Insights from the Northumbrian Water Innovation Festival 2024

Insights from the Northumbrian Water Innovation Festival 2024

Attending the Northumbrian Water Innovation Festival last month was a very informative experience for our CACI Mood team, filled with insightful discussions and ground-breaking innovations. Held at Newcastle Racecourse, the festival brought together 3,000 people from 32 countries, creating a vibrant and diverse atmosphere. As a proud sponsor, we had the opportunity to support this great event and showcase Mood’s innovation capabilities at our exhibition stand. 

An Inspiring Setting for Innovation 

From the outset of the event, it was clear that this was not just another industry conference; it was an opportunity to break down barriers, open dialogue, and explore new ideas in a completely different context.  

The festival’s structure, which included a record 37 sprints, facilitated rapid problem-solving and idea generation. These sprints were filled with thought-provoking discussions, and we were lucky to hear insights from the likes of British Olympians Steve Cram CBE and Ellie Simmonds, who shared valuable perspectives. 

Specific Innovations and Collaborative Approaches 

One of the most striking aspects of the festival was the diversity of participants, which included suppliers like us, industry veterans, and aspiring professionals. This diversity enriched every discussion with fresh insights and novel approaches, underscoring the value of varied viewpoints in problem-solving.  

Notable innovations included solutions for improving water quality, achieving net zero emissions, and reducing pollution and leakage. A particularly impactful sprint, led by data-giant Cognizant, focused on leveraging AI technology to enhance the health of local rivers. 

Overcoming Business Challenges 

The festival also highlighted the importance of overcoming challenges through collaboration. The structured yet flexible format of the workshops, including design sprints and daily dashes, ensured that participants remained focused and productive. These sessions were expertly guided by sprint leads, facilitating a collaborative environment where participants could step out of their usual roles and approach problems from different angles. 

Personal and Professional Insights 

Engaging with a diverse group in a non-work environment allowed me to gain new perspectives on the challenges facing our water sector clients. It was refreshing to address issues in a setting where creativity was encouraged, and there were no predefined expectations about the “right” way to approach a problem. Professionally, the festival highlighted the importance of stepping outside our usual routines to generate actionable ideas. 

The Value of Participation 

Participating in the festival was more than just a productive use of time; it was an investment in the future of our water industry. The insights gained and connections made will undoubtedly contribute to more effective and innovative solutions for our clients.  

The festival demonstrated that breaking away from conventional settings and embracing a more open and creative approach can lead to endless possibilities. 

Looking Forward 

Moving forward from the festival, we hope apply elements of it to foster a more open and creative environment in our meetings and workshops. Encouraging diverse participation and thinking outside the box will continue to drive innovation in our projects and add value for our clients.

The Innovation Festival was a remarkable experience that highlighted the power of creativity, diversity, and open collaboration. I am eagerly looking forward to seeing the outcomes of this festival and am confident they will drive positive change in the water sector and beyond.

For more details on the festival, visit www.innovationfestival.org. 

Discover the power of Mood here.

Top network automation trends in 2024

Top network automation trends in 2024

Network automation has become increasingly prevalent in enterprises and IT organisations over the years, with its growth showing no signs of slowing down.  

In fact, as of 2024, the Network Automation Market size is estimated at USD 25.16 billion (GBP 19.78 billion), expected to reach USD 60.59 billion (GBP 47.65 billion) by 2029. By 2028, a growth rate of 20% is predicted in this sector in the UK. Within CACI, we are seeing a higher demand for network automation than ever before, supporting our clients in NetDevOps, platform engineering and network observability. 

So, how is the network automation space evolving, and what are the top network automation trends that are steering the direction of the market in 2024?  

Hyperautomation

With the increasing complexity of networks that has come with the proliferation of devices, an ever-growing volume of data and the adoption of emerging technologies in enterprises and organisations, manual network management practices have become increasingly difficult to uphold. This is where hyperautomation has been proving itself to be vital for operational resilience into 2024. 

As an advanced approach that integrates artificial intelligence (AI), machine learning (ML), robotic process automation (RPA), process mining and other automation technologies, hyperautomation streamlines complex network operations by not only automating repetitive tasks, but the overall decision-making process. This augments central log management systems such as SIEM and SOAR with functions to establish operationally resilient business processes that increase productivity and decrease human involvement. Protocols such as gNMI and gRPC for streaming telemetry and the increased adoption of service mesh and overlay networking mean that network telemetry and event logging are now growing to a state where no one human can adequately “parse the logs” for an event. Therefore, the time is ripe for AI and ML to push business value through AIOps practices to help find the ubiquitous “needle” in the ever-growing haystack. 

Enterprises shifting towards hyperautomation this year will find themselves improving their security and operational efficiency, reducing their operational overhead and margin of human error and bolstering their network’s resilience and responsiveness. When combined with ITSM tooling such as ServiceNow for self-service delivery, hyperautomation can truly transcend the IT infrastructure silo and enter the realm of business by achieving wins in business process automation (BPA) to push the enterprise into true digital transformation. 

Increasing dependence on Network Source of Truth (NSoT)

With an increasing importance placed on agility, scalability and security in network operations, NSoT is proving to be indispensable in 2024, achieving everything the CMDB hoped for and more. 

As a centralised repository of network-related data that manages IP addresses (IPAM), devices and network configurations and supplies a single source of truth from these, NSoT has been revolutionising network infrastructure management and orchestration by addressing challenges brought on by complex modern networks to ensure that operational teams can continue to understand their infrastructure. It also ensures that data is not siloed across an organisation and that managing network objects and devices can be done easily and efficiently, while also promoting accurate data sharing via data modelling with YAML and YANG and open integration via API into other BSS, OSS and NMS systems.  

Enterprises and organisations that leverage the benefits of centralising their network information through NSoT this year will gain a clearer, more comprehensive view of their network, generating more efficient and effective overall network operations. Not to mention, many NSoT repositories are much more well-refined than their CMDB predecessors, and some – such as NetBox – are truly a joy to use in daily Day 2 operations life compared to the clunky ITSMs of old. 

