Trending Sources

30+ Ideas for eLearning Portfolio Samples

Experiencing eLearning

What if you can’t use any samples of your existing work due to confidentiality or security requirements? For example, the Instructional Designer or eLearning Developer demo in my portfolio is based on an activity I originally created for a health care client. For portfolio samples, you don’t generally need to create a full-blown, 60 minute course.

Are confidentiality concerns holding back the e-learning industry?

From the Coleface

However, for me the root cause is the difference in approaches to confidentiality. The e-learning industry has an ambivalent approach to confidentiality. When potential customers ask vendor for examples of e-learning they’ve designed, this could be for a variety of reasons: 1. Rating systems (e.g. stars from Amazon, likes from Facebook). Proof. But of what? doubt it.

I Believe in the Value of Connectedness

Tom Spiglanin

While building these professional networks, we still protect confidential information as we have for years, but a great many aspects of work can be enhanced by interacting with others: new ways of approaching problems, discussing abstract concepts, and shared challenges with common tools are just three examples. This is the nature of healthy organizations. Thanks for reading!

Bringing Sass to Safety: Must-Watch Music Video from Virgin America

OpenSesame

Using examples such as showing up to work only when you have a presentation or someone to flirt with, viewers learn appropriate behavior through the extreme examples of what not to do. Confidential Information: Mission Possible! . The classic image of a smiling flight attendant demonstrating how to buckle your seat belt just got a major overhaul. Send them on a mission!

The State of E-Learning in Australia in 2012

Connect Thinking

One excellent example is Ryan Tracey and his blog E-Learning Provocateur. think the industry needs a voluntary Code of Practice that outlines guarantees in quality, confidentiality and copyright. Question from a client: We’re an organisation of about 1000 people and we don’t have any e-learning. How far behind are we? This is a shame.

Agile 104

The State of E-Learning in Australia in 2012

Connect Thinking

One excellent example is Ryan Tracey and his blog E-Learning Provocateur. think the industry needs a voluntary Code of Practice that outlines guarantees in quality, confidentiality and copyright. Question from a client: We’re an organisation of about 1000 people and we don’t have any e-learning. How far behind are we? This is a shame.

Agile 104

Do You Really Know the Terms and Conditions of Your Purchased Media?

E-learning Uncovered

For example, the standard license for iStock lets you use the image in most e-learning courses. Fiverr is a good example of this. Using a NDA lets the voice talent know that the proprietary information he or she learns from recording the course needs to stay confidential. “Check the box to agree to the terms and conditions.” Click. What’s the risk really?

Show Your Work!

E-learning Uncovered

When we teach our e-learning development courses, our students ALWAYS ask where they can go to see additional samples of a certain technique or authoring tool. The more instructional designers are able to share ideas, high-quality examples, and innovations, the more we can push ourselves and each other forward. But having a wide variety of online samples from a number of sources can be another — sometimes easier — way to get on the same page about what you want. If no one is willing to share samples, it is difficult to gain this perspective.

Writing & Grammar: Punctuation and Compound Sentences

I Came, I Saw, I Learned

" Rather than punctuating by the structure of the sentence (the rule states that we should separate the two parts of a compound sentence with a comma followed by a conjunction: , and ), his rewritten examples reflect the cadence of training speech: Right-click the folder and, when you see the shortcut menu, choose Create Shortcut. by Jennie Ruby. Together, they now clock in at the 5.5

Hiring a Technology Consultant

Web Courseworks

Is confidentiality an issue with your project? Yep, you will make them sign a confidentiality agreement; you can’t be too safe. For example, if you are the client you might ask the consultant to do the following things. Each of these examples require you to know what you are asking the consultant to do. Finding the Right Hired Gun: A Conversation with Elaine Biech.

JIT Performance Support Mobile App Development

Upside Learning

For example, a client might want to extend the functionality of an existing information system to the iPad/iPhone. For example, if you have chosen to use multi-touch gestures as part of your interface design, this automatically eliminates devices that don’t support touch. When developing applications for just-in-time performance support, here are some items I keep on my checklist.

Doodle.com: Hassle-Free Scheduling

E-learning Uncovered

However, if you have more advanced needs, there are a few settings you can customize, such as keeping guest responses confidential and limiting the number of options a person can select. In our sample scenario, Jack, Carmen, and Kyle all participated, and there is one time that works for all three of them: Thursday from 2:00 to 3:00. You receive two of the three responses.

Poll 34

How Game-based Learning Can Assist Various Compliance Programs

CommLab India

For example, a course with a game-based scenario is designed, which shows a room with exposed wires that may cause electric shocks. IT security compliance requires IT managers to backup, encrypt, store, and safeguard their confidential data. Compliance training is a huge mountain for Chief Compliance Officers to conquer, an unfamiliar, hostile terrain. Let us see which ones can.

