Hosted vs. Behind-the-firewall LMS – How To Decide?

Upside Learning

Purchasing and implementing an LMS for your organization is a business-critical activity. Adding to this dilemma is another level of decision making – whether to go for an OnDemand / SaaS / Hosted LMS service, or for a behind-the-firewall LMS deployment.

Has the SMCR created a new ‘accountability firewall’? [talking point]

Eukleia

Senior figures have continued to shelter behind an accountability firewall” 1. If this approach is taken to its extreme, business can be materially impeded, with the board ultimately being asked to take every level of decision, down to the type of coffee served in the coffee machines!

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

Over the last decade, organizations around the globe have increasingly embraced cloud applications in order to innovate, transform their business, manage costs and handle their increased workload. How to ensure cloud platform security for your business?

5 Top IT-enabled business trends that are affecting Corporate Learning

G-Cube

Developments in information technology affect every nook and corner of the business world – creating leading trends that dictate business discourse and atmosphere. These IT-enabled business trends also affect learner preferences for ways to access and consume workplace learning.

Trends 282

Business Social Media Benefits

Clark Quinn

For the latter, I was asked to address the question: “what businesses can learn from allowing employees to access social networking sites, and how allowing social networking can benefit businesses?&# First, there are corporate equivalents: for every Facebook and Twitter there’s a behind-the-firewall and/or industrial strength and secure solution.

Social Bookmarking behind the Firewall

Corporate eLearning Strategies and Development

Connectbeam is just another company convinced that the activities of this new web generation will be a productive part of how we do business. The bureaucratic businesses processes that keep many employed are no longer necessary when the productive worker has the tools to find what he/she needs for him/her self. Techcrunch introduced me to Connectbeam.

How Cisco Ties Continuous Learning to Business Objectives

Degreed

The Degreed project is the result of the vision that Cisco needs a learning platform to develop and keep employees relevant to driving the business forward. Tying learning challenges to those business challenges resonated with the executive team, and the project was funded.

8 Cybersecurity best practices to keep your small business safe online

Matrix

Running a business nowadays is as challenging as ever. In fact, cybersecurity attacks and breaches are more common in small businesses than in large corporations and bring more serious damage. 8 Cybersecurity best practices to keep your small business safe online.

IT Doesn’t Matter. Business processes do

Jay Cross

Ten years ago this May a journalist named Nick Carr stirred up a ruckus with an article in Harvard Business Review claiming that IT Doesn’t Matter. Using the telephone and shipping by rail were great sources of competitive advantage – until every business could afford them.

LMS Innovation: Where’s the Value?

Talented Learning

If you follow my writing — even casually — you know how excited I am about the direction of LMS innovation and its ability to help organizations create business value. What audiences are good targets and what business-related behavior are you trying to change or improve?

How to Protect Your Organization from Cybersecurity Attacks During COVID-19

KnowledgeCity

These types of attacks can often come from competitors just to get the system offline and prevent normal business functioning. Firewalls and filtering are useful in preventing DDoS attacks.

HIPAA Training and Data Breaches: Are You Protected?

KnowledgeCity

Keep antivirus software updated, use firewalls and unique passwords, and monitor your systems constantly. Business Computers Job Skills Learning and Development business compliance training data breaches HIPAA complianceIn November 2018, 3,230,063 health care records were exposed, stolen or disclosed without permission, according to the HIPAA Journal.

Eight Tips for LMS Implementation

Upside Learning

In the past I have written a few posts mainly focused on making the process of selecting the right LMS for your business need – be it internal training management or selling training as a business.

Tips 269

Big IBM/Second Life Announcement this Week!

Kapp Notes

He let everyone know on his blog posting The i-web Singularity Redux that at Virtual Worlds III this week the announcement was made that Second Life has worked out a deal with IBM to move Second Life behind the IBM corporate firewall. Thanks to Tony O'Driscoll at Learning Matters!

Recognition Separate from Rewards

CLO Magazine

Each year, WorldatWork [a global association for HR management professionals and business leaders] does a story on trends in employee recognition. Of those that have one, 95 percent of them have that recognition strategy aligned with their business strategy. Roy Saunderson.

Leadership Webinar Wisdom: Six Critical Elements for Engagement and Learning

InfoPro Learning

and tailor the course to the participants’ role, level of experience or business function. Involving the Learner. Webinars pose a challenge to the basic adult learning principle of involving the learner in experience-based activities that have immediate relevance to work.

Learning Management: What does a Training Company need an LMS for?

Upside Learning

Hosting and Support Since the core business of a training company is offering training, what they need from the LMS vendor is a complete package on hosting and support. For this reason, the LMS should remain the key technology enabler making it easier to remain focused on their core business. Related posts: Top 5 reasons for implementing LMS: LC Survey Hosted vs. Behind-the-firewall LMS – How To Decide?

