Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages. Look at security.

Tech Week: Avoid Data Breaches With Secure Code Training


In response to increasing security concerns, organizations and standards have been developed to provide guidance and structure around best practices for writing secure code. The DSS provides a framework for prevention, detection and reaction to security breaches.

ROI: Should You Host The LMS or Let the Vendor

Kapp Notes

If you are able to secure in your budget money for software and hardware upgrades (not directly related to the LMS) you may want to host internally. If you have a fast, effective purchasing process, you may be able to consider internal hosting. What level of security to you require? This is an interesting question because you need to know how secure your own internal network may be.

6 Training Trends for 2018 (and 3 you’re still not doing right)


Virtual instructor-led training (vILT) is quickly gaining traction as classroom training’s more cost-effective, less disruptive but equally effective cousin. Bonus : Embrace these virtual instructor-led training best practices to make your virtual training engaging and effective. #2:

Agile Microlearning Explained

Personalized training is a powerful and effective approach that assesses an individual’s. organizations—even though it was much more effective than. techniques, deliver an extremely effective adaptive microlearning solution. for a password to be secure? most secure?

Digital tribes

Learning with e's

Thus the shared symbolism of the slang or dialect tacitly protects the tribal culture and secures its social exclusivity for its members. Communication, including speech, clothing and actions all serve to signal our cultural identities and group membership (Pahl and Rowsell, 2006).

Meet 50 Northwestern alumni behind some of Chicago’s top startups


Brad Morehead: LiveWatch Security. In addition to several other ventures Brad Morehead has founded, he currently sits as founder and CEO of LiveWatch Security, which launched almost six years ago in Chicago. Recap from: Built In Chicago News Article.

Take A Leap Of Faith With Mobile Learning

Upside Learning

Further, particularly in past, there have been challenges of small screen sizes, low bandwidths, low penetration of smart devices, security of content, Flash vs. HTML5 confusion, native vs. web based options, and more. Any learning that can help it is immediately effective.

4 Ways to Leverage Translation in eLearning Videos


Part of the reason for this is the ability for learning platforms to support what are known as secure external API interactions. In 2006, Google Translate only supported two languages 7 , whereas its prevalence nowadays means it translates more than 100 billion words a day 8.

Wikis and Learning – 60 Resources

Tony Karrer

So, of course, I went to eLearning Learning and I looked at Wiki , Collaborative Learning with Wikis , Wikis and eLearning 2.0 , Wikis Corporate eLearning , Social Learning with Wikis , Wiki Security and a few others. I’m involved in several discussions around how to use Wikis as part of learning solutions. I wanted to collect a few resources around this topic for use in these discussions.

Wiki 161

10 eLearning buzzwords you need to know!


A wide range of systems can now securely communicate with a simple vocabulary that captures this stream of activities. During the last fifty years, constant scientific and technological innovation and change has had a profound effect on learning needs and styles.

Digital tribal identity

Learning with e's

Thus the shared symbolism of the slang or dialect tacitly protects the tribal culture and secures its social exclusivity for its members. Communication, including speech, clothing and actions all serve to signal our cultural identities and group membership (Pahl & Rowsell, 2006).

eLearning in Australia


I left TAFE in 2006 to set up an elearning department for one of the private mining RTO’s here in Queensland before starting my own business late 2007. This is mainly due to job security rather than their dislike for elearning.

Learning to the Rescue: The FDIC’s Thom Terwilliger

CLO Magazine

’s bankruptcy the following September — started a ripple effect that would keep the FDIC in all-hands-on-deck mode for years. In 2005 and 2006, there were no bank failures, according to the agency’s failed bank list. In 2006, he started his own consulting firm, CSJ Associates, specializing in organizational development, and in May 2007 the FDIC hired him as chief learning officer and director of its corporate university.

Cammy Beans Learning Visions: e-Learning Guild Synchronous Learning Systems

Learning Visions

Cammy Beans Learning Visions Musings on eLearning, instructional design and other training stuff. Tuesday, July 10, 2007 e-Learning Guild Synchronous Learning Systems e-Learning Guild presentation on Synchronous Learning Systems hosted by Steve Wexler, Karen Hyder, and Karl Kapp.

SMBs and Social Learning Technologies

Janet Clarey

Challenges to SMBs: resources, culture, loss of control of information, fear of loss of productivity/abuse, security. For services outside the firewall, blockage continues to be an issue driven by such barriers as organizational culture, bandwidth limitations, security issues, IT resistance, and lack of resources. 2006). Building Effective Blended Learning Programs. Here are slides from the presentation I did yesterday. The session was hosted by SumTotal Systems.