article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

I’ve gone thru my criteria before and the approach including weights and points based on a whole slew of categories including learning evironment, mobile, social, administration, reporting, learner functionality, capabilities of the system, technological infrastructure, training/support, overall service, forward thinking and adaptability.

Report 62
article thumbnail

Insight – The Top 50 LMS 2017 Report

eLearning 24-7

I’ve gone thru my criteria before and the approach including weights and points based on a whole slew of categories including learning evironment, mobile, social, administration, reporting, learner functionality, capabilities of the system, technological infrastructure, training/support, overall service, forward thinking and adaptability.

Report 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Question 1 - What are the most likely ways / places your organization might or does use Blogs, Wikis, Social Bookmarking, Social Networking or Collaboration Tools? DogEar – Social Bookmarking BluePages - employee-controlled profiles of 400,000 employees Daily online newsletter called w3. Choose the top 3-5. No anonymous users.

Wiki 105
article thumbnail

What is Data Security Training and Why Do You Need It?

ProProfs

The breach exposed the names, dates of birth, addresses, and social security numbers of the customers. Through word of mouth and powerful social media, reports of a data breach can make headlines in minutes. Along with this, safe harbor laws in some U.S. Financial Loss. Loss of customer trust is the main casualty.