LOOKING FOR: MG, YA, ADULT FICTION, ADULT NON-FICTION, NON-FICTION FOR 7+ Megan Carroll is looking for writers in a variety of areas, and from a wide range of backgrounds – she is particularly keen to hear from Black, Asian, and LGBTQIA+ writers. Her main areas of focus this year are adult fiction and non-fiction, as well as non-fiction for 7+, and MG and YA fiction. In Fiction, Megan is keen to see high-concept love stories (think The Flat Share or The Lock In) for both commercial and reading group readers. She’d love to see those familiar romance tropes – enemies to lovers, friends to lovers, love triangles, forbidden love etc. – with underrepresented characters at the centre. She is also looking for historical fiction and gothic horror (think Laura Purcell, Stacey Halls and Silvia Moreno-Garcia) – anything that has a creepy, uneasy undertone is likely for Megan’s list. Megan is also actively looking for upmarket fiction and would love to see layered family drama, contemporary stories about life today and darkly comic novels that explore a specific time, place or experience. In Non-Fiction, Megan is keen to hear from experts in their field talking about topics relating to film, music, true crime, popular culture, history and issues from largely unrepresented perspectives. She is keen to see memoir, narrative non-fiction and essay collections. In Children’s and YA, she is keen to see contemporary YA with humour, and romance at the heart – fun and emotional stories that appeal to the interests and issues of the teenage readers. She’d also love to see thrillers and horror stories for this age group too. It’s unlikely that high fantasy novels for YA readers will be right for her, but she is keen to see stories with fantasy elements in a real world setting. On the younger end, Megan is looking for funny, contemporary middle grade – think Louise Rennison and Karen McCombie – and anything creepy and spooky for 8-12 year old readers too. She’d love to find something like Lemony Snicket’s A Series of Unfortunate Events and is keen to find original adventure stories in both fantasy and realistic settings. Megan would like you to submit a covering letter, 1 page synopsis and the first three chapters or 5,000 words of your manuscript in a single word document. (In addition to the paid sessions, Megan is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Tuesday 16th January 2025
Securing UNIX systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure UNIX accounts. Secure UNIX file systems. Secure UNIX access through the network. Securing UNIX systems course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing UNIX systems course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.
6 sessions of Couples Therapy at Miss Date Doctor the multi award winning relationship coaching and life coaching platform 1 hour per week With a qualified professional Call 03333443853 today
Course Information This course aims to empower you with the expertise to proficiently navigate process mapping and master the art of crafting Standard Operating Procedures (SOPs) within regulated environments. Whether you're engaged in activities that demand process improvement, continual enhancement, or SOP creation, this course offers invaluable insights tailored to your needs. It caters to individuals tasked with managing, documenting, and implementing processes and SOPs, irrespective of prior experience or skills. Our curriculum does not focus on specific software or approaches, focusing instead on fundamental principles and adaptable concepts applicable across diverse organisational landscapes. Benefits include: Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. This course is structured to encourage delegates to: Discuss and develop ideas Develop a practical approach for creating process maps and writing SOPs Understand how to use process maps in SOPs effectively Discuss how process mapping for preparing SOPs can be applied to process improvement for SOPs. Is this course for you? The course is designed for all those with responsibility for managing, documenting and implementing processes and SOPs. It assumes no prior experience or skills. The course does not recommend any specific software or approach, but explores the principles and ideas that can be applied in any organisation. What will you learn? Hands-on experience in mapping processes An understanding of how process maps can be used to define, communicate and continually improve complex processes An understanding of best practice for SOPs using of process maps/process flow diagrams and process mind maps to complement text An insight into the preparation of concise and user friendly SOPs. By the end of the course you will be able to: Create process maps and write clearer more concise SOPs Understand how to use process maps in SOPs effectively Understand how process mapping can be applied to process improvement and better SOPs. Tutors Tutors will be comprised of (click the photos for biographies): Laura Brown Director, Laura Brown Training and Development David Butler VP of Quality, Resolian Programme Please note timings may be subject to alteration. Day 1 09:00 Welcome, Introductions and Course Objectives Why Companies manage by process. 