LOOKING FOR: ADULT FICTION, NON-FICTION Daisy Chandley joined PFD in 2019 after graduating from the University of Oxford with a BA in Politics, Philosophy and Economics. She is an Associate Agent and assistant to Senior Agent Annabel Merullo and Head of Books Tim Bates as the UK sub-agent for New Directions Publishing in the US. Daisy is actively building a list of both fiction and non-fiction authors across a range of genres. With fiction, Daisy's wishlist roughly falls into three categories – if something feels like it overlaps between them, even better! 1) Sharp, original novels on the literary to upmarket spectrum, all the way from deeply dark and boundary-pushing books like Hurricane Season, Under The Skin or In The Cut to those balancing edge, heart and humour, like Detransition, Baby or A Visit From The Goon Squad. She loves irreverent wit, daring approaches in narrative or form, and seriously unsettling stories in equal measure, and if you can bring a few of those elements into one, it’ll go straight to the top of her. 2) Com-heavy rom-coms, whether in the dry but ultimately sob-inducing vein of Greta and Valdin or a Nora Ephron film, the escapist screwball delight of a Cary Grant classic, or the more unusual, genre-bending style of something like Palm Springs. Daisy is a sucker for Emily Henry and will always be happy to see an innovative take on tropey love stories, but is equally very keen to see to things a bit outside of the box, whether that’s integrating speculative elements, dark humour, or topical issues. In any case, humour and originality are my priority, and affectionately snarky bickering is the best way to make her fall head over heels with a couple. 3) Sleuths! Daisy is not the right person for police procedurals, but loves classic detectives and amateur sleuths. Whether it’s a delightful Knives Out or Nancy Drew homage or an intricate, unputdownable mystery on the darker side, the minute someone finds a good old fashioned clue, count her in! Overall, whether it’s a delightfully fun and scandalous page-turner or something really bold and experimental, if it’s stylish and smart – and maybe even a bit sexy – Daisy would love to see it. Daisy is definitely interested in literary speculative fiction, though not generally looking for hard SFF. Across the board, she is always looking for stories that explore sexuality, race, gender, and disability, and would particularly love to hear from writers whose voices and experiences aren’t given enough space in publishing. On the non-fiction side, Daisy is looking for bold new insights and underrepresented voices on popular science, nature writing, relationships, social issues and politics, and am always especially interested in fresh, playful and exciting writing on pop culture, love and the internet. She’d also love to see illuminating narrative non-fiction, whether a beautiful and lyrical exploration, or an enthralling and explosive deep-dive. A (large) handful of authors past and present whose work Daisy loves include Patricia Lockwood, Toni Morrison, Elif Batuman, Gillian Flynn, Shirley Jackson, Raven Leilani, Max Porter, Carmen Maria Machado, Virginia Woolf, Sayaka Murata, Kiley Reid, Sally Rooney, George Saunders, Joan Didion, Amy Liptrot, Ottessa Moshfegh, J.D. Salinger, Donna Tartt, Bret Easton Ellis, and Fernanda Melchor. Daisy is not the right fit for Children’s or YA authors. Daisy would like you to submit a covering letter, 1 page synopsis and the first 2,500 words of your manuscript in a single word document. (In addition to the paid sessions, Daisy is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Thursday 8th May 2025
LPIC-1 training course description This five day hands on course provides a comprehensive coverage of core Linux administration tasks. The course covers generic Linux and is available for any Linux distribution required. It closely follows the LPIC curriculum allowing delegates to achieve the relevant certification if required. What will you learn Administer & configure Linux systems. Maintain Linux by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure Linux system. Describe the organisation and implementation of the filesystem. LPIC-1 training course details Who will benefit: System administrators. Network administrators. Prerequisites: Linux fundamentals (LPI 010) Duration 5 days LPIC-1 training course contents Part I Exam 101 Exploring Linux Command-Line Tools Using a Shell, Shell Configuration, Environment Variables, Getting Help, Streams, Redirection and Pipes, Processing Text Using Filters, Manipulating files, Regular Expressions, grep,sed. Managing Software Package Concepts, Comparison of package formats, RPM, rpm Commands, Yum, Debian Packages, dpkg, apt-cache, apt-get, dselect, aptitude, Converting Between Package Formats, Dependencies and Conflicts, Startup Script Problems, Shared Libraries, Library Management, Managing Processes, the Kernel: The First Process, Process Lists, Foreground & Background Processes, Process Priorities, Killing Processes. Configuring Hardware Configuring Firmware and Hardware, IRQs, I/O Addresses, DMA Addresses, Boot Disks, Coldplug and Hotplug Devices, Configuring Expansion Cards and PCI Cards, Kernel Modules, USB Devices, Linux USB Drivers, Configuring Hard Disks, Partitioning Systems, LVM, Common Layouts, Creating Partitions and Filesystems, Maintaining Filesystem