Adoption of Network as Service (NaaS)

Network as a Service (NaaS) has been altering the management and deployment of networking infrastructure in 2024. With the rise of digital transformation and cloud adoption in businesses, this cloud-based service model enables on-demand access and the utilisation of networking resources, allowing enterprises and organisations to supply scalable, flexible solutions that meet ever-changing business demands. 

As the concept gains popularity, service providers have begun offering a range of NaaS solutions, from basic connectivity services such as virtual private networks (VPNs) and wide area networks (WANs) to the more advanced offerings of software-defined networking (SDN) and network functions virtualisation (NFV).  

These technologies have empowered businesses to streamline their network management, enhance performance and lower costs. NaaS also has its place at the table against its aaS siblings (IaaS, PaaS and SaaS), pushing the previously immovable, static-driven domain of network provisioning into a much more dynamic, elastic and OpEx-driven capability for modern enterprise and service providers alike. 

Network functions virtualisation (NFV) and software-defined networking (SDN)

A symbiotic relationship between network functions virtualisation (NFV), software-defined networking (SDN) and network automation is proving to be instrumental in bolstering agility, responsiveness and intelligent network infrastructure as the year is underway. As is often opined by many network vendors, “MPLS are dead, long live SD-WAN”; which, while not 100% factually correct (we still see demand in the SP space for MPLS and MPLS-like technologies such as PCEP and SR), is certainly directionally correct in our client base across finance, telco, media, utilities and increasingly government and public sectors. 

NFV enables the decoupling of hardware from software, as well as the deployment of network services without physical infrastructure constraints. SDN, on the other hand, centralises network control through programmable software, allowing for the dynamic, automated configuration of network resources. Together, they streamline operations and ensure advanced technologies will be deployed effectively, such as AI-driven analytics and intent-based networking (IBN). 

We’re seeing increased adoption of NFV via network virtual appliances (NVA) deployed into public cloud environments like Azure and AWS for some of our clients, as well as an increasing trend towards packet fabric brokers such as Equinix Fabric and Megaport MVE to create internet exchange (IX), cloud exchange (CX) and related gateway-like functionality as the enterprise trend towards multicloud grows a whole gamut of SDCI cloud dedicated interconnects to stitch together all the XaaS components that modern enterprises require. 

Intent-based networking (IBN)

As businesses continue to lean into establishing efficient, prompt and precise best practices when it comes to network automation, intent-based networking (IBN) has been an up-and-coming approach to implement. This follows wider initiatives in the network industry to push “up the stack” with overlay networking technologies such as SD-WAN, service mesh and cloud native supplanting traditional Underlay Network approaches in Enterprise Application provision. 

With the inefficiencies that can come with traditional networks and manual input, IBN has come to network operations teams’ rescue by defining business objectives in high-level, abstract manners that ensure the network can automatically configure and optimise itself to meet said objectives. Network operations teams that can devote more time and effort to strategic activities versus labour-intensive manual configurations will notice significant improvements in the overall network agility, reductions in time-to-delivery and better alignment with the wider organisation’s goals. IBN also brings intelligence and self-healing capabilities to networks— in case of changes or anomalies detected in the network, it enables the network to automatically adapt itself to address those changes while maintaining the desired outcome, bolstering network reliability and minimising downtime. 

As more organisations realise the benefits of implementing this approach, the rise of intent-based networking is expected to continue, reshaping the network industry as we know it. The SDx revolution is truly here to stay, and the move of influence of the network up the stack will only increase as reliance on interconnection of all aspects becomes the norm. 

How CACI can support your network automation journey? 

CACI is adept at a plethora of IT, networking and cloud technologies. Our trained cohort of network automation engineers and consultants are ready and willing to share their industry knowledge to benefit your unique network automation requirements. 

From NSoT through CI/CD, version control, observability, operational state verification, network programming and orchestration, our expert consulting engineers have architected, designed, built and automated some of the UK’s largest enterprise, service provider and data centre networks, with our deep heritage in network engineering spanning over 20 years. 

Take a look at Network Automation and NetDevOps at CACI to learn more about some of the technologies, frameworks, protocols and capabilities we have, from YAML, YANG, Python, Go, Terraform, IaC, API, REST, Batfish, Git, NetBox and beyond. 

To find out more about enhancing your network automation journey, get in touch with us today.  

Unmet needs and data driven decisions: how Milton Keynes uses technology to support vulnerable young people

Unmet needs and data driven decisions: how Milton Keynes uses technology to support vulnerable young people

In the first part of our case study with Milton Keynes Youth Offending Team we explored how the team uses ChildView. We examined how the system supports the team’s administrative functions such as reporting, and how the YOT is supported by CACI. In this, the second part of the case study, we sat down with Diz Minnitt, head of youth justice and support service at Milton Keynes, to look at the benefits ChildView has brought to the council outside of its office walls. How does ChildView support work with vulnerable young people in a rapidly expanding population? What tangible difference does flexible reporting bring to the YOT? How does technology help to join the dots in each young person’s journey to provide a single view of them, helping to improve outcomes and reduce elements such as reoffending? How can systems support in identifying more unmet earlier, to help with prevention?

We start by taking a broader perspective on the multi-agency approach within Milton Keynes. The MK Together Safeguarding Partnership brings together senior leaders from key agencies in Milton Keynes to agree ways to co-ordinate local safeguarding services, act as a strategic leadership group in supporting and engaging others and implement local and national learning, including from serious child safeguarding incidents. It has created an improvement in communication and accountability with the right people routinely updated.

“Working within this context has provided an opportunity for us to advocate on the part of people and families that the local authorities are working with,” begins Diz. “These are very vulnerable people and families; children in care, children in need and youth with unmet needs who are in the criminal justice system. We’re really starting to realise the importance of unmet needs and increasing our understanding of what stronger partnership working can achieve.”