Mitigating the Risks of BYOD in corporate learning

G-Cube

It is clear that businesses that do not embrace BYOD as a policy run the risk of low productivity, employee dissatisfaction as well as low competitive standing. In addition to authorized Passwords, Firewalls can be installed to allow only authorized devices to access the enterprise LMS.

Time to Rethink Measurement for Digital Learning

CLO Magazine

Some of this content can be accessed through internal learning management systems but the fastest growth is likely to come from content available outside the organization’s firewalls and systems. Homepage Commentary & Opinion The Business of Learning digital learning measurement reportin

Social Networking – A Contrarian View

Upside Learning

Sure, lots of companies want to replicate ‘Facebook’ behind the firewall; safe from prying eyes, but open enough for employees to freely express themselves. Today, I’m going to adopt a contrarian view.

Shrinking LMS Implementation Fees Drive Market Expansion

Talented Learning

Firewalls, server sizing, bandwidth, database preference, historical data migrations, customizations and integrations were complex and problematic. If buyers are not happy they can fairly easily and inexpensively take their LMS business elsewhere.

Speaking today (noon ET) at Train-For-Success

Kapp Notes

Maria Korolov, editor of Hypergrid Business, president of Trombly International. Join this conversation about the emerging platforms and applications of virtual worlds in learning and business. It does not work through most corporate firewalls.

Get Microsoft LMS integration to improve and enhance your eLearning experience

Paradiso

OneDrive for Business. The users get one-click access to the LMS in the cloud from behind the firewall. This saves on the time and money to manage and distribute training, as well as other aspects of your daily business.

Using an LXP to Fix Learning Gaps in Customer and Channel Partner Education

Origin Fractal LXP

IT restrictions and firewall & security issues ensure that external individuals are not granted access to the official organizational LMS. Firewall restrictions and corporate IT policies dictated that these vendors could not access the corporate LMS.

What Do You Mean?

The Performance Improvement Blog

Dan Pallotta, president of Advertising for Humanity and HBR blogger, in a post titled “I Don't Understand What Anyone Is Saying Anymore”, writes about business jargon and how it affects communication in organizations.

What came first, Covid-19, or the desire for remote working? And what comes next?

Cloudshare

It might not be surprising that businesses have turned to cloud technologies to establish smart remote working practices, as cloud deployments can be quickly spun up, are inherently scalable and cost-effective, and offer the flexibility to suit any business use case.

Shifting from Trainer to Community Manager

Bottom-Line Performance

Profit margins are razor thin and the business landscape is more competitive than ever. As businesses, we must adapt or contract. Many companies are using tools like Yammer to bring the social networking experience inside the company firewall.

Learning Management: What does a Training Company need an LMS for?

Upside Learning

Hosting and Support Since the core business of a training company is offering training, what they need from the LMS vendor is a complete package on hosting and support. For this reason, the LMS should remain the key technology enabler making it easier to remain focused on their core business. Related posts: Top 5 reasons for implementing LMS: LC Survey Hosted vs. Behind-the-firewall LMS – How To Decide?

How Does Cloud-based Virtual Training Fit into Your Digital Transformation?

Cloudshare

According to research from Gartner, 87% of senior business leaders feel it’s a do-or-die undertaking. trillion was spent on DT in 2018 alone, the Harvard Business Review reported 70% of companies failed to achieve their goals. You can’t escape digital transformation (DT).

The 9-Point Checklist for Monthly WordPress Maintenance

The Be-all and End-all Guide to Creating a Supreme LearnDash LMS

But this can negatively impact SEO and our brand; or worse, we could lose out on business. Your website is an important asset when it comes to your business or brand and you can’t risk it. For most businesses, their website is the primary portal to customers.

Cybersecurity and COVID-19: Preventing Organizational Risks with an At-Home Workforce

Interactive Services

Cyberattacks aim to steal private information from businesses and individuals for illegal and nefarious purposes, and come in many forms such as phishing, hacking, and ransomware attempts. Install a firewall configured to let trusted employees in and keep bad actors out.

Learning Solutions Conference Day 1, my recap

Challenge to Learn

Interesting for me was to hear eLearning specialist talk about the need to over a part of their training effort to performance support, in order to connect to the business and the business goals more. Yesterday we had day 1 of LSCON2013 and here are my findings.

7 Mobile Learning Facts L&D Managers Should Know

Obsidian Learning

Some of the older smartphones may not be able to smoothly process high data loads, and some deliverables may have to be accessed through the company’s firewall, which could cause problems for devices outside the organization. Photo by NordWood Themes on Unsplash.

The Best Ways to Do Cyber Resilience Training

Cloudshare

Modern businesses have a lot to juggle when it comes to cybersecurity. A successful business must stay on top of digital security and often spend large amounts of resources improving protection and security for their digital infrastructures.

4 Tips When Dealing with the Cybersecurity Threats of Remote Work

Digitec Interactive

With so many businesses transitioning towards remote work , it’s important to be aware of the potential risks. Businesses and employees need to make sure that they don’t give these hackers a chance. You can put firewalls in place, change your router password, and use a VPN if you can.