Health, Tuning, Journals, Checking Filesystems, Monitoring Disk Use, Mounting and Unmounting Filesystems. Managing Files File Management Commands, File Naming and Wildcards, File Archiving, Links, Directory Commands, File Ownership and Group, File access control, Permissions, chmod, Defaults, File Attributes, Disk Quotas, Enabling and setting Quotas, Locating Files, The FHS. Booting Linux and Editing Files Installing Boot Loaders, GRUB Legacy, GRUB 2, Alternative Boot Loaders, the Boot Process, Boot Messages, Runlevels and the Initialization Process, Runlevel Functions, Runlevel Services, Alternative Boot Systems , Upstart, system. Part II Exam 102 265 Securing the X Window System Localization, Configuring Basic X Features, X Server Options, Methods of Configuring X, X Display Information, X Fonts, The X GUI Login System, XDMCP Server, Using X for Remote Access, Screen Display Settings, Setting Your Time Zone, Your Locale, Configuring Printing, Conceptualizing the Linux Printing Architecture, Understanding PostScript and Ghostscript, Running a Printing System, Configuring CUPS, Monitoring and Controlling the Print Queue. Administering the System Managing Users and Groups, Tuning User and System Environments, Using System Log Files, Understanding syslogd , Setting Logging Options, Manually Logging Data, Rotating Log Files, Reviewing Log File Contents, Maintaining the System Time, Linux Time Concepts, Manually Setting the Time, Using NTP, Running Jobs in the Future, Understanding the Role of cron, Creating System cron Jobs, Creating User cron Jobs, Using anacron, Using at. Configuring Basic Networking TCP/IP, Network Hardware, Network Addresses, Hostnames, Network Ports, Configuring Linux for a Local Network, Configuring with DHCP, Static IP Address, Configuring Routing, Using GUI Configuration Tools, ifup and ifdown, Diagnosing Network Connections, Testing Connectivity, Tracing a Route, Checking Network Status , Examining Network Traffic, Additional Tools. Writing Scripts, Configuring Email, and Using Databases The Shell Environment, Aliases, Shell Configuration Files, Writing Scripts, Commands, Variables, Conditional Expressions, Loops, Functions, Managing Email, Choosing Email Software, Securing Your Email Server, Managing Data with SQL, Picking a SQL Package, Understanding SQL Basics, Using MySQL Securing Your System Administering Network Security, Super Server Restrictions, Disabling Unused Servers, Administering Local Security, Securing Passwords, Limiting root Access, Setting Login, Process, SUID/SGID Files, Configuring SSH, Using GPG, Generating, Importing and Revoking Keys, Encrypting and Decrypting Data, Signing Messages and Verifying Signatures.
UNIX system administration training course description This five day hands on course provides a comprehensive coverage of core UNIX administration tasks. The course covers generic UNIX and is available for any UNIX distribution required. What will you learn Administer & configure UNIX systems. Maintain UNIX by handling disk space and taking regular backups. Manage software packages. Perform basic troubleshooting. Maintain a secure UNIX system. Describe the organisation and implementation of the filesystem. UNIX system administration training course details Who will benefit: System administrators Network administrators. Prerequisites: UNIX fundamentals. Duration 5 days UNIX system administration training course contents Part 1 Exploring UNIX command-line tools Using a shell, shell configuration, environment variables, getting help, streams, redirection and pipes, processing text using filters, manipulating files, regular expressions, grep, sed. Managing software Package concepts, comparison of package formats, RPM, rpm commands, yum, dpkg, apt-cache, apt-get, dselect, aptitude, converting between package formats, dependencies and conflicts, startup script problems, shared libraries, library management, managing processes, the kernel: the first process, process lists, foreground & background processes, process priorities, killing processes. Configuring hardware Configuring firmware and hardware, RQs, I/O addresses, DMA addresses, Boot disks, coldplug and hotplug devices, configuring expansion cards and PCI cards, kernel modules, USB devices, UNIX USB crivers, configuring hard disks, partitioning systems, LVM, common layouts, creating partitions and filesystems, maintaining filesystem health, tuning, journals, checking filesystems, monitoring disk use, mounting and unmounting filesystems. Managing files File management commands, file naming and wildcards, file archiving, links, directory commands, file ownership and group, file access control, permissions, chmod, defaults, file attributes, disk quotas, enabling and setting quotas, locating files, the FHS. Booting UNIX and editing files Installing boot loaders, GRUB legacy, GRUB 2, alternative boot loaders, the boot process, boot messages, runlevels and the initialization process, runlevel functions, runlevel services, alternative boot systems, upstart, system. Part 2 Configuring the X window system Localization, configuring basic X features, X server options, methods of configuring X, X display information, X fonts, the X GUI login system, XDMCP server, using X for remote access, screen display settings, setting your time zone, your locale, configuring printing, conceptualizing the UNIX printing architecture, understanding