Unmet needs – speech, language and communication needs (SLCN)

Following research and partnership work with the Association of Youth Offending Team Managers AYM in 2016, Diz told us about his original focus on identifying speech and language needs and developing what the YOS could do to help. “Following professor Karen Bryan’s original study in 2007, which identified 60% of children in contact with YOTs as having speech, language and communication needs, in 2008 we undertook our own four-month study with a speech and language therapist.

“We focused the assessments on key sub-groups in the service, those with repeat offending, disrupted education history or no education provision and those with suspected SEND (special educational needs and disabilities), and what we found was that 88% of these groups had significant SLCN – significantly higher than professor Bryan’s 60%.

“This was much closer to Prof Bryan’s figure of 60-90% for young people in custody, but what it highlighted was that there was a majority of those in contact with the service who had undiagnosed SLCN. Furthermore, these needs are very difficult to spot without a full assessment and hence are often referred to as hidden disabilities.

“Having effectively tested and proved the findings of professor Bryan’s academic study as a local reality in the high risk groups, particularly among young people who are repeat offenders, it was clear to me that such crucial unmet needs should inform youth justice and prevention practice across the entire system. Communication and the understanding that comes from this is key to thinking, processing, anticipating and understanding consequences. If we carried on as if children automatically have these skills, when it was clear they don’t, this was a recipe for failure carrying consequences for these children and for the rest of society.”

Connecting multiple agencies and teams

“It’s essential to reflect the importance of interconnection to this, too,” says Diz. “Most organisations, even those within the same local authority, frequently operate in siloes. They focus and prioritise the work that they need to do, that applies directly to them. However, achieving shared applied learning across the whole system to real life situations is the real world challenge and ultimately helps in achieving the goal of improving outcomes for vulnerable children.

“For example, it’s very clear that there’s an increased chance of a child with unmet needs entering the youth justice system. With the right focus this risk can be significantly reduced. Where people do not take a holistic view of this known risk, opportunities get missed and all professionals and departments don’t get the benefit from the insights and feedback that come from identification.”

Funding new projects, finding evidence

“For a new prevention project, you can only get funding once there’s a proof of concept,” explains Diz. “The SEND team at Milton Keynes initially picked up the bill for the speech and language therapy provision after the initial four-month funded period as they could see the benefits it would bring. Further funding for speech and language therapists was then obtained from NHS England, the Office for the Police and Crime Commissioner, the Home Office and most recently as part of Turnaround funding.

“This has consistently increased our screening and assessment capacity, meaning that we could identify SLCN earlier and can now clearly evidence that 88% of children and young people in contact with the service have SLCN. Milton Keynes is now one of a handful of youth justice services in the UK with speech and language therapists (SLTs) embedded in the team where an SLCN assessment is conducted by an SLT with every child.

“These assessments enable all of those professionals working with the child and their family to have greater insight, providing real opportunities for coherent, coordinated working with the child’s needs at the forefront.

“This complements the wider SEND focus and the understanding of needs arising from adverse childhood experiences amongst children across Milton Keynes. It also helps us to target interconnection with other parts of Milton Keynes’s services.”

“Like many Youth Offending Services we were in a position where we could see the impact as other services were cut due to the impact of austerity measures around funding. We had already begun to see the benefit of SLCN assessments and we had the evidence that children coming into the YJ system weren’t having their needs identified prior to contact with the YOT.

“As SEND support to schools started to be charged for we could see a nightmare scenario with the levels of children with previously unrecognised and unmet needs increasing as a direct consequence of schools being forced to make challenging decisions about how they use their reducing resources.

“To seek to counteract this predicted increase we started working with both secondary and primary schools offering SLCN assessments for their children who were at greatest risk of exclusion. With these assessments we discovered that 96% of those that schools had considered excluding have SLCN, confirming the ‘hidden disability’ impact of SLCN.

Promoting Reintegration Reducing Exclusion

“As well as providing free assessments to the schools, we also provided free specialist training around how to work effectively with children with SLCN and a host of other associated SEND needs. This removed a barrier as schools were no longer having to justify difficult choices with their budgets and enabled schools to develop better ways to support individual children and to adapt the whole school environment to enable swifter identification and support for those children with SLCN.

“This approach also supported a more compassionate way of thinking regarding challenging behaviour as we stress that, supported by the evidence, behaviour is an indicator of underlying causes that needs to be explored and understood.

“We have connected with different organisations to establish and evidence the research links and we saw more interconnects and overlaps with ACEs and SLCN. SLCN is not the only need, but its identification is frequently indicative of other symptoms of complex underlying needs. Identifying SLCN can trigger the process of further investigation.

“This overall approach is based upon our increasing knowledge of the needs that ultimately result in children finding themselves in the youth justice system. We can see clearly when this journey starts to arise and by definition the more we can go up these known tributaries to identify and meet needs earlier the more we can prevent children from being excluded from school, moved into alternative education or placed on part time timetables, finding themselves exploited or involved in offending behaviour.

“We need to use all of the information available to intelligently adapt the system collectively to identify and meet needs earlier. These children do not have the luxury of pausing, rewinding and replaying their lives if we collectively as professionals get it wrong or lack diligence and professional curiosity in our approach.”

“Childview has proved essential in enabling us to capture and extract the data needed for the evaluation of Promoting Reintegration Reducing Exclusion (PRRE) that has been undertaken by the Cambridge Institute of Criminology (CIC) in Cambridge University. The CIC are due to present their report imminently, but this was commissioned following some of the early indicators of PRRE which highlighted that we potentially see examples of unconscious adultification of children. The current systems in schools can become too focused on the behaviours without seeing beyond these to other symptoms and root causes of that behaviour. They can fail to understand reasons for the presenting behaviour and therefore can act to exclude prematurely.”

Data driven decisions

“With the introduction of the Early Support Project in 2018 we saw a 25% reduction in first time entrants to the youth justice system in its first 12 months.

“Milton Keynes is growing rapidly as a city and our resources haven’t always been tailored to match this growth. There has been an increase in gang-related activities post-Covid with an increase in the number of children coming into the system who were previously unknown to our services and those of key partner agencies. This reinforces the importance for us to act earlier.

