article thumbnail

Learning and teaching with Twitter

Learning with e's

I have presented a few workshops now on how to use Twitter as a learning and teaching tool. One of my most viewed blog posts was entitled Teaching with Twitter so there is a lot of interest in the topic - how can we harness the potential of this tool in a teaching and learning context? Unported License. Unported License.

article thumbnail

The Smart Worker : relies on a trusted network of friends and colleagues

Jane Hart

For many people, social networks like Facebook, Twitter, LinkedIn and now Google+ have become important parts of their personal and professional lives in this respect. Twitter: “I learn something new several times a day and stay connected with people that form my most valuable network.&#

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shelter

ProProfs

Copyright © 2005-2013, Hotchalk Partner ProProfs.com | Training Maker | Flashcards | Polls | Brain Games | Privacy & Terms | Sitemap | About Us | Contact. animal shelter. -->. -->. NCDCC CD Shelter Theory Assessment. -->. Shelter Test your knowledge of shelter procedure " />. Get Quiz Takers Now. Share On: Facebook. Grab the link.

Quiz 40
article thumbnail

Here’s What You Need to Know About Informal Learning

Rapid eLearning

As you know, we’re a research lab and many of our projects are confidential. You’ll need a device like the Toot-N-Scoot™ to maintain your privacy and personal space so that you can remain productive. Three Practical Ideas for Using Twitter in E-Learning. Is there anything that you can share with us today? Interesting concept.

article thumbnail

extra q chap 3 matching

ProProfs

The ability to move to another directory could allow an unauthorized user to view confidential files or even enter commands to execute on a server. Copyright © 2005-2013, Hotchalk Partner ProProfs.com | Training Maker | Flashcards | Polls | Brain Games | Privacy & Terms | Sitemap | About Us | Contact. Remove Question Excerpt.

Server 40
article thumbnail

Cybersecurity Training for Employees: Ultimate Guide

WhatFix

Share on twitter. Attackers try to get employees to click on a malware link or use fraudulent communications to obtain confidential information and passwords. Reinforce confidentiality. Team members well-trained in cybersecurity measures must understand the importance of confidentiality and the measures necessary to protect it.

article thumbnail

Is Your m-Learning Secure? The Threat and How to Avoid It.

Trivantis

Part of the security threat lies with disgruntled employees who now have easier access to confidential company information on many different devices. The other security threat has to do with how you deliver and manage important company documents and information. Choose a secure m-Learning platform.