article thumbnail

Social Media vs. Social Learning

Integrated Learnings

We also use tools such as Twitter, LinkedIn and other social media. In a lot of cases, we are using internal corporate social media tools to collaborate. This has included reading some books, attending some webinars, and talking with other learning professionals about how they are making social media work in a learning environment.

article thumbnail

Business Social Media Benefits

Clark Quinn

For the latter, I was asked to address the question: “what businesses can learn from allowing employees to access social networking sites, and how allowing social networking can benefit businesses?&# Second, investigations into people misusing social media and making inappropriate comments show rare violations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Where to Find the Best E-Learning Courses

Rapid eLearning

The Best E-Learning is Locked Behind a Firewall Although many high-quality courses are being developed, the issue is that the majority of them are proprietary and inaccessible due to a firewall. Occasionally, you may get a glimpse of these courses during webinars, conferences, or on social media platforms such as LinkedIn.

article thumbnail

Blog Book Tour: Social Media for Trainers--stop #9

ID Reflections

With her focus on the main tools that have grabbed “global imagination” namely, Twitter, Facebook, Blogs and Wikis, Jane Bozarth writes a lucid, eminently readable account of what technology has to offer in terms of Social Media tools and their position in the sphere of learning. Hardly ever. Imagine the efficacy of such training!

article thumbnail

Going the distance: Tips for managing and engaging remote workers

Learning Pool

These hubs are a halfway house between home and office and, as well as the infrastructure and space, offer some of the socialization that home workers may be missing. You need to guarantee access that doesn’t compromise firewalls and other data security measures. And encourage remote employees to start the conversation.

article thumbnail

How to Be CyberSmart in a COVID-19 World

Avilar

The MIT Sloan Management Review confirms that, “Since the COVID-19 outbreak began, the number of cyberattacks has soared as hackers have exploited a greater number of weakly protected back doors into corporate systems as well as the human distraction caused by COVID-19-related events.” Engage device-level protection.

article thumbnail

Shaping an eLearning Solution

Zephyr Learning

From the previous articles written, I have stated that learning will have to fit the way we are sourcing information today – games, apps, wikis, social tools etc, have all developed pure engagement attributes, which creates that desire for more! the scheduled event)? Accessibility. This wasn’t really true though. Application.