“Milton Keynes also has a very young population which means a larger population pool of potential first time entrants into our youth justice system. Following an increase in knife related offences we developed a new strand of the ESP, ACT-Now which is focused explicitly on this area. Our ACT-Now model works by establishing direct contact with a young person whilst they are still in police custody within 90-minutes of us being contacted by the police. We then have a follow up visit with the young person and parents/carers within 48 hours to agree how we can work with them voluntarily. This has led to very positive engagement and a very low level of reoffending to date by those children who have been supported using this model. None of the reoffending to date (around 5%) has related to further knife carrying.

“The ACT-Now work has been funded by the Police and Crime Commissioner and the initial success led to the same approach being funded by him to operate in Slough and other parts of the Thames Valley area are being considered for further expansion. ACT-Now is being viewed very positively by the Home Secretary who is monitoring progress with the approach and it has recently been shared as a model of best practice amongst the network of police and crime commissioners.

“As well as significantly increasing timeliness of dealing with these offences, which is crucial for young people to understand the consequences of their actions, we are seeing improved outcomes for these young people and reduced reoffending rates.

“The cost argument is very effective for the police. Their approach is different to ours, but the outcomes are mutually beneficial. It’s cost effective and demonstrably reducing repeat offending. Reduced crime means fewer victims and we can demonstrate this from our data captured in detail in Childview.

Using ChildView to tackle capture and analyse data for tangible action points

“The Early Support Project aims to measure the reoffending rate over two years. The rate for young people who have been through the service is currently 1.81% and we have worked with c.500 young people. We know that the methodology, therefore, works. Correctly identifying needs earlier greatly improves outcomes for these young people.

“Childview has been crucial in all of this in providing the opportunity to capture and analyse significant amounts of data on the different cohorts of children covered under the different strands of the Early Support Project. For many years we have used the prevention extended functionality which we purchased. The identify tool is extremely adaptable, enabling us to add different elements for the various strands, such as new screening and assessment methodologies. We can capture data about the different elements of the project work, most importantly providing verifiable evidence around the impacts and outcomes achieved.

“Further, Childview uniquely allows life event characteristics such as undiagnosed SLCN, trauma and ACEs to be captured and used to add value to the analysis. This enables us to create rich sub-sets of our prevention data and thoroughly learn about what impact we are having and what is working. We can look at the numbers, the work we are doing that makes a difference and the profiles in our Early Support Project, Turnaround, ACT-Now and PRRE.

“We need to analyse the pathways of all these cases via logging their identified adverse and trauma life experiences as well as referrals in and out of our projects. These include referrals for SLCN, SEND, substance use and mental health. ChildView is a flexible and adaptable system that enables us to track all of our different service and project approaches and methodologies.”

Youth Resilience Project

“Our Youth Resilience Project offers one-to-one mentoring at all stages of the youth justice pathway supplementing other models through support that is available end-to-end. It can be used at the beginning of their journey, for those children just starting to work with the service or those who already engaged with us, through to those transitioning out of the youth justice system.

“ChildView’s additional functionality helps us to differentiate needs from data captured and to enquire about the ways we can facilitate targeted prevention and help to children. It enables us to build practice-based evidence and utilise this information to inform where we need to build service system capacity and capability to reduce or eliminate criminal behaviour. Having the flexibility to shape and use our data from local project work is essential to us, this helps to reveal patterns and insight from our work and therefore to evidence and highlight the resources needed.

“However, ChildView also provides a standard framework for monitoring youth justice, for example first time entrants, offending and reoffending to ensure we create consistent information about impact. We aim to always focus on improving outcomes and data is essential to achieving this. The outcomes for children are ultimately what matters.

“All members of the team can access the data and interpret it. It’s transparent and accessible across the service. Because we share a common system with many other services in Thames Valley we can share our methodologies, learning and customisation with other youth justice services. This helps us to pool and build knowledge and approaches to improve outcomes for children in our domain.”

How Tameside Council uses ChildView’s full case data exchange functionality

How Tameside Council uses ChildView’s full case data exchange functionality

Tameside Council has been using ChildView from CACI since 2014 to support its vital work in supporting vulnerable young people across its services. One specific area of functionality within ChildView that Tameside Council finds particularly useful, is the full case data exchange. 

The full case data exchange functionality enables Tameside Council to share and receive all the data held on a young person’s case. “It was taking so long to manually input the data associated with a full case,” explains Louise Hope, data and analysis lead. “Our business support function has been getting busier, with more work in referrals meetings and taking notes, resulting in less time for admin tasks such as this. We put together a business case for using the full case data exchange functionality and implemented it. 

“Essentially we wanted to save time. It has also helped us to improve the accuracy of our data; the data otherwise is only as good as the person inputting it. If they make mistakes and miss things, then our data is poorer as a result.” 

The full case data exchange functionality in ChildView enables youth justice services to send and receive all the data recorded on a young person with other youth offending teams (YOTs) using ChildView. If young people move services, then their record can move with them. “We use it to send and receive cases with other YOTs,” says Louise. “We would like to use it for everything but have found that there is some confusion around the process with other YOTs, whereby they only send us the asset rather than the full case. Once other YOTs understand the process, it will improve it further.” 

One of the main benefits of the functionality is to save time and improve efficiency. At a time when services are getting busier, this is a helpful facet of the full case data exchange. “Absolutely we’ve saved time through using the functionality,” says Louise. “Although it’s tough to say exactly how much time because each case is a different size. I would say, however, that we save at least a couple of hours on a standard case. Also, if the data is being input manually, we would never ask someone to add all contacts, for example; they would be attached as a pdf. So, we get a richer base of information whilst saving an average of two hours.” 