PostScript and ghostscript, running a printing system, configuring CUPS, monitoring and controlling the print queue. Administering the system Managing users and groups, tuning user and system environments, using system log files, understanding syslogd, setting logging options, manually logging data, rotating l;og files, reviewing log file contents, maintaining the system time, UNIX time concepts, manually setting the time, using NTP, running jobs in the future, understanding the role of cron, creating system cron jobs, creating user cron jobs, using anacron, using at. Configuring basic networking TCP/IP, network hardware, network addresses, hostnames, network ports, configuring UNIX for a local network, configuring with DHCP, static IP address, configuring routing, using GUI configuration tools, ifup and ifdown, diagnosing network connections, testing connectivity, tracing a route, checking network status , examining network traffic, additional tools. Writing scripts, configuring email, and using databases The shell environment, aliases, shell configuration files, writing scripts, commands, variables, conditional expressions, loops, functions, managing email, choosing email software, securing your email server, managing data with SQL, picking a SQL package, understanding SQL basics, using MySQL. Securing your system Administering network security, super server restrictions, disabling unused servers, administering local security, securing passwords, limiting root access, setting login, process, SUID/SGID files, configuring SSH, using GPG, generating, importing and revoking keys, encrypting and decrypting data, signing messages and verifying signatures.
Duration 5 Days 30 CPD hours This course is intended for This course is intended for professional web developers who use Microsoft Visual Studio in an individual-based or team-based, small-sized to large development environment. Candidates for this course are interested in developing advanced web applications and want to manage the rendered HTML comprehensively. They want to create websites that separate the user interface, data access, and application logic. Overview Describe the Microsoft Web Technologies stack and select an appropriate technology to use to develop any given application. Design the architecture and implementation of a web application that will meet a set of functional requirements, user interface requirements, and address business models. Configure the pipeline of ASP.NET Core web applications using middleware, and leverage dependency injection across applications. Develop a web application that uses the ASP.NET Core routing engine to present friendly URLs and a logical navigation hierarchy to users. Create Views in an application that display and edit data and interact with Models and Controllers. Connect an ASP.NET Core application to a database using Entity Framework Core. Implement a consistent look and feel across an entire web application. Write JavaScript code that runs on the client-side and utilizes the jQuery script library to optimize the responsiveness of an web application. Add client side packages and configure Task Runners. Run unit tests and debugging tools against a web application in Visual Studio 2022. Write an application that authenticates and authorizes users to access content securely using Identity. Build an application that resists malicious attacks. Use caching to accelerate responses to user requests. Use SignalR to enable two-way communication between client and server. Describe what a Web API is and why developers might add a Web API to an application. Describe how to package and deploy an ASP.NET Core web application from a development computer to a web server. In this 5-day course, professional web developers will learn to develop advanced ASP.NET Core applications using .NET tools and technologies. The focus will be on coding activities that enhance the performance and scalability of the Web site application. Module 1: Exploring ASP.NET Core Introducing of Microsoft Web Technologies Getting Started with Razor Pages in ASP.NET Core Introducing ASP.NET Core MVC Module 2: Designing ASP.NET Core MVC Web Applications Planning in the Project Design Phase Designing Models, Controllers and Views Module 3: Configure Middleware and Services in ASP.NET Core Configuring Middlewares Configuring Services Module 4: Developing Controllers Writing Controllers and Actions Configuring Routes Writing Action Filters Module 5: Developing Views Creating Views with Razor Syntax Using HTML Helpers and Tag Helpers Reusing Code in Views Module 6: Developing Models Creating MVC Models Working with Forms Validating User Input Module 7: Using Entity Framework Core in ASP.NET Core Introduction to Entity Framework Core Working with Entity Framework Core Use Entity Framework Core to connect to Microsoft SQL Server Module 8: Using Layouts, CSS and JavaScript in ASP.NET Core Using Layouts Using CSS and JavaScript Using JavaScript Libraries Module 9: Client-Side Development Applying Styles and Responsive Design Using Task Runners Looking at ASP.NET Core Blazor Module 10: Testing and Troubleshooting Testing ASP.NET Core Applications Implementing an Exception Handling Strategy Logging ASP.NET Core Applications Module 11: Managing Security Authentication in ASP.NET Core Authorization in ASP.NET Core Defending from Common Attack Module 12: Performance and Communication Implementing a Caching Strategy Managing State Supporting Two-way Communication Module 13: Implementing Web APIs Introducing Web APIs Developing a Web API Calling a Web API Module 14: Hosting and Deployment Hosting and Deploying On-premises Deploying to Microsoft Azure Looking at Microsoft Azure Fundamentals
