Hosted vs. Behind-the-firewall LMS – How To Decide?

Upside Learning

Purchasing and implementing an LMS for your organization is a business-critical activity. Adding to this dilemma is another level of decision making – whether to go for an OnDemand / SaaS / Hosted LMS service, or for a behind-the-firewall LMS deployment.

Has the SMCR created a new ‘accountability firewall’? [talking point]


Senior figures have continued to shelter behind an accountability firewall” 1. This brings with it, however, as an unintended consequence, the potential for this paperwork to be used to erect a protective wall around Senior Managers – in effect creating a new form of the very “accountability firewall” that the SMCR sought to remove. The post Has the SMCR created a new ‘accountability firewall’?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

5 Top IT-enabled business trends that are affecting Corporate Learning


Developments in information technology affect every nook and corner of the business world – creating leading trends that dictate business discourse and atmosphere. These IT-enabled business trends also affect learner preferences for ways to access and consume workplace learning. The data is now analyzed in real time to create insights into business and performance.

Trends 217

Business Social Media Benefits

Clark Quinn

For the latter, I was asked to address the question: “what businesses can learn from allowing employees to access social networking sites, and how allowing social networking can benefit businesses?&# First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution.

Social Bookmarking behind the Firewall

Corporate eLearning Strategies and Development

Connectbeam is just another company convinced that the activities of this new web generation will be a productive part of how we do business. The bureaucratic businesses processes that keep many employed are no longer necessary when the productive worker has the tools to find what he/she needs for him/her self. Techcrunch introduced me to Connectbeam.

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

Over the last decade, organizations around the globe have increasingly embraced cloud applications in order to innovate, transform their business, manage costs and handle their increased workload. Applications that automate various business functions such as HR management, sales processes, file sharing, and collaboration are growing fast, enabling companies to meet their needs in a shorter time frame. How to ensure cloud platform security for your business?

How Cisco Ties Continuous Learning to Business Objectives


The Degreed project is the result of the vision that Cisco needs a learning platform to develop and keep employees relevant to driving the business forward. Tying learning challenges to those business challenges resonated with the executive team, and the project was funded.

8 Cybersecurity best practices to keep your small business safe online


Running a business nowadays is as challenging as ever. In fact, cybersecurity attacks and breaches are more common in small businesses than in large corporations and bring more serious damage. According to a report by Keeper Security , more than half of small businesses could go bankrupt after being targeted by cybercriminals. 8 Cybersecurity best practices to keep your small business safe online. Use a good firewall.

IT Doesn’t Matter. Business processes do

Jay Cross

Ten years ago this May a journalist named Nick Carr stirred up a ruckus with an article in Harvard Business Review claiming that IT Doesn’t Matter. Using the telephone and shipping by rail were great sources of competitive advantage – until every business could afford them. Consultants Howard Smith and Peter Fingar shot back a month later with a paperback retort entitled IT Doesn’t Matter – Business Processes Do. BPM promises to obliterate the “Business-IT Divide.

How to Protect Your Organization from Cybersecurity Attacks During COVID-19


These types of attacks can often come from competitors just to get the system offline and prevent normal business functioning. Firewalls and filtering are useful in preventing DDoS attacks.

LMS Innovation: Where’s the Value?

Talented Learning

If you follow my writing — even casually — you know how excited I am about the direction of LMS innovation and its ability to help organizations create business value. We founded this blog to research the industry and provide fiercely independent reporting and analysis of learning for measurable business impact. One of those opportunities was with SpongeUK , where I explained how LMS innovation is helping businesses create new revenue streams.

HIPAA Training and Data Breaches: Are You Protected?


Keep antivirus software updated, use firewalls and unique passwords, and monitor your systems constantly. Business Computers Job Skills Learning and Development business compliance training data breaches HIPAA complianceIn November 2018, 3,230,063 health care records were exposed, stolen or disclosed without permission, according to the HIPAA Journal.

Eight Tips for LMS Implementation

Upside Learning

In the past I have written a few posts mainly focused on making the process of selecting the right LMS for your business need – be it internal training management or selling training as a business.

Tips 269

Big IBM/Second Life Announcement this Week!