A richer base of information helps YOTs to pick up information more easily and understand the context and nuance of a young person’s journey. Where information gets lost or incorrectly recorded, vital information disappears with it. “It’s certainly beneficial to have all of the information and all of the contacts,” concludes Louise. “Having a rich seam of data makes it much easier to find information, too. Then, you can see where that information has come from, with an evidence base and contacts of who recorded what. If we have any questions, it makes it very easy to follow up with that person. There’s also increased confidence in the data that we have as a result of the improved accuracy of the data being added to our system. With accuracy and a trail of contacts, it makes each young person’s journey more transparent to us.” 

For more information on how ChildView supports the vital work of youth justice teams across the UK, please visit: www.caci.co.uk/childview

How Milton Keynes Youth Offending Team uses ChildView to support its work

How Milton Keynes Youth Offending Team uses ChildView to support its work

Milton Keynes Youth Offending Team, is part of the multi agency youth justice partnership involving Milton Keynes Council, Thames Valley Police, Education and Public Health. The team started using Childview, a specialist youth offending information system from CACI, in 2009 following migration from their previous YOIS System. ChildView is used by 31 multi-disciplinary workers at Milton Keynes Council and the team has 160 active youth justice cases at the time of writing.

The administrative problems solved by ChildView

The youth offending team at Milton Keynes Council was using a system of spreadsheets to process and record information. The team realised that ChildView would provide an integrated whole service recording and reporting solution to reduce and enhance oversight across cases and referrals into and out of its services.

“ChildView can hold all the information we need and allow active case management,” says Phil Coles, business support and information manager Milton Keynes Youth Offending Team. “I know some YOTs have issues with aspects of their youth justice work. Generally, I’ve found that these issues are due to not having defined business processes that support (or dictate) the recording practices. Using a system like ChildView helps us to define our processes, whilst maintaining all our data in the same place.

“An example of this is the active management of referrals. By using agreed recording processes, we can instantly see which cases have been referred to another agency and whether they have reviewed the case yet. Then we can see when they accept the case and, finally, when they complete their work for us. This used to be managed in folders, then it became a spreadsheet but – by mapping processes – we’ve now got it to a single ChildView report which has a variety of views for each type of referral and whether it’s active or complete. We are also able to provide all stats that have been requested so far, for example how many referrals have been made (or completed) during a period.”

The benefits of ChildView for Milton Keynes YOT

With the underlying importance of the complex work increasingly undertaken by the team, this enables risks to be captured and tracked in near real time. This facilitates holistic case formulation to ensure vulnerable young people in the area achieve the best possible responses. To this end, being able to report on activities and send and receive data in real time on incidents and cases is vital.

“I have written about 150 reports, many of which contain multiple views, and have found that ChildView facilitates rapid access to information for myself and my team,” says Phil. “We are able to store all necessary documents within the application and are just looking at using the communications module to further integrate letters into the system.”

The built-in reporting functionality with ChildView has also supported Milton Keynes YOT. “It’s sufficient for the majority of requests that we receive,” adds Phil. This helps to meet the needs of the service, with relevant information being captured in locally defined reports. ChildView also uniquely transfers whole case data records between YOTs, which increases accuracy and reduce the effort and risk in tracking young people as they move localities.

Being able to send, receive and view the full case management story, relational history and context swiftly and securely makes it much easier for YOTs to engage and formulate an effective response with incoming cases, crucially being able to understand what has happened to each young person.

Support from CACI’s specialist team

“I’ve always had excellent support from CACI when making queries or raising issues,” says Phil. “There have been times when a resolution has taken time to arrive at, but they are always worked on. Raising queries is very straightforward and the team is always quick to respond.”

CACI, as part of its service level agreement, responds to all ChildView support queries received by 5pm on the same day. This helps to give clarity over how issues and queries are dealt with and to provide practical next steps. The support desk is staffed from 9-5:30 Monday to Friday, with 24/7 web support call logging available as well.

“Myself and my team have generally found ChildView to be easy to use,” concludes Phil. “It does what we need it to do and I haven’t been asked for anything that I haven’t been able to get out of the system.”

For more information on ChildView, please visit: www.caci.co.uk/childview

Why do you need a Zero Trust Model?

Why do you need a Zero Trust Model?

Traditional cybersecurity paradigms focus on network-based security strategies like firewalls and other tools to monitor user activities on the network. However, digital transformation and social environment factors have driven new cybersecurity strategies to focus on protecting end-users, assets and resources. This is the prototype of the ‘Zero Trust Model’.

In this new blog series, I’ll explain the reasons for transforming to a Zero Trust Model as well as the benefits and challenges of implementing Zero Trust Network Architecture. I’ll also cover how you might efficiently implement it.

What is a Zero Trust Model?

But first things first, what exactly do we mean by ‘Zero Trust’? Well, Zero Trust is not a technology, it’s a security model with a set of guiding principles for workflow, system design and operations that can be used to improve the security posture of any classification or sensitivity level.

Zero Trust is a transformative journey rather than a complete replacement of technology. Ideally you should evaluate the security risks in your business model to before you start shifting to Zero Trust. Yet, during the COVID-19 pandemic, many companies were forced to quickly change their central-breakout remote access VPN to a Zero Trust using cloud-based equivalents such as Netskope, Zscaler or Tailscale. They then had to progressively apply Zero Trust principles, process changes and technology solutions that protect their data assets and business functions as they went along.

Now, they are often left having to operate in a hybrid Zero Trust/ perimeter-based mode while continuing to invest in IT modernisation initiatives and improve business processes – not ideal.

Why do we need a Zero Trust Model?

In the new working environment that we find ourselves, we need to look at a Zero Trust Model for a number of reasons:

Remote work and BYOD policy for employees
In the post-COVID era, remote working and a BYOD (Bring Your Own Device) policy have become the new normal. The “castle-and-moat” network security model in fixed office locations and employer-owned devices cannot cater for every employee’s needs. More staff are working out of the office using their own devices and Wi-Fi networks which are less secure in a remote working environment than in an office. You need to take a micro-level approach to authenticate and approve every access request in your network to make sure it’s secure.