10:00 Exercise 1 - First Steps Mechanisms for process mapping, levels at which it can be applied, and the roles and responsibilities of process owners. 10:30 Exercise 1 - Feedback 10:45 Break 11:00 Mapping Processes The stages involved in mapping processes including how to construct a SIPOC chart. 11:45 Exercise 2 - Mapping A Process A first opportunity to practice your new process mapping skills. 12:30 Exercise 2 - Feedback 13:00 Lunch 14:00 Exercise 3 - Discussion of Options for Format, Structure and Layout What Makes A Good SOP? Discussion of options for format, structure, level of detail of SOPs and the use of process maps for SOP writing. A case study example of a good SOP which uses a flow chart/process map. 14:45 Exercise 3 - Feedback 15:00 Break 15:15 A Case Study example of a good SOP that uses a flow chart / process map 15:30 Exercise 4 Discussion of the content of an SOP using a Process Map 15:35 Exercise 4 - Feedback 15:45 Key Writing Considerations 16:15 Exercise 5 16:45 Exercise 5 - Feedback 17:00 Close of Day Day 2 09:00 Review of Day 1 09:15 Using Metrics Selecting and using metrics to monitor and improve processes. 10:00 Exercise 6 - Practice in Process Mapping Creating Process Maps from multi-source information. 11:00 Break 11:15 Exercise 6 - Feedback 11:45 Common Pitfalls Common problems and tips for good Process Mapping. 12:15 Demonstration of Process Mapping on a PC 12:45 Lunch 13:30 Exercise 7 - Mind Mapping 14:30 Exercise 7 - Feedback 15:00 Break 15:15 Exercise 8 - Using Process Maps to Write an SOP Applying your process mapping skills as part of writing an SOP 15:30 Exercise 8 - Feedback 15:45 Course Review and Follow-up 16:00 Close of Course Extra Information Face-to-face course Course Material Course material will be available in PDF format for delegates attending this course. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course. The material will be emailed in advance of the course and RQA will not be providing any printed copies of the course notes during the training itself. Delegates wishing to have a hard copy of the notes should print these in advance to bring with them. Alternatively delegates are welcome to bring along their own portable devices to view the material during the training sessions. Remote course Course Material This course will be run completely online. You will receive an email with a link to our online system, which will house your licensed course materials and access to the remote event. Please note this course will run in UK timezone. The advantages of this include: Ability for delegates to keep material on a mobile device Ability to review material at any time pre and post course Environmental benefits – less paper being used per course Access to an online course group to enhance networking. You will need a stable internet connection, a microphone and a webcam. Development Level Learn
WiMax training course description Broadband wireless access is an emerging technology area. This course looks at WiMAX, where it can be used, how it works and the alternative technologies. What will you learn Describe WiMAX. Explain how WiMAX works. Compare and contrast WiMAX with alternative broadband wireless access technologies. WiMax training course details Who will benefit: Anyone wishing to know more about WiMAX. Prerequisites: None. Duration 2 days WiMax training course contents Introduction What is WiMAX? WiMAX applications, The Internet, Internet access choices, wireless broadband access, WiMAX benefits. WiMAX overview Spectrums, LOS vs. non-LOS, bit rates, modulation, mobility, channel bandwidth, cell radius. WiMAX standards The WiMAX forum, IEEE, ETSI, HIPERACCESS, HIPERMAN, 802.16, 802.16-2004, 802.16a, 802.16e, 802.16f. WiMAX architecture Subscriber Stations (SS), Indoors, outdoors, antennas, Radio Base Stations (BS), LOS, Non LOS BackHaul, Point to multipoint, mesh support. Physical layer 10 - 66GHz, TDMA, TDD, FDD, 2 -11 GHz, SC2, OFDM, OFDMA, QPSK, QAM, Radio Link Control (RLC), uplink, downlink. MAC layer Traffic types (continuous, bursty), QoS, service types. MAC operations, connection oriented, frame structure, addressing. Convergence sublayers, service specific, common part, profiles (IP, ATM). Bandwidth request-grant, ARQ, Management messages. Security MAC privacy sublayer, network access authentication, AAA, 802.1x, key exchange and privacy. WiMAX alternatives WiMAX vs. 3G, WiMAX vs. 802.20.
