article thumbnail

From “learning technologies” to “social technologies”

Jane Hart

Whereas many individuals are happy to use their own social tools to power their own and their team’ activities, most organisations generally prefer them to use some sort of internal enterprise platform to keep the conversations and content private and secure. Content co-creation tools.

article thumbnail

How to Make BYOD Work

CLO Magazine

Even though most of them have a personal mobile device, Sue Puhlhorn, the company’s senior director of learning and organizational effectiveness, said those hourly employees need to learn on site when time can be scheduled. In that environment: •Sensitive information is already tagged, secured and monitored.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ready or Not, The Future Is Now

CLO Magazine

PeopleSec uses machine learning and artificial intelligence in its computer security awareness training to reward employees for good behavior, and to increase training requirements for those who are higher risk. “We We can be more invasive with employees who need it the most, and less invasive with the rest of the staff.”. “If

article thumbnail

How to Create a Hobby Niche Training Based Membership Site with Steady Lead Flow with Fisherman Devin Denman

LifterLMS

He turned 18 years old in boot camp, he turned 21 on his second deployment to Iraq, and after he got out of the Marine Corps, he went to work for the State Department as a personal security specialist. I was waiting for a security clearance to come through. Hell no man, I started out with a security company here in Louisiana.

Site 108
article thumbnail

What Universities Must Learn About Social Networks

Jay Cross

The social business bandwagon has arrived and companies are installing Chatter, Jive, Connections, Socialcast, Yammer, Socialtext, Sharepoint, HootSuite, and more to replace outmoded intranets and improve the way they transact business. Very much like the continuous changes in social network software, network security is a day to day concern.

article thumbnail

Meet the Team Part 3: Simon Birt, VP of Global Business Development

eFront

This is for a few key reasons: the ability to deeply integrate and embed learning into workplace software such as IBM Connections, SAP Jam, Jive-n and Yammer; the need to ensure complete data integrity and security; and the need for a great user experience around learning content delivery, management and reporting.

Global 40
article thumbnail

Meet the Team Part 3: Simon Birt, VP of Global Business Development

eFront

This is for a few key reasons: the ability to deeply integrate and embed learning into workplace software such as IBM Connections, SAP Jam, Jive-n and Yammer; the need to ensure complete data integrity and security; and the need for a great user experience around learning content delivery, management and reporting.

Global 40