Remove Business Remove Firewalls Remove Server Remove Virtual World

How to Be CyberSmart in a COVID-19 World

Avilar

Cybercriminals have, indeed, been busy since the start of COVID, diligently working to cause mayhem while the business world adjusts to the pandemic. Firewalls, networks, collaboration tools, and servers should all be configured to accept – and track – remote access.

Implementing a Virtual World

Kapp Notes

Image from a virtual world created by Forterra. Considering the implementation of a virtual world? Below are a few tips from a interesting whitepaper by Forterra Systems , a company that provides private, virtual world technology for the corporate, healthcare, government, education, and the entertainment industry. The main product of Forterra is OLIVE™ (On-Line Interactive Virtual Environment). Working through corporate firewalls.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Still More Alternatives to Second Life: More 3D Worlds to Explore

Kapp Notes

OpenSimulator is a 3D Application Server. It can be used to create a virtual environment (or world) which can be accessed through a variety of clients, on multiple protocols. Out of the box, it can be used to simulate a virtual environment with expansive spaces and customizable 3D avatars. The environment supports creating multiple 'worlds' in a single application instance. Tags: 3D worlds

LMS Innovation: Where’s the Value?

Talented Learning

If you follow my writing — even casually — you know how excited I am about the direction of LMS innovation and its ability to help organizations create business value. We founded this blog to research the industry and provide fiercely independent reporting and analysis of learning for measurable business impact. I’ve also been sharing my thoughts on other blogs around the world.

When Does Your Training Need To Go On A Private Cloud?

eFront

We have gone from big-as-a-house mainframes with slow-as-molasses magnetic tape storage to pizza-box sized servers with crazy fast SSDs, in the span of four decades. The next evolution — which is already here — does not concern servers smaller than pizza boxes, but rather no boxes at all. If instead of running your own mail server on your data center, you use some third party online mail provider like Gmail or Fastmail, then you are already making use of Cloud services.

The Best Ways to Do Cyber Resilience Training

Cloudshare

Modern businesses have a lot to juggle when it comes to cybersecurity. A successful business must stay on top of digital security and often spend large amounts of resources improving protection and security for their digital infrastructures. Companies in every industry are staying on their toes to avoid the costly consequences of a data breach by installing firewalls, encryption methods, and anti-malware measures. Even smaller businesses are in the crosshairs.

SAAS (Hosted) LMS and Vendor Questions

eLearning 24-7

What is SAAS and why is hosted better than having it on your own servers. The bottom line without getting technical or overly detailed, the solution is hosted on your vendor’s servers and not hosted on your internal servers. Hosting does offer very tight and safe security, and access is via the internet, even if you go through your VPN (Virtual Private Network). Benefits versus having it on my servers (behind my firewall).

2009 Predictions, Remembrance and Challenges

Kapp Notes

This year has been a busy year as my consulting has been more active than any previous year. Tough to be busy and balance family life but it must be a priority. I am writing a book this year called "Learning in 3D" about using virtual worlds for learning, that will be a challenge as all of my books have been. ASTD's Big Question for January is, again, a series of questions. What are your biggest challenges for this upcoming year? What are your major plans for the year?

Web 2.0 Applications in Learning

Tony Karrer

I tried to capture things down as they were said, here are my notes: Firewalls IP Privacy / Confidentiality Security Control over Quality of Information Strict Control Over Policies – Accuracy Liability / Discoverability / Compliance Change Management – Ready for It / Culture Management Take it Seriously – Away from Work Education of Management Lack of Resources – Mobile Devices Push Back from Workforce - Adoption This is a pretty good list of commonly cited barriers.

Web 103

2010: mLearning Year in Review

mLearning Trends

Along the way, OnPoint was asked by one of our wireless carrier customers to provide the first enterprise mobile authoring environment supporting completely separate staging/QA and production servers but allowing for content syncing to a single, secure mobile application instance on one device – a feat tantamount to hitting one over Fenway’s Green Monster but soon realized after some cleaver programming. A.K.A. How our January 2010 Predictions Played Out!