6 Mobile Learning Trends That Grew in 2012

Bottom-Line Performance

All of these trends saw significant uptake in 2012… and look to continue. Many companies and schools are adopting this policy as it is more cost effective and encourages people to keep working even after they go home for the day…or at least, that’s what the buzz is about.

What corporates can learn from the Top 10 Tools for Learning 2012

Jane Hart

On 1 October I released the Top 100 Tools for Learning 2012 list , and in my introductory analysis I said. So, just as with Twitter above, the next best thing might be a corporate company Facebook-like network, eg Yammer (in the 2012 list) at #20. Top Tools 2012

Pick of the Month: August 2012

Jane Hart

“We need to step back from the standard knee-jerk response that compliance training is a necessary and effective way (and often the only way) of improving levels of compliance, and that there is no alternative open to us. At best it’s a security blanket.

PKM 199

10 Effective LMS RFP Guidelines

Upside Learning

Here are 10 guidelines to draft an effective LMS RFP. They need to know what type of browser you are running, Application security policy from IT department and any other crucial information.

RFP 207

12 Ways to Get the Most Out of Your Authoring Tool

The Guardian (2012), ‘Talking feedback’ 2 User-Generated Videos: Tapping into Social Sharing gomolearning.com @gomolearning User-generated content has been on many organizations’ authoring. handle any secure external API calls, which means. the effectiveness with which different.

eLearning Conferences 2012

Tony Karrer

link] November 30-December 2, 2011 Worldwide Forum on Education and Culture: The Effects of Global Learning – Teaching the World about the World, Rome, Italy. link] December 5-9, 2011 Computer Security Applications Conference, 27 th , Orlando, Florida, USA. Clayton R.

eLearning Conferences 2012

eFront

Educational Technology and Related Education Conferences for January to June 2012 Clayton R. Only listings until June 30, 2012 are complete as dates, locations, or Internet addresses (URLs) were not available for a number of events held after this date. => January 2012 January2-4, 2012 College Teaching and Learning Conference, sponsored by the Clute Institute for Academic Research, Orlando,California, USA. link] February23-24, 2012 MoodleMoot Austria ,Linz, Austria.

My 2012 Enterprise mLearning Predictions Recap

mLearning Trends

As 2012 draws to a close, its time to evaluate how in focus my lens on the future of enterprise mobile learning proved to be this past year and how many of my year ago predictions hit their targets. There will be more types of devices and ways to connect with our mobile learning world in 2012.

Mobile Learning And The BYOD Movement

Upside Learning

Some organizations have embraced it with open arms while many are still apprehensive about security risks that BYOD poses. While the BYOD trend may save organizations a substantial amount of money, what they are really concerned about is data security.

Top 7 Myths Of Mobile Learning

Upside Learning

It’s not secure. These days security solutions like encryption, password protection, and remote wipe/erasing of data can mitigate these risks. Also the BYOD policies in your organization will affect the security measures you need to adopt.

6 Steps To A Better Mobile Learning Strategy

Upside Learning

When implementing mobile learning in workplace, following 6 steps will help create an effective mlearning strategy. Manage Security Concerns. Communicating a clearly outlined mobile security policy to your staff will be helpful as well.

What L&D Professionals Should Know About Tin Can API

Upside Learning

Not one of these various forums/media of learning can be tracked by an LMS, yet it can’t be denied that these are effective learning methods. Solid security using Oauth.

SCORM 262

New Mobile Learning Research

Upside Learning

Chief barriers to adopting mobile learning include budget, integration with legacy systems, and security. Less than 10% of respondents who deliver mobile learning have formal metrics in place to evaluate effectiveness.

3 Reasons To Switch Your LMS

Upside Learning

Further, in this time and day when M&A is the primary growth strategy of many large vendors, how can you feel secure that you’ll continue to be important to your vendor tomorrow? For most organizations, there are multiple reasons for switching over to a new LMS.

vendor 253

Security Threats, Productivity Top Reasons for Social Media Bans

CLO Magazine

Results show interesting concerns regarding threats from social media, corporate policies and impact on recruitment and effects on productivity. The two biggest factors on why companies block access to social media websites were “security threats” (77 percent) and “decreased productivity for employees” (67 percent). The survey was conducted between June and October 2012 by MySammy in conjunction with Holos Research.

The black hole of adult education

E-Learning Provocateur

All of the material was presented orally … instructors realized that their job security, to a large extent, hinged on their knowledge of a system or component of the space station.

eLearning Conferences 2013

Tony Karrer

Past years eLearning Conferences 2012 , eLearning Conferences 2011 , eLearning Conferences 2010 , eLearning Conferences 2009. link] December 1-5, 2012 Learning Forward Conference, (Learning Forward is the new name for the National Staff Development Council, NSDC), Boston, Massachusetts, USA.

Webinar Resources: Emerging Training & Education Strategies for Homeland Security #FRwebinar

Kapp Notes

Five Gaming Elements for Effective eLearning. July 2012 T&D Article: Games, Gamification and the Quest for Interactive Learning. Here are some resources related to my topic of About Games, Gamification and Learning: Insights from Research. Book on Topic.

Gartner’s top tech 2012 predictions: Impact on learning at 3 levels

Learning Cafe

The highly respected information technology research and advisory company Gartner has made the top 10 enterprise technology predictions for 2012. Through 2015, more than 85% of Fortune 500 organizations will fail to effectively exploit big data for competitive advantage.

Using Video in eLearning

Integrated Learnings

Video, when used properly, can be a very effective tool in supporting the learning process, whether as a part of an eLearning course or as standalone videos delivered via mobile devices. For mLearning delivery via mobile devices, video is a very effective way to deliver a quick message as a standalone delivery, and I’ve found it works best when kept to 5-10 minutes for each clip. by Dean Hawkinson One of the growing trends in eLearning and mLearning these days is the use of video.