Kapp Notes

He let everyone know on his blog posting The i-web Singularity Redux that at Virtual Worlds III this week the announcement was made that Second Life has worked out a deal with IBM to move Second Life behind the IBM corporate firewall. Thanks to Tony O'Driscoll at Learning Matters!

Learning Management: What does a Training Company need an LMS for?

Upside Learning

Hosting and Support Since the core business of a training company is offering training, what they need from the LMS vendor is a complete package on hosting and support. For this reason, the LMS should remain the key technology enabler making it easier to remain focused on their core business. Related posts: Top 5 reasons for implementing LMS: LC Survey Hosted vs. Behind-the-firewall LMS – How To Decide?

Recognition Separate from Rewards

CLO Magazine

Each year, WorldatWork [a global association for HR management professionals and business leaders] does a story on trends in employee recognition. Of those that have one, 95 percent of them have that recognition strategy aligned with their business strategy. I always like to describe them as Facebook behind your firewall. Roy Saunderson.

Leadership Webinar Wisdom: Six Critical Elements for Engagement and Learning

InfoPro Learning

and tailor the course to the participants’ role, level of experience or business function. There’s no getting around it… webinars involve technology and technology (the Internet, your computer, your webinar administrator’s computer, the webinar platform system you are using, your firewall, even your power) can have its good days and its bad days. Involving the Learner.

Top 5 Cloud Management Challenges And Tips to Overcome Them

Hurix Digital

To be able to enjoy the benefits of cloud management, businesses need to be aware of all these potential roadblocks and take effective measures to overcome cloud management challenges. . Keeping confidential data safe and secure is among the topmost priorities for businesses.

Time to Rethink Measurement for Digital Learning

CLO Magazine

Some of this content can be accessed through internal learning management systems but the fastest growth is likely to come from content available outside the organization’s firewalls and systems. Homepage Commentary & Opinion The Business of Learning digital learning measurement reportingDigital learning is revolutionizing the corporate learning environment by making a vast amount of content available to learners.

Mitigating the Risks of BYOD in corporate learning


It is clear that businesses that do not embrace BYOD as a policy run the risk of low productivity, employee dissatisfaction as well as low competitive standing. Passwords, Firewalls and Encryption: The platform of corporate learning is the enterprise Learning Management System for most organizations. In addition to authorized Passwords, Firewalls can be installed to allow only authorized devices to access the enterprise LMS.

Social Networking – A Contrarian View

Upside Learning

Sure, lots of companies want to replicate ‘Facebook’ behind the firewall; safe from prying eyes, but open enough for employees to freely express themselves. Perhaps they lacked the required understanding of business processes, the systems used to enable these and the ‘culture’ that each company develops over time. Today, I’m going to adopt a contrarian view.

Using an LXP to Fix Learning Gaps in Customer and Channel Partner Education

Origin Fractal LXP

IT restrictions and firewall & security issues ensure that external individuals are not granted access to the official organizational LMS. Firewall restrictions and corporate IT policies dictated that these vendors could not access the corporate LMS.

Shrinking LMS Implementation Fees Drive Market Expansion

Talented Learning

Firewalls, server sizing, bandwidth, database preference, historical data migrations, customizations and integrations were complex and problematic. If buyers are not happy they can fairly easily and inexpensively take their LMS business elsewhere. If an organization can start off for as little as free and prove a business case, asking for more money is a cinch. As little as five years ago, it was common for an average LMS implementation to exceed $100,000.

Speaking today (noon ET) at Train-For-Success

Kapp Notes

Maria Korolov, editor of Hypergrid Business, president of Trombly International. Join this conversation about the emerging platforms and applications of virtual worlds in learning and business. It does not work through most corporate firewalls. Join us for the new season of Train for Success with a panel of virtual worlds thought leaders: • Karl Kapp, Professor at Bloomsburg University, consultant & author of “The Gamification of.

Learning Management: What does a Training Company need an LMS for?

Upside Learning

Hosting and Support Since the core business of a training company is offering training, what they need from the LMS vendor is a complete package on hosting and support. For this reason, the LMS should remain the key technology enabler making it easier to remain focused on their core business. Related posts: Top 5 reasons for implementing LMS: LC Survey Hosted vs. Behind-the-firewall LMS – How To Decide?

What Do You Mean?