Only 14% think that company training is an essential way for them to learn in the workplace

Jane Hart

And it becomes quite apparent now (if it wasn’t before), that for this sample of respondents, internal documentation and training initiatives are the least important ways of learning for them, and that their involvement in social and collaborative activities, as well as organising their own learning initiatives are the main ways they learn. Click on the image for a larger version.

Sorry Honeywell Employees. It's my fault!

eContent

For obvious reasons of confidentiality, I can not link my Honeywell work. Format: Category: Work Project | Start Date | Related Blog Example. Earlier this afternoon I installed a super new cool app on my Google Nexus 10, Look to the Future. The app allows me to examine the future and understand the collective net effect of my actions taken as a Honeywell senior technologist. Media 2.0

How to Ensure Compliance Training is Not Merely a “Check-the-box” Activity

CommLab India

Assume you noticed a few hiccups in your Confidential Information or Conflicts of Interest compliance in the past; you may want to intensify the training in those areas.  . Keep it precise through case studies and examples. Employees learn best when they are given simple and clear examples of how to comply with. It has much more to it than a mere ‘read and sign’ approach.

Social learning is what managers do already

Learning and Working on the Web

Q3: How can any of this really be implemented effectively in an organization that is bound by confidentiality and regulatory red-tape such as healthcare? For example, according to a UK white paper on  How Managers Learn , respondents reported that their most-used as well as the most effective informal learning method was:  informal chats with colleagues. Feel free to weigh in.

An Honest Assessment of Adobe Captivate 6 [First Impressions]

mLearning Revolution

feel like the team quickly scrambled to make sure the next version of Captivate could include some of the same features that Storyline users have come to love since the launch, for example Interactions, Themes, Actors, etc. Here are some examples. First off, congratulations to my old team at Adobe for launching Adobe Captivate 6. Haphazard Effort. Conclusion. Send to Kindle.

Learning: Playing the Blame Game

Learning Rebels

Example: jump on an L&D or education based twitter chat and ask, “What’s so bad about classroom style learning, I happen to love it.” After reading her post, and after having some confidential discussions with new twitter users, I knew it wasn’t just me. When did shaming the learner become okay? We have a customer, and the customer is the Learner. Is this our intent?

Games 45

Why mastering personal knowledge is critical to success

Learning and Working on the Web

Examples include lawyers replaced by software, bank staff replaced by websites, travel agents replaced by apps, and soon drivers will be replaced by robots. How do we deal with time and resource constraints as well as confidentiality issues? This is the synopsis of a webinar for TP3 Australia I presented last evening (my time). Automation is ending the industrial era.

A comparison between LMS and CMS

TalentLMS

First, some examples so you know what we’re talking about: “ TalentLMS “, the product whose blog you’re reading, is a good, nay great, example of an LMS. Microsoft’s “ Sharepoint ” is an example of the former. “ WordPress ” is the most popular example of the latter. Sound quite similar? Let’s get integrated.

Are You Believable?

CLO Magazine

Keeping information confidential demonstrates integrity and strengthens your relationships. For example, my 7-year-old grandson, Alec, tested my patience recently, and in a moment of frustration, I yelled at him and walked away. powerful example of this showed up in the news recently when Mike Jeffries, the CEO of Abercrombie & Fitch, explained why his stores do not offer plus sizes. Being believable is about behavior, not just telling the truth. Having the humility to recognize and admit that you’re wrong will give others faith in your judgment. In “Trust Works!,”

Trust 30

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

For example -. For sure there may well be questions of a more confidential nature that workers won’t feel they can ask or  discuss outside their own organisation, which means there is likely a need to support this kind of interaction between colleagues internally. Tweet. Of course, this is not really new; this is what people have always done in the workplace.

Trust 40

In a World of Info Overflow, Embrace Lean Learning

CLO Magazine

Examples in Innovative Education Many companies are experimenting with the lean model. large credit union that requested confidentiality struggled to help its call-center staff gain a confident understanding of the breadth and depth of the organization’s mortgage services. Another example of lean in action comes from the business of retail wireless technology. Companies should tighten their learning efforts as much as possible to meet individual need and information overload. Rather, the answer lies in creating and consuming learning in a much leaner fashion.

Role of E-learning in Creating an Ethical Workplace

CommLab India

So they need to lead by example. For that, you need to set an example by behaving in an ethically upright manner. For example, if you want to train your employees on the treatment of confidential information, you can show them a video that is more appealing than text being read out. What if I say an ethical workplace leads to increased productivity? Would you agree?

The Future Workplace Embraces Freelancers

Learning on the Leading Edge

Kaggle, for example, provides a competition platform for top analytics talent. If you are nervous about turning over your organization’s sensitive data, you can require individuals to sign confidentiality agreements through a Masters Competition. You may need to modify your contracts, confidentiality and intellectual property agreements, insurance requirements, work schedules (for different time zones), and payment terms to accommodate freelancers. UCLA’s annual HR Roundtable Retreat featured an interesting discussion of future workforce trends. Editing.

