Working on matrix working: looking back after 4 years
...Energy and Industrial Strategy (BEIS). We were fortunate to be able to receive coaching and support from Emily Webber and Rebecca Kemp over 2023 and 2024 to help us with...
...Energy and Industrial Strategy (BEIS). We were fortunate to be able to receive coaching and support from Emily Webber and Rebecca Kemp over 2023 and 2024 to help us with...
...review digital records at the Department for Business and Trade (DBT). AI, information and me At the end of 2024, I joined the IT Service Management team. I had recently...
...released open-source code on which our own code depends. To benefit from community contributions, encourage reuse across government, and to work transparently in the public interest, we also publish our...
...Computing Platform. We code in the open by default. All software we release to the public is under Open Government Licence or equivalent. Our developers work in multidisciplinary agile teams...
...this means we have the right tools for the job of promoting UK exports, attracting foreign investment and developing trade policy, it’s a real challenge for data protection. Or, at...
...re-inventing things other departments have already done. Redbox is a fantastic example of this. Through joint workshops, employee secondment, bi-weekly collaboration sessions and code-sharing with the I.AI team, DBT’s AI...
...or we weren’t sure whether their laptop needed to be replaced. Things which we couldn’t fix using code, we needed users to tell us. This meant that we couldn’t simply...
It is well documented that at least 1 in 5 people have a long term illness, impairment or disability while many more have a temporary disability. At the Department for...
...or concept that I do not understand. What is code? Where is the cloud? One of the best bits about this DDaT team is there is never any shame in...
...from unstructured data, or even write code. Government departments routinely handle confidential and personal data. Therefore, using public AI tools that transmit data externally can post significant security and privacy...