Digital transformation of customer experience
The customer journey is not limited to retail shops and customers are rapidly shifting their buying behaviour to the internet and mobile applications. Thousands of personal computers and devices across the globe connect to company networks to complete transactions. This means that identity verification is critical for customers before they access their confidential data.

The high complexity of network architecture
In response to the high demand for rapid and secure access to data, anytime and anywhere, your company may operate several internal and external networks. These can include on-premises systems and cloud environments. Perimeter-based network security is then insufficient once attackers breach it whereas Zero Trust Network Architecture adds additional security layers to identity verification, such as a least-privilege access control, multi-factor authentication and endpoint verification for improved security.

Zero Trust forms a strong defence line against cyberattacks

With all these social and network environment changes, the opportunity for your network to be attacked is much greater. The median cost of cyberattacks in the UK rose 29% in 2022 with an average attack costing a business nearly £25,000.

Legacy systems, regulations and compliance practices are no longer sufficient amid increasingly sophisticated threats. Cloud environments are attractive targets for cybercriminals aiming to destroy and steal confidential business data. Amongst these different types of cyberattacks, ransomware tactics have evolved and become the most significant threat.

The Zero Trust Model is another approach to combat the emerging threat landscape which legacy security systems and perimeter approaches can no longer adequately mitigate.

How CACI can help

CACI has cybersecurity experts who can improve the protection levels of your business. Capabilities include Zero Trust Network Architecture, Threat Analytics, Systems Hardening, Network Analytics and Next Generation Firewalls. We perform risk assessment to advise clients on what comprehensive cybersecurity they need.

We also have experts in Cloud Network on-ramp Connectivity such as Microsoft ExpressRoute, AWS DirectConnect, GCP Cloud Dedicated Connect) and SASE/SdP/VPN technologies such as Zscaler and Tailscale.

In my next blog, I will be discussing the benefits and the challenges of implementing Zero Trust Network Architecture. However, if you want the whole story, have a read of our Zero Trust Model whitepaper where we cover everything in these blogs and more. Download your copy now.

 

Notes:
[1] Zero Trust Network Architecture (nist.gov)
[2] Will Rishi Sunak reassess UK cybersecurity policies? (openaccessgovernment.org)

How to find the right IT outsourcing partner

How to find the right IT outsourcing partner

Looking to work with an IT outsourcing provider? Finding the right partner to deliver your requirements can be a tricky and time-consuming process. But, done right, a successful outsourcing relationship can bring long-term strategic benefits to your business. We asked our experts to share their top tips on how to find the right IT outsourcing partner.

Evaluate capabilities

Having the right expertise is the obvious and most essential criterion, so defining your requirements and expectations is the best way to start your search.

When it comes to narrowing down your vendor choices, it’s important to consider the maturity of an organisation as well as technical capabilities. “The risk of working with a small, specialised provider is that they may struggle to keep a handle on your project,” warns Brian Robertson, Resource Manager at CACI. Inversely, a larger organisation may have the expertise, but not the personal approach you’re looking for in a partner. “Always look for a provider that demonstrates a desire to get to the root of your business’s challenges and can outline potential solutions,” Brian advises.

Find evidence of experience

Typically, working with an outsourcing provider that has accumulated experience over many years is a safe bet; however, Daniel Oosthuizen, Senior Vice President of CACI Network Services, recommends ensuring that your prospective outsourcing provider has experience that is relevant to your business, “When you bring in an outsourcing partner, you want them to hit the ground running, not spending weeks and months onboarding them into your world.” Daniel adds, “This becomes more apparent if you work in a regulated industry, such as banking or financial services, where it’s essential that your provider can guarantee compliance with regulatory obligations as well as your internal policies.”

So, how can you trust a provider has the experience you’re looking for? Of course the provider’s website, case studies, and testimonials are a good place to start, but Daniel recommends interrogating a vendor’s credentials directly, “A successful outsourcing relationship hinges on trust, so it’s important to get a sense of a vendor’s credibility early on. For example, can they demonstrate an in-depth knowledge of your sector? Can they share any details about whom they currently partner with? And can they confidently talk you through projects they’ve completed that are similar to yours?”

Consider cultural compatibility

“When it comes to building a strong, strategic and successful outsourcing partnership, there’s no greater foundation than mutual respect and understanding,” says Brian. Evaluating a potential provider’s approach and attitudes against your business’s culture and core values is another critical step in your vetting process. As Daniel says, “If you share the same values, it will be much easier to implement a seamless relationship between your business and your outsourcing partner, making day-to-day management, communication and even conflict resolution more effective and efficient”.

While checking a company’s website can give you some insight into your prospective provider’s values, it’s also worth finding out how long they’ve held partnerships with other clients, as that can indicate whether they can maintain partnerships for the long-term.

However, Daniel says, “The best way to test if a provider has partnership potential is to go and meet them. Get a feel for the team atmosphere, how they approach conversations about your challenges, and how their values translate in their outsourcing relationships.” Brian adds, “Your vision and values are what drive your business forward, so it’s essential that these components are aligned with your outsourcing provider to gain maximum value from the relationship.”

Assess process and tools

Once you’ve determined a potential outsourcing provider’s level of experience and expertise, it’s important to gain an understanding of how they will design and deliver a solution to meet your business’s needs. “It’s always worth investigating what tech and tools an outsourcing provider has at their disposal and whether they are limited by manufacturer agreements. For example, at CACI, our vendor-agnostic approach means we’re not tied to a particular manufacturer, giving us the flexibility to find the right solution to meet our clients’ needs,” Daniel explains

Speaking of flexibility, determining the agility of your potential outsourcing provider’s approach should play a role in your selection process. “There’s always potential for things to change, particularly when delivering a transformation project over several years,” says Brian, adding “that’s why it’s so important to find a partner that can easily scale their solutions up or down, ensuring that you’ve always got the support you need to succeed.”

Determine quality standards

Determining the quality of a new outsourcing partner’s work before you’ve worked with them can be difficult, but there are some clues that can indicate whether a vendor’s quality standards are in line with your expectations, says Daniel, “A good outsourcing partner will be committed to adding value at every step of your project, so get details on their method and frequency of capturing feedback, whether the goals they set are realistic and achievable, and how they manage resource allocation on projects.”