Gain the most from work, education and everyday life, and achieve your equivalent to GCSE grade C or 4 held every Thursday afternoon – 4pm till 6pm for 12 weeks with our dedicated tutor. These sessions will be via live Team’s webinar classes, covering 3 areas: Speaking, Listening and Communication, Reading and Writing. Through the completion of this qualification, you will demonstrate that you have Presentation, Q&A and Group discussion skills as well as Reading and Writing skills, to our tutor. The qualification is awarded by Highfield OFQUAL-regulated and nationally recognised. Learn more about the Functional Skills Qualification in English at Level 2 Giving you Presentation, Q&A and Group discussion skills as well Reading and Writing with practice exams our tutor will support you all the way to help you achieve that examination to move your career in the right direction. As part of one of our apprenticeship courses – This course could be government funded – so ask for more information. Course Dates Every Thursday 4pm - 6pm 12 week rolling course Costs £400.00 per person (inc. VAT) Any additional resits of exams are charged at £30 each.
LOOKING FOR: YA, NA, ADULT FICTION Helen Lane has been an established agent for several years, formerly with the Booker Albert Agency before joining the Ki Agency. She has a BSc in Environmental Science from the University of East Anglia and a postgrad qualification in Acoustics. She lives in London with her family and the world’s naughtiest cocker spaniel. Helen represents (Adult) Fantasy, Sci Fi, Horror, Romance, Action & Adventure, and Thrillers. She also represents select YA Fantasy, Horror, and Sci Fi. Her tastes do run towards the dark and she is slightly obsessed with monster stories in general (especially if they have giant sharks or squids). And stories set in extreme environments such as the arctic, jungle, caves, ocean, and mountains. But she DOES NOT want to read about affairs or abuse in any genre. (Her husband likes her to add here that this is nothing to do with him, she just doesn’t like sad stories). Her favourite authors are Mira Grant, Greig Beck, James Rollins, Matthew Reilly, Darcy Coates, Andy Weir, Clive Cussler, R F Kuang, Patricia Briggs, and Kelley Armstrong. Her comfort movies are: Jaws, Outbreak, The Cave, Sanctum, Scream, Buffy, Grey's Anatomy, Charmed, Vampire Diaries. You can find her on: Bluesky: @helenlane.bsky.social Instagram: hflane_agenting Helen would like you to submit a covering letter, 1 page synopsis and first three chapters (Max 5,000 words) of your manuscript in a single word document. (In addition to the paid sessions, Helen is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 2nd April 2025
COBOL training course description A hands on training course providing an introduction to COBOL. What will you learn Write COBOL programs Debug COBOL programs Examine existing code and determine its function. COBOL training course details Who will benefit: Programmers working with COBOL. Prerequisites: None although experience in another high level language would be useful. A 10 day version of this course would be more applicable for those new to programming. Duration 5 days COBOL training course contents Introduction to COBOL Compilation, linkage editor. Compile errors, compiler options. Divisions, syntax and format, COBOL character set, program structure. COBOL statement structure COBOL words, format of statements. Divisions Identification entries, Environment entries, Data division: FD, record descriptions, hierarchy and level numbers, description-string entry. File and Working-Storage Sections Literals, figurative constants, redefines clause, data representation, Usage clause, synchronization, sign clause. Procedure Division File status codes; Open, Read, Write, Close, Stop, Goback; Accept, display; Move, Justified, data name qualification, reference modification. Perform statement Out-of-line, With test ... Until, ... Times, in-line statement; Go to statement. Program design Design techniques, design considerations, procedure names, program structure. Printing Printed output, Write, advancing option, editing characters; Initialize. Condition testing Conditional statements: IF, class, sign and relation conditions, condition-name conditionals, Set, compound conditions, logical operators. Evaluate, Continue. Arithmetic Rounded option, On Size Error option, Add, Subtract, Multiply, Divide, Compute. Non-sequential files File access modes, Select. Indexed and relative files. Open, Close, creating / reading sequential access files, Write, Read, Invalid key clause, reading, writing / updating Random access files, Rewrite, Delete, Start. Declarative routines Clauses. Subroutines Call, Using clause - calling program/called program, Linkage Section, returning control. Table handling Subscripted tables: One/two/three dimensional tables, Perform, variable length tables. Indexed tables: Set, using an index; Search. Copy code: Copy, Suppress, Replacing. Data Manipulation Inspect, String, Unstring. COBOL/370 LE/370 and Intrinsic Functions.
