article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Last week I presented a session at ASTD TechKnowledge entitled eLearning 2.0 - Applications and Implications. It could just as easily have been called Web 2.0 Privacy / Confidentiality - Limit the visibility. eLearning Trends Enterprise 2.0 Applications in Learning. No problems getting things here.

Wiki 105
article thumbnail

A Speedbump for Social Learning

eLearning Weekly

Whether you call it Learning 2.0, eLearning 2.0, If you’re not careful, you may end up accidentally leaking confidential and/or proprietary information out to the public. So if you’re using these tools to store or communicate sensitive information, you may be in for a big (bad) surprise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Firewalls and Security in Software as a Service

Tony Karrer

while the risk is probably low that you will actually have information leak out: Try to limit content to information that would cause little damage to the company if it were made public. What if you need to work with content that is confidential and would potentially represent a risk? Keywords: eLearning 2.0 , Web 2.0

Firewalls 100
article thumbnail

Top Posts from August - Augmented Reality - Social Learning

eLearning Learning Posts

Nuts and Bolts: Brain Bandwidth - Cognitive Load Theory and Instructional Design by Jane Bozarth - Learning Solutions Magazine , August 2, 2010 Designers often overload learners with information, hurting learning and learner motivation, and thereby undercutting the very thing we say we want to accomplish. With growth, the simplicity ends.