Network DevOps course description This course is not a soft skills course covering the concepts of DevOps but instead concentrates on the technical side of tools and languages for network DevOps. Particular technologies focussed on are ansible, git and Python enabling delegates to leave the course ready to starting automating their network. Hands on sessions follow all major sections. More detailed courses on individual aspects of this course are available. What will you learn Evaluate network automation tools. Automate tasks with ansible. Use git for version control. Use Python to manage network devices. Use Python libraries for network devices. Network DevOps course details Who will benefit: Administrators automating tasks. Prerequisites: TCP/IP Foundation Duration 5 days Network DevOps course contents What is DevOps Programming and automating networks, networks and clouds, AWS, OpenStack, SDN, DevOps for network operations. Initial configuration Configuring SSH, ZTP, POAP. Hands on Initial lab configuration. Getting started with ansible The language, the engine, the framework. Uses of ansible, orchestration. The architecture, Controlling machines, nodes, Agentless, SSH, modules. Configuration management, inventories, playbooks, modules, roles. Hands on Installing ansible, running ad hoc commands. Ansible playbooks ansible-playbook, YAML, plays, tasks, handlers, modules. Playbook variables. Register module, debug module. Hands on Running playbooks. Ansible Inventories /etc/ansible/hosts, hosts, groups, static inventories, dynamic inventories. Inventory variables, external variables. Limiting hosts. Hands on Static inventories, variables in inventory files. Ansible modules for networking Built in modules, custom modules, return values. Core modules for network operations. Cisco and/or Juniper modules. ansible_connection. Ansible 2.6 CLI. Hands on Using modules. Ansible templating and roles aConfiguration management, full configurations, partial configurations. The template module, the assemble module, connection: local, Jinja2 templates, variables, if, for, roles. Hands on Generating multiple configurations from a template. Network programming and modules Why use Python? Why use ansible? alternatives, ansible tower, Linux network devices. Programming with Python Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip instal. Hands on Python programming with pyping. More Python programming Functions. Classes, objects and instances, modules, libraries, packages. Python strings, Python file handling, pip list, pip install. Hands on Python programming with pyping. Git Distributed version control, repositories, Git and GitHub, Alternatives to GitHub, Installing git, git workflows, creating repositories, adding and editing files, branching and merging, merge conflicts. Hands on working with Git. Python and networking APIs, Sockets, Telnetlib, pysnmp, ncclient, ciscoconfparse. Paramiko SSH and Netmiko Integrating Python and network devices using SSH. Netmiko, Netmiko methods. Hands on Netmiko. NAPALM What is NAPALM, NAPALM operations, getters, Replace, merge, compare, commit, discard. Hands on Configuration with NAPALM. Integrating ansible and NAPALM. Python and REST REST APIs, enabling the REST API. Accessing the REST API with a browser, cURL, Python and REST, the request library. Hands on Using a REST API with network devices.
Total H.248 training course description A course focusing purely on the H.248 protocol. Anyone working through the ITU standards documents can testify to the need of a training course to explain how H.248 really works. This course already assumes knowledge of other VoIP protocols and starts by positioning H.248 in relation to the other protocols. The course then looks at H.248 architectures and concepts before analysing H.248 messages and call flows. What will you learn Describe what H.248 is Recognise where H.248 fits in relation to other VoIP protocols. Explain how H.248 works. Analyse H.248 packets Total H.248 training course details Who will benefit: Technical staff working with H.248 Prerequisites: Voice Over IP. Duration 2 days Total H.248 training course contents What is H.248? Review of VoIP protocols: RTP, RTCP, SIP, SDP, H.323. The PSTN and SS7. Where H.248 fits into the picture. H.248 history. MGCP. The IETF. Megaco. ITU standards. H.248v1, v2, v3. H.248 architectures Media Gateways, Media Gateway Controllers, Gateway Control functions, Signalling Gateways. Reference architectures: IMS/TISPAN: IBCF, IWF, I-BGF, SPDF. MSF: S-SBG-NC, D-SBG-NC. GSMA: IPX Proxy. Softswitches. H.248 concepts The connection model, terminations, streams, contexts. Termination properties: descriptors, context properties. Events, signals, packages. H.248 messages Protocol stack, UDP, TCP. Message structure. Transactions, actions, commands. Requests, replies, acknowledgements. Sample message flows. Binary encoding, ASN syntax, Text encoding. H.248 commands Termination manipulation: Add, Subtract, Move, Modify. Event reporting: Notify. Management: AuditCapability, AuditValue, ServiceChange. H.248 Descriptors What are descriptors? Relationship with messages and commands. Basic descriptors, Descriptors composed of other descriptors. The 19 descriptors. Defaults. H.248 Transactions Groups of commands, transaction Ids, relationship with actions and commands. Requests and replies. H.248 wrap up What is a package? Basic packages. H.248 security. H.248 - SIP interoperation. H.248 interoperation with other protocols.