LOOKING FOR: PICTURE BOOKS Barry Timms is a children's picture book editorial consultant with over twenty years' experience. He has also edited preschool books, non-fiction and young fiction works. Barry's editorial roles include senior and managerial positions at Macmillan Children's Book, Walker Books and Little Tiger Group, making commercially successful books of the UK, US and international markets. Barry is also an award winning author of over fifteen picture books. This is NOT a Unicorn!, published by Nosy Crow, won the Stockport Children's Book Award 2022. Barry would like you to submit a covering letter and a maximum of two picture book texts to be discussed. This should be in one Word document with the cover letter at the top. The texts should be for children aged within the 2-6 years age bracket and can be in prose or rhyme. As well as conventional fiction narratives, narrative non-fiction is also acceptable. (In addition to the paid sessions, Barry is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Wednesday 2nd April 2025
Build a rewarding career in content design Build a rewarding career in content design with a globally recognised, industry-approved qualification. Get the mindset, the confidence and the skills that will help you stand out in a rapidly growing industry. Why take this course: Be in demand. Certified qualifications will help you stand out in a fast-growing industry Build a career with impact. Design content experiences that will influence users worldwide Broaden your opportunities. Optimise your skills to get hired at leading companies Get qualified. Earn a university credit-rated certification approved by industry leaders Gain the confidence you need to succeed. Our mentors, career advisors and student community will support you all the way University credit-rated, industry-approved Our content design course is credit-rated by Glasgow Caledonian University and has been reviewed and endorsed by leaders in the tech industry. It covers everything you need to become a certified content design professional. Study method Online, self-paced Duration 10 weeks Access to content 12 months Qualification Professional Certificate in Content Design Awarded by Scottish Qualifications Authority trading as SQA Additional info Exam(s) / assessment(s) is included in price Tutor is available to students Description In this Professional Certificate in Content Design course you will learn: An introduction to content design. Understand what content design is and the role of a content designer. Principles of good content design Learn the core principles of content design and why it matters. Voice, tone and style Learn how voice, tone, and style can create a cohesive product experience. Understanding your users Uncover your audience's goals and content needs. Writing for interfaces Learn to write microcopy for buttons, notifications and other UI elements. The product mindset Develop a product mindset by learning about product design systems and tools. Testing content Learn how to test, evaluate and improve your content. AI for content design Learn how to use AI tools to become a more effective content designer. Working in content design Learn how to be the content champion within your organisation. Support at every step From day one, you’ll be part of a lively community of tutors, mentors and fellow students that support each other along the way. Student Success team Our friendly and responsive team will help you stay on track and keep you accountable. Course mentor Your course mentor is an expert content designer who brings years of practical insight. Student community Collaborate, share tips and build connections on our lively student Slack channels. Who is this course for? Writers and journalists who want to enhance their skills for the digital world UX and UI designers who want to become more rounded professionals Content designers looking for a formal qualification that validates their expertise Digital marketers who need content design skills to succeed in their roles Anybody with a writing, content or design background looking for a creative tech job Requirements Background You don’t need experience in design or technology to enrol in our courses. To get the most value from this course, you will need some experience in writing and a genuine interest in words and language. Commitment You do need to be motivated and committed. We set a high bar. Studying for one of our professional qualifications requires a certain amount of time, energy and focus. English language To take this course, you should be fluent in verbal and written English. If English is not your first language, you should have a proficiency of C1 as defined by the CEFRL (Common European Framework of Reference for Languages).
