article thumbnail

LearnTrends: Personal Knowledge Management

Experiencing eLearning

Big KM = enterprise KM, lots of structure. A PKM Method. Not the only method–not something to force people into, just one way. Social bookmarking sites are less often blocked by corporate firewalls. Little KM = processes used by distributed teams. Personal KM = ad hoc, DIY, cheap/free.

article thumbnail

Employees Avoiding Corporate Barriers

Nick Leffler

If barriers are in place to share files and collaborate on documents, employees will probably go to external methods. Even a barrier as small as needing to sign into a firewall is big enough to make an employee avoid security measures. You might also enjoy: Challenges and Barriers to Mobile Learning in the Enterprise.

Wiki 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Using E-learning for Cybersecurity Training

Capytech

This includes: Putting systems in place such as firewalls, virus and malicious software detection programmes, etc. Even with enterprise-level security infrastructure in place, an unwanted third-party can still gain access if a member of your team gives them a password or clicks on a link that secretly installs malicious software.

article thumbnail

Friday Finds: The Best of Learning, Design & Technology | April 12, 2019

Mike Taylor

First up is a big enterprise software platform rollout that looks like will have me tapping into a broad set of modern workplace tactics. I’ll also be back to navigating the world of corporate culture, firewalls, and all the things that come with it. The news of the week is that I’ve started a new gig, consulting with Change 4 Growth.

article thumbnail

Software as a Service SaaS Implications for the IT Security Workforce

Training Industry

In this case, it is likely that sensitive data will be stored and controlled by the SaaS provider and used by an organization’s customers or partners so that the data never comes in contact with the organization’s network, firewalls, or any other security device or process controlled by the organization.

article thumbnail

How Can Businesses Ensure Cloud Platform Security?

Hurix Digital

The old method of adding static walls to on-site IT assets don’t work for cloud, implying that cloud platform security needs a more robust approach. Also Read: How Can Enterprises Benefit from a Successful Cloud Migration. But when this data is stored on the cloud, companies have less control over leaks and thefts.

article thumbnail

Digital Asset Management – LCMS, ECM and SharePoint

Tony Karrer

Does your enterprise content management solution provide this for you? Even still, most of these companies use relatively simple organization methods and the issues are getting developers to contribute assets, catalog them and then provide effective search and browsing. Does the LCMS already provide this for you? eLearning Technology.