Brian also recommends quizzing outsourcing providers about their recruitment and hiring process to ensure that you’ll be gaining access to reliable and skilled experts, “It’s easy for an outsourcing provider to say they have the best people, so it’s important to probe a little deeper. How experienced are their experts? How are they ensuring their talent is keeping up to date? What is their process for vetting new candidates? All these questions will help to gain an insight into an outsourcing provider’s quality bar – and whether it’s up to your standard.”

Assess value for money

For most IT leaders, cost is one of the most decisive factors when engaging any service; however,
when looking for an IT outsourcing partner, it’s critical to consider more than just a provider’s pricing model. “Contractual comprehensiveness and flexibility should always be taken into account,” says, Brian. “A contract that is vague can result in ‘scope creep’ and unexpected costs, while a rigid contract can tie businesses into a partnership that’s not adding value.” He adds, “Ultimately, it comes down to attitude, a good outsourcing provider can quickly become a great business partner when they go the extra mile.”

Daniel agrees and advises that IT leaders take a holistic view when weighing up potential outsourcing partners, “Look beyond your initial project, or resource requirements and consider where your business is heading and whether your shortlisted providers can bring in the skills and services you need. After all, a truly successful outsourcing partnership is one that can be relied on for the long haul.”

Looking for an outsourcing partner to help with your network operations? Contact our expert team today.

UX: Let’s make tech accessible

UX: Let’s make tech accessible

disabled tech

It’s not a new concept: from lifts on the Underground to ramps into public buildings, we’re all used to seeing the real-life equivalent of accessibility features as we go about our day. Airbnb hosts are encouraged to list any issues or benefits on their ads. Public buildings and new built spaces are expected to take disabled visitors’ needs into account as well.

However, challenges still prevail, both in technology and in real life. Despite the fact that over 10 million people (over 18% of the population) have a limiting long-term illness, impairment or disability, they are often simply forgotten.

As in life, so it is online

Like restaurants that have invested in wheelchair ramps but hidden them at the back of the building, lots of ‘real life’ and online places are technically accessible. But the extra time and effort needed to use it means the problem isn’t really being solved and disabled people are still being excluded.

In fact some measures seem to have been taken with an insultingly thoughtless, check-box mentality. In June 2022, Wireless Festival at Crystal Palace decided to pitch the accessible viewing platform at the top of a hill to save money, requiring patrons’ friends to push their wheelchairs up a 10% incline or carry them! I wonder how many websites are similarly inconsiderate of actual needs for certain users.​​​​​​​​​​​​​​

On the other hand, treasured old buildings and ancient pieces of tech alike were often simply not built with accessibility in mind. When visiting Madame Tussauds with a friend who walks with a stick and finds stairs agonising, we used a total of 4 randomly located lifts to access 5 floors. They required us to weave through exhibits the wrong way and wait around for staff help. As a mind-bending response to a building that’s almost two hundred years old it’s better than nothing, but nobody would design it that way if they’d thought about accessibility first. ​​​​​​​

Online leads the way

Online systems that are built first and add accessibility only once the product is complete face similar risks. The infrastructure of our lives is no longer solely built around physical spaces: it’s built around online ones too, where we now conduct every conceivable part of our lives. According to a Deque survey and research, 73% of accessibility professionals saw an increase in accessibility awareness on digital channels throughout the pandemic. Not being able to access these spaces can hugely restrict access in their lives, restricting them from opportunities. ​​​​​​​

Actively discriminating against anyone is of course illegal – and there can be hefty fines and reputational damage for not adhering to WCAG standards. What’s often forgotten is that systems that don’t think about disabled users ultimately exclude by default. It’s worth remembering that anyone can become disabled, even if it’s just a broken arm that restricts typing for six weeks or an ear infection that leaves you temporarily deaf. More than that, accessibility features benefit all users such as captions on video content benefitting a user in a noisy office. We all win when accessibility is considered. ​​​​​​​

Value UX and value your users

Code is easier to rework than bricks and mortar. But what’s easiest of all is building things right from the beginning . Understanding that all users need an equally positive experience is crucial.

Karen Hawkins of eSSENTIAL Accessibility, the world’s #1 Accessibility-as-a-Service platform, has emphasised the importance of making sure ‘foundational elements are as accessible as possible, these foundational elements being colours, but also typography, small atoms and molecules, like your buttons and your links and your text boxes – they get used everywhere’.

Adopting the right mindset where accessibility is the default and not a bolt-on is an ideal way to start. Don’t stop at whether it is possible for a disabled user to complete a task – also consider how easy and fast it is too. ​​​​​​​

Ask your customers about their disabled user base and see if you can speak to disabled users as part of gathering requirements. However, they may not have the best visibility of such users – in fact the customer may not have put any thought into accessibility at all. This can be an area where tech developers can provide leadership as well as creative ideation about the potential needs of unknown users.

Specific accessibility features might include using subtitles or transcripts for all video content. Or it could involve using a high contrast ratio between text and background, relying on more than just colour to convey important information. Furthermore – do things like screen readers work accurately? Will the screen flash causing fits in some users? How about automatic log outs due to inactivity – which could impact users with movement issues, who may take longer completing forms? Will the complexity of any language be difficult for some users? Considering and including these features from the onset as well as testing them on users with disabilities can save time and money later on.

​​​​​​​​​​​​​​Accessibility is about so much more than speaking to any one user: it’s about challenging your expectations of who will ultimately end up using your product. Tim Berners-Lee, the intervenor of the internet, said that ‘The power of the Web is in its universality. Access by everyone regardless of disability is an essential aspect.’ A software product is only as good as its end users find it to be: design that needlessly excludes potentially 20% of the working population should be seen as a failure. Design that includes everyone is the ultimate success.
To find out more about our capabilities in this area, please check our Digital Design, Build & Operate page.

How much design is enough?