Duration 3 Days 18 CPD hours This course is intended for This course is intended for intermediate to advanced Business Analysts who are looking to improve their skills for eliciting, analyzing, documenting, validating, and communicating requirements. Overview Obtain a thorough understanding of the core responsibilities of the business analyst Understand the main professional associations and standards supporting business analysts in the industry Discuss and explore the components of each of the domains/knowledge areas that comprise the work of business analysis Recognize the importance of properly defining the business need prior to engaging in requirements activities Formulate a strong understanding of the concepts that comprise strategy analysis Obtain experience with identifying and analyzing stakeholders Decipher between project and product scope and successfully use models to communicate scope Thoroughly understand and identify the various requirements categories and be able to recognize requirements of various types Explore business rules analysis Understand the benefits of process modeling and the common modeling language of BPMN Discuss process models and how the techniques can capture details about the as-is/to-be environment Learn how to properly prepare and conduct interviews Explore the components of use cases Learn what it means to package requirements Obtain hands-on experience with a number of business analysis techniques and gain hands-on experience eliciting, defining, and writing requirements. This course provides students a clear understanding of all the facets of the business analysis role, including a thorough walkthrough of the various domain/knowledge areas that comprise the business analysis profession. Students are provided an opportunity to try their hand at several business analysis techniques to assist with improving their skills in stakeholder identification, scope definition, and analyzing, documenting, and modeling requirements. Introduction to Business Analysis What is business analysis Benefits and challenges of business analysis Project success factors A Closer Look at the Business Analyst Role Definition of a business analyst Responsibilities of a business analyst Importance of communication/collaboration BA role vs. PM role Project roles involved in requirements IIBA/PMI and the goals of a professional association Purpose for having a BA standard IIBA?s BABOK© Guide and PMI?s Practice Guide in Business Analysis Business analysis beyond project work Business analysis core concepts Business analysis perspectives IIBA and PMI certifications for business analysts Workshop: Choose Your Project Supporting the Project Portfolio (Enterprise Analysis) Define Strategy Analysis When to perform Strategy Analysis Components of Strategy Analysis Defining the business need Envisioning the Product and Project Defining business requirements The importance of stakeholders Stakeholder identification Tips for analyzing stakeholders Techniques for managing stakeholder lists Discussion: Who is involved in strategy analysis? Workshops: Define the Business Need, Write Business Requirements, and Identify Stakeholders Understanding and Defining Solution Scope Defining solution scope Techniques for defining solution scope Applying the brainstorming technique Project scope vs. Product scope Finding solution boundaries The Context Diagram Actors and key information Workshop: Draw a Context Diagram Understanding Requirements What is a requirement? Requirement types Business, Stakeholder, Solution, and Transition requirements Assumptions and constraints Business rules Taxonomy of business rules Decision tables How to write simple calculations Requirements vs. business rules Document requirements Workshop ? Document Requirements Elicitation and Process Modeling Why do we model processes? What is Business Process Management? Using a modeling notation ?As Is? vs. ?To Be? modeling Why use BPMN? Basic BPM notation Business Process Modeling ? A case study Business Process Realignment ?As Is? vs. ?To Be? activity diagrams Workshop: Create a Business Process Model Planning & Eliciting Requirements Interviewing ? what and why? Preparing for an effective interview Types of questions to ask Sequencing questions Active listening techniques Planning for elicitation Conducting the interview Establishing rapport Active Listening Feedback techniques Types of elicitation techniques Workshops: Planning for Elicitation and Conducting an Elicitation Session Use Case & User Story Analysis What is an Actor? Types of Actors How to ?find? Use Cases? Diagramming Use Cases Tips on naming Use Cases Explaining scenarios The use case template Components of a use case Scenario examples Best practices for writing Use Cases Scenarios and flows Alternate and exception flows Exercises: Drawing a Use Case Diagram, Writing the Main Success Scenario, and Writing Alternate and Exception Scenarios Analyzing & Documenting Requirements Requirements and Use Cases Non-Functional requirements User Interface Requirements UI Data Table Reporting requirements Data requirements Data accessibility requirements Characteristics of good requirements The business requirements document (BRD) BRD vs. Functional Requirements Specification Preparing the requirements package Requirements traceability Workshops: Develop a User Interface, Analyzing Requirements, and Tracing requirements Additional Resources Useful books and links on writing effective requirements