article thumbnail

Worried About Course Security? Start With Your Website.

LearnDash

Security is a complicated topic, and there are many steps beyond those we are about to discuss that may apply to your specific situation. What’s the most important thing to look for in a good web host? The best defense is to do your due diligence when choosing a web host. Provides malware scanning and firewall protection.

Security 343
article thumbnail

Firewalls and Security in Software as a Service

Tony Karrer

One of the interesting outcomes of my recent course - Collaborative Learning Using Web 2.0 One of the interesting outcomes of my recent course - Collaborative Learning Using Web 2.0 Thus, while we are excited about wikis, blogs, discussion groups, etc., It's still better than having to install software behind the firewall.

Firewalls 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web 2.0 - Consumer vs. Enterprise Use

Tony Karrer

that discusses the difference in how Web 2.0 I've talked about adoption of web 2.0 tools in the enterprise before in this blog: Adoption of Web 2.0 Facilitating Adoption of Web 2.0 Tools Emergence or Big System Web 2.0 Organizations should provide clear definition of policies around web 2.0

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

It could just as easily have been called Web 2.0 It was designed to be a small to medium size group discussion, but because the room was large it was very challenging to do that successfully. I discussed a bit of these issues in First Thoughts After ASTD Sessions. Provide thoughts around the content and the discussion.

Wiki 105
article thumbnail

Website Security: Best Practices for Development and Maintenance

Hurix Digital

Cross-Site Scripting: Attackers inject malicious client-side scripts into web pages viewed by users. Harden Web/DB Servers: Harden underlying OS and web/database servers by disabling unnecessary ports/services, tightening firewall policies, restricting root access etc.

Website 40
article thumbnail

PLE - PWLE Discussion Contiunes - Corporate vs Personal and IP Rights

Tony Karrer

This continues the discussion being had around PLE/PWLEs - see More Discussion on Personal Work Learning Environments for a bit of recap. Clearly this is a different use of PLE's than those outside the firewall, for free rangers, and for learning from everything of personal interest. I also think that the explosion of Web 2.0

PWLE 100
article thumbnail

The Benefits of Cloud-Based Accounting Software

Coreaxis

Users enter and store their financial data using a web browser or a dedicated application. Furthermore, cloud-based software often includes built-in communication tools, such as chat features or comment sections, allowing team members to discuss specific transactions or financial reports directly within the software.