FREE: Corporate eLearning Audio Script Review

Corporate eLearning Strategies and Development

She'd like to review a few of your scripts and use them as examples during her session. If you're planning on attending Scriptwriting for Engaging eLearning and would like to have a portion of a script you're working on reviewed and used as a before and after example in the session, please send your scripts* by October 14 to sarah@sound80.com." Also, be sure to change any business names or confidential information to something generic. Sarah Kesher, from the Grammy award winning audio production facility Sound80 , is looking for audio scripts. It doesn't hurt. promise.

Letting Go of the Need to Know Everything: Use Context Setting Learning Objectives

Vignettes Learning

For example, story-based learning objectives focus on acquiring knowledge in small steps. Preview the two examples below. Example 1 - Probing Questions Example 2 - Confidential Documents What is the difference between the static learning objectives and Story-Based Learning Objectives? This is an example of what we dump on learning lessons.

Reinforce Learning Through Storytelling

Mindflash

It includes real life examples the participants can relate to, picture first hand and translate to action. Confidentiality is ensured by changing names and details when necessary. Business news, and often headlines of the day, are great sources of real world examples. Business and non-profit leadership and product successes provide ample examples of CEOs doing the right thing.

What to do if they just want “awareness”

Making Change

For example, a client might say that they want to increase awareness of the information security policy. To the above questions, they might answer: “We know people aren’t aware of the policy because we’ve had some leaks of confidential information about clients and employees.” “We just need everyone to be aware of the policy,” your client says.

Customer Video Stories Serve Multiple Purposes

JPL Learning

Many business customers have policies against endorsing vendors and there may be competitive or confidentiality issues that prevent them from participating. For example, JPL client Modjeski and Masters, a bridge engineering, inspection and design firm, must frequently overcome geographical, weather and scheduling obstacles to capture their customer stories. When you capture a story about the impact of your product or service on a customer, you have a valuable asset you can use for training, internal communications and marketing. Logistics, timing and even safety may be a barrier.

Virtual (Learning) Reality

CLO Magazine

For example, service provider Sodexo — which has 420,000 employees around the world — posted an annual savings average of $1.5 When confidential information is being shared, however, social learning does not occur through social media. For example, the Institute of Management Accountants provides both in-person and virtual learning. In-person learning should remain a significant part of any development program, but virtual learning is slowly becoming the new normal. The challenges faced by learning and development leaders have never been more complex.

3 Visual Design Tips to Make Your Presentation Slides Pop

The Learning Generalist

Take a look at some of the examples I've put up for you above. I've also added one of my presentations to this post (nothing really confidential), so you can see how some of this applies for real, business presentations. Cammy Bean is hilarious - and she's also just spot on. Some months back she wrote about her newly discovered syndrome - SoMeFat. You should see the slides here.

Apple’s Secret Training Ground

CLO Magazine

Experts say it’s not uncommon for companies to shy away from disclosing information, and Apple serves as a primary example of a firm unwilling to raise the curtain. Even information regarding learning and development can be kept confidential among team members, Bersin said. Apple keeps a tight lid on what goes on in its learning organization, Apple University. Apple Inc.’s ’s learning organization, Apple University, grabbed headlines last month when Morten T. It’s unclear what Hansen will do at Apple. An Apple spokeswoman declined to comment.

Apple 18

SharePoint in Office 365: the Good, the Bad, the Brilliant and the Ugly

SharePoint and Assessment

For example, I run our annual data security competency tests in my company, and use a SharePoint list to track when people are due for a test (see here for more on this). If you have confidential data or material you want to hide from learners, it’s easy to do so. What is Office 365 SharePoint Online like when you use it for real? And what potential application does it have for helping in learning? The Good. Most of the good points come from standard SharePoint: Make site and pages easily. Set up lists to track things. Search. Security. Workflow is available without coding.

Free eBook on Learning Strategies

aLearning

We could use your voice to help reach a reliable sample! All responses are confidential. At over 100 pages, with eight strong case studies, the Masie Center has compiled an excellent overview of how learning leaders at major companies developed their learning strategies. Best of all, it’s FREE as “an open source eBook.&# You can find it (and other great ebooks) here. learning strategy develops the learning culture within the organization that helps make judgment calls that balance new and existing technology against what you can afford. So how do they do this?

eBook 17

Challenged to Create Consistency? Consider Performance Calibration Meetings

Learning on the Leading Edge

For example, one major retailer relies on the data it collects to determine if performance ratings accurately reflect the results in individual stores and if individual employees are able to influence store results. Calibration meetings should begin with a review of what the different performance ratings mean (see our case study on Childrens Healthcare of Atlanta , Figures 12 & 13, for good sample descriptions). First, they must ensure that all managers involved in the meeting understand that the conversation must be confidential – this cannot be overstated.