Julie is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 29th April 2025
Definitive Salt training course description Salt is a remote execution framework and configuration management system. This course covers Salt from the basics. After a quick first taste the course moves onto execution modules, salt states, minion and master data, jinja, Salt extensions and then topology and configuration options. Hands on sessions are used to reinforce the theory rather than teach specific manufacturer equipment. What will you learn Install and use Salt. Describe the architecture of Salt. Manage configurations with Salt. Extend Salt. Definitive Salt training course details Who will benefit: Anyone working with Salt. Prerequisites: Linux fundamentals. Duration 2 days Definitive Salt training course contents Introduction What is Salt? High- level architecture, Some quick examples, system management, configuration management, A brief history, Topology options, Extending Salt. Quick start: First taste of Salt Single-master setup, from packages, bootstrap scripts, Starting up, Basic commands, salt: the main workhorse, salt-key: key management, salt-call: execution on the minion, salt-run: co-ordination of jobs on the master, summary of commands, Key management, viewing keys, accepting keys, rejecting keys, key files, Minion targeting, minion ID, list (-L), glob, regular expressions (-E), grains (-G), compound (-C), targeting summary, Additional remote execution details, Conclusion. Execution modules: The functional foundation sys: information and documentation about modules, sys.doc basic documentation, sys.list_modules, sys.list_functions: simple listings, cmd: execute via shell, cmd.run: run any command, pkg: manage packages, virtual modules, pkg.lists_pkgs: list all installed packages, pkg.available version: see what version will be installed, pkg.install: install packages, user: manage users, user.add: add users, user.list_users, user info: get user info, saltutil: access various Salt utilities, Summary. Configuration management: Salt states Salt files overview, SLS example: adding a user, working with the multi-layered state system, Highstate and the top file, the top file, State ordering, require: depend on another state, watch: run based on other changes, odds and ends, Summary. Minion data / master data Grains are minion data, performing basic grain operations, setting grains, targeting with grains in the top file, Pillars are data from the master, querying pillar data, querying other sources with external pillars, Renderers give data options. Extending Salt: part I Introduction to Jinja, Jinja basics, Templating with Jinja, filtering by grains, Custom execution module, Custom state modules, Custom grains, External pillars, Summary. More on the matter Runners, manage minions, manage jobs, The orchestrate runner, The event system, The reactor system, Summary. Extending Salt: part II Python client API, reading configuration data on a master and minion, using the master client (localclient) API, Using the caller client API, Custom runners, writing a custom runner, using the runnerclient API, Summary. Topology and configuration options Master configuration, directories and files, logging, access control, files server options, Topology variations, masterless minions, peer systems, syndication masters, multiple masters. Brief introduction to salt-cloud Overview, Setup AWS and salt-cloud, installing salt-cloud, cloud providers, cloud profiles, cloud maps, Introspection via salt cloud, Creating infrastructure, More information. Using vagrant to run Salt examples YAML.
Electronics Equipment Repair 2 (Online Virtual Classroom) is a follow on course to Electronics Equipment Repair 1. This course builds on the skills gained and enables participants to build, test and fault-find more complex Analogue Electronic circuits
Duration 5 Days 30 CPD hours This course is intended for This course is intended for anyone who is new to software development and wants, or needs, to gain an understanding of programming fundamentals and object-oriented programming concepts. They will typically be high school students, post-secondary school students, or career changers, with no prior programming experience. They might want to gain an understanding of the core programming fundamentals before moving on to more advanced courses such as Programming in C#. Overview Explain core programming fundamentals such as computer storage and processing. Explain computer number systems such as binary. Create and use variables and constants in programs. Explain how to create and use functions in a program. Create and use decisions structures in a computer program. Create and use repetition (loops) in a computer program. Explain pseudocode and its role in programming. Explain the basic computer data structures such as arrays, lists, stacks, and queues. Implement object-oriented programming concepts. Create and use classes in a computer program. Implement encapsulation, inheritance, and polymorphism. Describe the base class library (BCL) in the .NET Framework. Explain the application security concepts. Implement simple I/O in a computer program. Identify application errors and explain how to debug an application and handle errors. Identify the performance considerations for applications. In this 5-day course, students will learn the basics of computer programming through the use of Microsoft Visual Studio 2022 and the Visual C# and Visual Basic programming languages. The course assumes no prior programming experience and introduces the concepts needed to progress to the intermediate courses on programming, Programming in C#. The focus will be on core programming concepts such as computer storage, data types, decision structures, and repetition by using loops. The course also covers an introduction to object-oriented programming covering classes, encapsulation, inheritance, and polymorphism. Coverage is also included around exception handling, application security, performance, and memory management. 1 - Introduction to Core Programming Concepts Computer Data Storage and Processing Application Types Application Lifecycle Code Compilation 2 - Core Programming Language Concepts Syntax Data Types Variables and Constants 3 - Program Flow Introduction to Structured Programming Concepts Introduction to Branching Using Functions Using Decision Structures Introducing Repetition 4 - Algorithms and Data Structures Understand How to Write Pseudocode Algorithm Examples Introduction to Data Structures 5 - Error Handling and Debugging Introduction to Program Errors Introduction to Structured Error Handling Introduction to Debugging 6 - Introduction to Object-Oriented Programming Introduction to Complex Structures Introduction to Structs Introduction to Classes Introducing Encapsulation 7 - More Object-Oriented Programming Introduction to Inheritance Introduction to Polymorphism Introduction to .NET and the Base Class Library 8 - Introduction to Application Security Authentication and Authorization Code Permissions on Computers Introducing Code Signing 9 - Core I/O Programming Using Console I/O Using File I/O 10 - Application Performance and Memory Management Value Types vs Reference Types Converting Types The Garbage Collector Additional course details: Nexus Humans 55337 Introduction to Programming training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward. This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts. Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success. While we feel this is the best course for the 55337 Introduction to Programming course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you. Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.