LOOKING FOR: YA, ADULT FICTION, NON-FICTION Laura Williams is literary agent at the Greene and Heaton Literary Agency. She is seeking literary fiction, commercial fiction, psychological thrillers and high concept Young Adult. Laura is actively building a fiction list and a small non-fiction list. She is currently looking for literary fiction, edgy commercial fiction, psychological thrillers and high-concept contemporary young adult, as well as narrative non-fiction of all types. Her taste is quite dark, and she loves gothic, ghost stories, horror and anything sinister. She also loves books that make her cry, from big love stories to intense family dramas. She is open to historical or horror YA, but not magical or fantasy. Meditative or moving novels about modern life, appeal to Laura, sad stories with love and the importance of caring for each other shining through. She also loves stories about female friendships or conversely groups of women who don't get on, such as the hugely fun BAD SUMMER PEOPLE by Emma Rosenblum. She is always on the lookout for a big tragic love story to make her cry happy or sad tears. At the more commercial end of fiction, think funny novels with warmth and romantic comedies with a bit of depth – think Marian Keyes. Most of all Laura is looking for novels she hasn’t read before – something unusual structurally or thematically, something that shines a light on a subject the author is passionate about, something that’ll break her heart or raise her blood in an entirely new way. Laura is always looking to promote diverse voices from across the globe, and is particularly keen on LGBTQI+ stories. Laura would like you to submit a covering letter, a 1-2 page synopsis and the first 5,000 words of your completed manuscript in a single word document. (In addition to the paid sessions, Laura is kindly offering one free session for low income/under-represented writers. Please email agent121@iaminprint.co.uk to apply, outlining your case for this option which is offered at the discretion of I Am In Print). By booking you understand you need to conduct an internet connection test with I Am In Print prior to the event. You also agree to email your material in one document to reach I Am In Print by the stated submission deadline and note that I Am In Print take no responsibility for the advice received during your agent meeting. The submission deadline is: Monday 6th January 2025
Spiritual Hypnotherapy and regression techniques, delve into alternate dimensions of reality. Our goal is to assist clients in unlocking their spiritual potential, guiding them to uncover their unique calling and purpose. Through our workshop, participants will learn how to deepen their connection with their faith, fostering personal growth and development. Join us as we embark on a profound exploration of spirituality and self-discovery.
SS7 training course description An Introduction to Signalling System No 7. Covering the terminology, technology and topology of the Core Signalling System. What will you learn Describe the evolution of SS7. Identify the component parts of SS7. Describe the basic method of operation of SS7. Describe a basic call set-up and clear within SS7. SS7 training course details Who will benefit: Network/Systems engineers Operators/Planners. Prerequisites: Telecommunications Introduction Duration 2 days SS7 training course contents Introduction Digital Signalling, CAS, CAS Applications, CCS, Layer 1, Layer 2 (HDLC), Layer 3, Evolution of SS7, Common SS7 functions. Physical Functionality SS7 Topology, Service Switching Point (SSP), Signalling Transfer Point (STP), Service Control Point (SCP), Database Types, CMSDB, NP, LIDB, HLR, VLR, Signalling Modes, Link Types, Further Redundancy, Linksets, Signalling Routes. Addressing Addressing in SS7, E.164, ANSI PCs, ITU-T (CCITT) PCs, Connecting Networks (ISPs/NSPs). Message Transfer Part SS7 Protocol Stack, MTP Level 1, MTP Level 2, Signalling Units, Flow Control, Fill In Signalling Unit (FISU), Link Status Signalling Unit (LSSU), Message Signalling Unit (MSU), MTP Level 3. Application and User Parts Signalling Connection Control Part (SCCP), Transaction Capabilities Application Part (TCAP), Telephone User Part, BTUP, ISDN User Part (ISUP), ISUP - Supplementary Services, ISUP - Call, Call Set-up over SS7. The Intelligent Network Function of IN, Evolution of IN, Conceptual Model, Target Services and Service Features, Independent Building Blocks.