How much design is enough?

Imagine two people are decorating houses, side by side. One wants every detail mapped out in advance, researching all the possibilities and putting in a massive order before seeing anything in person. The other prefers a more spontaneous approach. They might have a vague outline of the sort of house they’d like, but they’d prefer to make it up as they go along.

As things come together, the first person realises that nothing they’ve committed to quite looks or goes together in the way they imagined and there’s no real turning back. The second has a rather more chaotic process, but everything that goes into their house is absolutely fabulous. It’s only at the very end that they realise they have painted the same room seven different colours throughout the process.

These ways of thinking shape more than just our interior décor – they crucially apply to how we understand tech and software development. Committing to a large amount of architecture before kicking off is no longer considered best practice, but including it is still vitally important. Architects, developers and potential clients are left to decide – how much design is enough?

Getting it wrong

Without architecture, the bigger picture quickly gets lost. For instance, a developer might be working on new functionality that will be shared to various departments. Developing it for one customer in one department is fairly straightforward. However – have they considered all of the flows and interactions with other parts of the business? Is there a potential to consolidate some functions into a shared one stop shop service?

Architecture

Good architecture provides an awareness of dependencies, interactions and other contextual drivers, like legacy systems and stakeholder mapping. If you want something that’s more than the sum of its parts, it’s essential.

Too much upfront design though, creates a very long feedback loop where you’ve built half a system before you have any clue if any of it works. In the worst cases, “solutioneering” takes over and the design itself – sometimes pre-issued by the client, with tech already decided – becomes more important than understanding and meeting the requirements. By that point, whether or not it actually benefits the end user has probably been completely forgotten.

Most often, things go wrong when architects and developers don’t talk to each other. Each withdraws into an ivory tower and fails to communicate or remember the benefits of collaboration. As a formalised process, architecture can become too distant from the reality of building it and too rigid to flex to new information that arises from agile iterations.

How do we get it right?

​​​​​​​Agile has taken over – and architecture must flex to fit in. This means greater levels of collaboration, working hand in hand with development teams.

working hand in hand

Breaking up the architecture approach so that it’s completed in segments that align with actual development can keep the process one step ahead of the actual build while ensuring it’s still adaptable. This can also allow both sides of the work to both validate and verify: build the right thing via architecture that focusses on big picture goals, the right way through feedback focussed iterations. Features will not just be effective in their immediate goal but in the broader context of the software.

Architectural principles and patterns can also be vitally helpful by collaboratively establishing the broad guidelines for architectural decisions that will be made later on. To go back to our house designing metaphor, you might not decide exactly what furniture is going into each room, but you might decide on distinct colour schemes that harmonise with each other.

Together, principles and patterns keep services and features aligned and consistent. Not every detail is planned out, but there will be a clear understanding of how things like naming conventions and interactions will be done and how users will be authenticated. That can be easily replicated in the future while still leaving flexibility around it.

At its best, architecture works in harmony with other delivery roles, working toward the same goal and focussing on software that solves problems for the client and the end user. Balancing development and architecture means finding effective methods to maximise both capabilities and harmonising with each other. In this, as in most other things, teamwork and collaboration is key.

To find out more about our capabilities in this area, check out our IT Solution Architecture & Design page.

 

Digital Twin: Seeing the Future

Digital Twin: Seeing the Future

 

Predicting what’s coming next and understanding how best to respond is the kind of challenge organisations struggle with all the time. As the world becomes less predictable and ever-changing technology transforms operations, historical data becomes harder to extrapolate. And even if you can make reasonable assumptions about future changes, how they will impact on the various aspects of your business is even more problematic.

Decision makers need another tool in their arsenal to help them build effective strategies that can guide big changes and investments. They need to combine an understanding of their setup with realistic projections of how external and internal changes could have an impact. A Digital Twin built with predictive models can combine these needs, giving highly relevant and reliable data that can guide your future course.

The Defence Fuels Prototype

Using Mood Software and in collaboration with the MOD’s Defence Fuels Transformation, CACI built a digital twin focused on fuel movement within an air station. With it we aimed to understand the present, but also crucially, to predict the near future and test further reaching changes.

We used two kinds of predictive model that can learn from actual behaviour. For immediate projections, we implemented machine learning models that used a small sample of historical data concerning requirements for refuelling vehicles given a certain demand, allowing an ‘early warning system’ to be created.

However, we knew that the real value came in understanding what’s further ahead, where there is a higher risk of the wrong decision seriously impacting the success of operations. We adapted and integrated an existing Defence Fuels Enterprise simulation model, Fuel Supply Analysis Model (FSAM), to allow the testing of how a unit would operate given changes to the configuration of refuelling vehicles.

Functions were coded in a regular programming language to mimic the structural model and to mimic the kinds of behaviour that is evidenced through the data pipeline. As a result, we are able to make changes to these functions to easily understand what the corresponding changes would be in the real world.

This allows decision makers to test alternative solutions with the simulation models calibrated against existing data. Models informed by practical realities enables testing with greater speed and confidence so you have some likely outcomes before committing to any change.

 

What does this mean for me?

Digital Twins are extremely flexible pieces of technology that can be built to suit all kinds of organisations. They are currently in use in factories, defence, retail and healthcare. Adaptable to real world assets and online systems, it’s hard to think of any area they couldn’t be applied to.

Pairing a digital representation of your operations, processes and systems with predictive and simulation models allows substantial de-risking of decision making. You can predict what will happen if your resourcing situation changes, and plan accordingly; you can also understand the impact of sweeping structural changes. The resulting data has been proven against real-world decisions, making it truly reliable.

Time magazine has predicted that Digital Twins will ‘shape the future’ of multiple industries going forward and I think it’s hard to argue with that.

If you’re looking for more on what Digital Twin might be able to do for you, read ‘Defence Fuels – Digital Twin’. In this white paper we show how we’re using Digital Twin to make improvements worth millions of pounds.

For more on Mood Software and how it can be your organisation’s digital operating model, visit the product page.