article thumbnail

Security for WordPress Websites with Kathy Zant from Wordfence Security Plugin

LifterLMS

The firewall that prevents malicious traffic from hitting your site is the major feature of Wordfence that helps to protect over 2 million sites on the internet. If you’re not watching your site, it can affect your search engine rankings. It’s primarily a firewall. Chris Badgett: What is a firewall for the non-techy?

article thumbnail

Peeragogy

Jay Cross

My workscape could include participating in a community of field technicians, looking things up on a search engine, and living in France for three months. Let me choose and subscribe to streams of information I’m interested in, like BoingBoing, LifeHacker or Huffpost. Show me what’s hot, like Reddit, Digg, MetaFilter, or Fark do.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Creating Online Social Learning Membership Sites with Web Development Agency Owner, BuddyPress Expert, and StudyChurch Founder Tanner Moushey

LifterLMS

We just created, basically, a custom activity stream element, so that whenever they answer a question, that custom activity item is created, it ends up right into that group stream. Is it a firewall issue? Everything is behind the firewall, so we don’t really have that component so much to worry about.

article thumbnail

SMBs and Social Learning Technologies

Janet Clarey

Noted main difference between main stream media and social media. For services outside the firewall, blockage continues to be an issue driven by such barriers as organizational culture, bandwidth limitations, security issues, IT resistance, and lack of resources. Social media enables everyone to publish/access info inexpensively.

article thumbnail

4 Secrets No One Will Tell You When Choosing Your Microlearning Platform

Obsidian Learning

Taken together, that means you’d like a single system for storing and tracking content and learner activity, and that system should reside behind a firewall with at least one and possibly more login requirements to prevent unauthorized eyeballs on sensitive information. Easy to access.