Video 168

Modern LMS – Imparting Knowledge, not passing information

G-Cube

The eye of the debate is how this structure might even hinder the effectiveness of learning, instead of aiding it. The security of this content is also guaranteed on the secure perimeter of the LMS.

From “learning technologies” to “social technologies”

Jane Hart

Whereas many individuals are happy to use their own social tools to power their own and their team’ activities, most organisations generally prefer them to use some sort of internal enterprise platform to keep the conversations and content private and secure.

7 reasons why the new Articulate Storyline is a Game-Changer for eLearning

mLearning Revolution

One of the challenging things about building eLearning is getting all the right images in place in order to build life-like scenarios, we often have to resort to various sites in order to secure the right images for the project at hand and frankly this can be costly and time consuming. One of the secrets to making eLearning effective is to include just the right amount of interactions in order to keep the learner engaged, and Storyline makes build interactions, even complex ones a breeze.

Want to help someone learn? Have them assume a role.

Kapp Notes

A role play provides a framework for the learner to practice what he or she needs to do in a safe and secure environment. Note: Some of these thoughts are based on a paper by John Rice, a school technology director in Texas.

Roles 210

Moodle 2.0 Making the Leap at RSC

Moodle Journal

There did emerge though two very strong approaches and these were:- 1: Simply run the upgrade process effectively replacing old with new. Of course if you decide to take this option then it should go without saying that you make a secure backup of your old site and database first.

Moodle 158

Gamification of Learning and Instruction Blog Book Tour Week One Recap

Kapp Notes

To paraphrase a wise and informed person on the topic of extrinsic motivation: while the programmers Kathy urges and encourage to read her books to earn the badge/certification are all smart, savvy, brain aware people it makes no difference because that knowledge does not protect them from the damaging effects of putting such weight and value on the EXTRINSIC reward of certification. Week One Recap.

Enterprise mLearning Predictions for 2012

mLearning Trends

Here on the last day of the year, I offer my predications for the big and shaping trends we’ll see in the enterprise mobile learning space for 2012. There will be more types of devices and ways to connect with our mobile learning world in 2012. partners, customers) where ease of install/access are paramount and the required features can be limited to what’s essential instead of everything that’s required by IT, security and management. Happy New Year 2012!

Workplace Trends from 2004…Still Trending

Integrated Learnings

6-- Security alert! Concerns about national security prompt people to desire more security in their personal lives and in the workplace. This portion of the article spoke to the need to evaluate the effectiveness of training, so we can show how it contributes to organizational results and produces a return on investment. By Shelley A. Gable. I cleaned my bookshelf the other day, which included moving out stacks of old magazines.

Trends 115

CFA Competencies

Your Training Edge

In addition, the prospective member must be involved on a daily basis in the evaluation and application of financial data, specifically related to securities and investments. The potential member must also supervise this type of activity effectively and may also have taught this activity. An individual with a professional certification brings credibility and expertise to the organization.

Thinking About Social Media

Kapp Notes

Ask these questions when evaluating how effective a new piece of software will be in terms of enhancing the exchange of knowledge within an organization: Does it enable people to connect with each other in new ways? Also keep in mind that social media is being used by groups whom you’d never think would use social media because of security concerns or because you might think they are too “low tech” for social media.

The new kid on the block – TalentLMS

eFront

TalentLMS makes effective usage of your time and maximizes the training output. Is it secure? TalentLMS runs from the cloud, but that does not mean it’s insecure – in fact, TalentLMS is as secure as it gets. All data is transmitted over a secure and encrypted channel.

Has the Recession Permanently Scarred Gen Y?

Mindflash

A second study, from O2, which I recently noted in a blog post at the Brazen Careerist , found workers “of all generations… feel they have to demonstrate long hours in the office to secure their jobs.”. Of course, not everyone is all gloom and doom about the long-term effects of the recession.

What Universities Must Learn About Social Networks

Jay Cross

Others will never do that for reasons of security, lack of the ability to customize, limited feature sets, or the risk of relying on a wildcard like Mark Zuckerberg. Very much like the continuous changes in social network software, network security is a day to day concern.

Gamification of Learning and Instruction Blog Book Tour Week One Recap

Kapp Notes

The negative, undermining effects all happen at a level of conscious processing for which Kathy’s poor readers lack the “security clearance” to access let alone override. Week One Recap.

How to Choose the Right Sales Trainer

Mindflash

Remember please that effective sales training is not picking one subject for this year’s sales kickoff meeting and then another subject for next year’s. Most sales training companies have a desire to secure large, long-term training assignments—many with large corporations.

Sales 81

IBM Launches New Skills Programs

CLO Magazine

The new resources will aim to help reduce a critical technology skills gap outlined in IBM's 2012 Tech Trends Report released Wednesday. The new resources will aim to help reduce a critical technology skills gap outlined in IBM's 2012 Tech Trends Report released Wednesday. For the first time, IBM will offer access to curriculum and training resources on IT security to help students gain market-ready cyber security skills.

IBM 55

BYOD and e-learning: Three pointers for avoiding a ‘future shock’

Saffron Interactive

Nowadays very few are arguing that e-learning will become less effective once learners are able to access it anywhere and anytime. Secure sign-on is a problem, but a dedicated native app might be the answer. In 1970 the futurologist Alvin Toffler wrote his best-selling book, Future Shock , predicting a society under siege from mass ‘stress and disorientation’ caused by information overload and (broadly) too much change in too short a period of time….

iPad 73