The Performance Improvement Blog

Dan Pallotta, president of Advertising for Humanity and HBR blogger, in a post titled “I Don't Understand What Anyone Is Saying Anymore”, writes about business jargon and how it affects communication in organizations. While we as a customer-centric longtail company are still on the runway, we need to each firewall enough time to allow out-of-the-box thinking and strategize the low-hanging fruit in the marketplace.

How Does Cloud-based Virtual Training Fit into Your Digital Transformation?


According to research from Gartner, 87% of senior business leaders feel it’s a do-or-die undertaking. trillion was spent on DT in 2018 alone, the Harvard Business Review reported 70% of companies failed to achieve their goals. You can’t escape digital transformation (DT).

Get Microsoft LMS integration to improve and enhance your eLearning experience


OneDrive for Business. The users get one-click access to the LMS in the cloud from behind the firewall. This saves on the time and money to manage and distribute training, as well as other aspects of your daily business. Hierarchy: If your business has a complicated hierarchy structure, then this can be shared with and replicated in the LMS.

Shifting from Trainer to Community Manager

Bottom-Line Performance

Profit margins are razor thin and the business landscape is more competitive than ever. As businesses, we must adapt or contract. We need to stop trying to solve business process failures with eLearning modules and we need to start preparing learners to take charge of their own learning. Many companies are using tools like Yammer to bring the social networking experience inside the company firewall.

Outdated Training – from Problem to Asset

Obsidian Learning

Their employees aren’t learning what they need to, either because the training content isn’t current or because the delivery method no longer fits business needs or employee expectations. Our SMEs are so busy , we have to make the most of their time. Instead, our employees are Googling quick answers outside our firewall. We get calls every week from customers looking for help with their outdated training.

What does an mLearning participant look like?

Integrated Learnings

It is really fun to watch all the latest smartphones, tablets and other devices try to out-do each other with new technologies to provide convenience to consumers and businesses alike. There are always technology challenges with this when trying to use a Virtual Private Network (VPN) or accessing a closed firewall from outside the office. by Dean Hawkinson.

Employees Avoiding Corporate Barriers

Nick Leffler

I was on a new project with a business partner who it was suggested strongly to needs to send everything through legal for review. The business partner was not thrilled with this slow-down and with the rate the project moved at it would have had unrecoverable effects. The business partner chose to step around legal and the others on my project were more than willing to turn the other way.

What came first, Covid-19, or the desire for remote working? And what comes next?


It might not be surprising that businesses have turned to cloud technologies to establish smart remote working practices, as cloud deployments can be quickly spun up, are inherently scalable and cost-effective, and offer the flexibility to suit any business use case. Replicated real-world environments can simulate any network topography, from switches and firewalls, to hypervisors through nested virtualization.

Learning Solutions Conference Day 1, my recap

Challenge to Learn

Interesting for me was to hear eLearning specialist talk about the need to over a part of their training effort to performance support, in order to connect to the business and the business goals more. In fact the cloud is nothing else then a bunch of web servers behind a firewall, like the servers data would live on your corporate servers. Yesterday we had day 1 of LSCON2013 and here are my findings. I attended a few sessions that I will report on in this post.

The 5 Types Of Cyber Attacks To Protect Against In 2018

Your Training Edge

If they refuse to pay, they may lose business-critical files, which can also cost them enormous sums of money. 76% of businesses reported being the victims of a phishing attack. Phishing rates are increasing across all industries, meaning no business is immune.

The Importance of People in Risk Management

Unicorn Training

However, firewalls, encryption and anti-viruses will only get you so far. Staff should be given the skills, awareness, knowledge and confidence to make the right decisions in the face of growing cyber threats to better protect the business.” The need to build a human firewall around your business has never been greater, and as cyber criminals become ever more sophisticated and data remains vulnerable, the only guarantee is that the human firewall will need to keep getting higher.

7 Mobile Learning Facts L&D Managers Should Know

Obsidian Learning

Some of the older smartphones may not be able to smoothly process high data loads, and some deliverables may have to be accessed through the company’s firewall, which could cause problems for devices outside the organization. The statistics from CLO Magazine may seem surprising, as many learning managers kicked off mobile learning deployment with soft skills, leadership, and business skills training. Photo by NordWood Themes on Unsplash.