article thumbnail

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

In recent postings I focused on how L&D can support the content needs of the Smart Worker, but in fact it is clear, that most people first try and solve their problems by calling upon the people they know to help them, so this is the topic of this posting. to solve problems and brainstorm together. For example -.

article thumbnail

Partner training 101: How to get started

TalentLMS

During partner training, your business partners learn the nuances of your product, use cases, and how it can solve different consumer problems. During training, you might share confidential company information, like patents, trade secrets, financial data, and marketing strategies. Increase your sales. Create a go-to knowledge hub.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Method Count Percent Alongside Formal Learning 26 63% Process Information / Training 22 54% Frequently Asked Questions (FAQ) / Support Information 18 44% Commonly used resources, URL's to applications, documentation, Contact Information, etc. No problems getting things here. Privacy / Confidentiality - Limit the visibility.

Wiki 105
article thumbnail

Wikis for Improving Productivity

Experiencing eLearning

Security: They have passwords visible on the wiki, but that’s OK b/c the security of the wiki is OK–must log in to view the confidential content. They used to keep contact info for vendors in Outlook, but had problems keeping consistent across multiple contact cards. They’ve made feature requests but no problems.

Wiki 170
article thumbnail

Features Of Best LMS Software

Folio3

A top LMS should be able to monitor and record training activities and notify management when problems occur as an added measure of security for the business. Maximum Security For Hosting Options Irrespective of the LMS vendor, data security procedures need to be set up to guarantee that confidential business data is secure.