article thumbnail

The Business Case for Going Beyond Compliance in Accessible Online Learning

Petra Mayer

These advantages also serve as a persuasive narrative when presenting accessibility updates to stakeholders and decision-makers within your organization. Firstly, it’s important to distinguish between the rules that apply before a firewall (log-in platform) and those within a private environment secured by log-in credentials.

article thumbnail

Where to Find the Best E-Learning Courses

Rapid eLearning

The Best E-Learning is Locked Behind a Firewall Although many high-quality courses are being developed, the issue is that the majority of them are proprietary and inaccessible due to a firewall. Delivering a keynote presentation and afternoon e-learning workshop. Swing by the booth and say hello. May 21-24 (San Diego) : ATD ICE.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blogging Inside or Outside the Corporate Firewall

Tony Karrer

I don't personally think this is the right direction for individuals and in my recent presentations on eLearning 2.0 , I suggested in my examples for what this looks like in a corporate environment that people use a tool like Blogger. If it's captured in a system inside the corporate firewall, it won't go outside.

Firewalls 100
article thumbnail

BEWARE THIS GAMIFICATION PITFALL

Learnnovators

Let’s take a look at a couple of good examples that use stories as such: For a gamified learning experience on IT security, an artificial infosec breach is created within the organization’s firewall. If a curriculum requires the material to be presented in a certain modality or with a particular approach, by all means, go for it.

article thumbnail

Leadership Webinar Wisdom: Six Critical Elements for Engagement and Learning

Infopro Learning

Energetic classroom facilitators are wonderful at being able to bring up the next slide in their presentation deck at just the right moment. Also, read my article on Presentation Skills , for how to have a great learning experience with presentation training.

article thumbnail

Protecting Your Digital Fort: Common Network Security Threats and How to Mitigate Them

Insightworks

To defend against DDoS attacks: Employ a DDoS protection service or firewall. In conclusion, network security threats are ever-present, but with proactive measures and ongoing vigilance, you can significantly reduce their impact. Configure your network to filter and block malicious traffic.

article thumbnail

L&D: Learning and Dystopia

Association eLearning

I tried to talk IT into letting you project in but the firewall is the firewall, no exceptions for non-personnel.”. No time like the present,” I replied as I pulled out a pen and notepad, hoping I sounded cheerful. The thought tracker on her left wrist lit up briefly as it logged the new information. It’s fine, I don’t mind.

Firewalls 183