Firewall Problems and Solutions

Clark Quinn

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewall Problems and Solutions

Tony Karrer

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hosted vs. Behind-the-firewall LMS – How To Decide?

Upside Learning

Adding to this dilemma is another level of decision making – whether to go for an OnDemand / SaaS / Hosted LMS service, or for a behind-the-firewall LMS deployment. If your organization has a strict (and I mean really strict) policy of not using hosted services for LMS (or other business applications), then you don’t have an option but to opt for a behind-the-firewall implementation. Be aware and sure of these costs before going in for behind–the-firewall deployment.

Blogging Inside or Outside the Corporate Firewall

Tony Karrer

I did suggest that they would either use a Wiki behind the firewall or use a password protected Wiki - because that's where the work product goes. If it's captured in a system inside the corporate firewall, it won't go outside. Stephen Downes commented on my recent post - Personal Work and Learning Environments (PWLE) - More Discussion and said - I am opposed to the trend coming from the corporate learning side of the house to treat PLEs as work tools.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

Social Bookmarking behind the Firewall

Corporate eLearning Strategies and Development

Techcrunch introduced me to Connectbeam. Connectbeam is just another company convinced that the activities of this new web generation will be a productive part of how we do business. It’s another tool that democratizes the web. Instead of having a closed committee of “experts&# sitting in a room deciding how to organize the information you rcv, YOU, and communities of practice you belong too, decide, tag, and bookmark. It’s another shot at the white collar revolution.

RSS: The new intranet protocol? Learning2.0 behind the firewall

Corporate eLearning Strategies and Development

It's not necessary when IT departments are deploying the informal learning tools behind the firewall. From ZDNet is the article RSS: The new intranet protocol? RSS is the LMS killer! Because it looks like LMS providers have been wanting to become all things to all people by trying to add KM, eLearning, ILT management, learning2.0, all into one package.

9 WordPress Security Plugins to Protect Your Course

LearnDash

Two plugins performing the same function might conflict with each other, but you shouldn’t have any problems combining a plugin that specializes in firewall and malware detection with one that specializes in password controls. All In One WP Security & Firewall.

Can we talk?

Learning with e's

The Chinese people are finding their own ways around the 'Great Firewall of China', sidestepping filters, using proxy servers to gain access to the sites and ideas its government is trying to suppress. Tags: The Spectator firewall China Newsweek Google The World Wide Web may have connected many people together and made the world a smaller place in the short time it has existed, but it also has the potential to cause division and social upheaval. The web wars are hotting up.

When Does a Cloud-based LMS Make Sense?

Living in Learning

There was something about having my own staff running my own servers behind my own firewall that provided a sense of security and control. To an extent it did, and the IT staff would be the first to man the ramparts to fight off having anything living outside the firewall – much less allowing anyone outside to get into our systems. I feel their concern, and I respect the need to protect the network and data resources behind the firewall.

How Video-Based Learning Impacts The Future Of Corporate Training

Dan Keckan

Outside the firewall, the future of video-based learning is already here. How will the future arrive in your company? Here’s what you need to know to chart a successful path forward with video-based learning. This post was first published on eLearning Industry.

What To Include In Your Company’s First Security Training

Dan Keckan

With cyber scams like social engineering on the rise, firewalls and antivirus programs are nowhere near enough to protect sensitive data. In-depth security awareness and training is your best shot to defend your company against cybercrime. This post was first published on eLearning Industry. Learning Management Systems eLearning Security eLearning Security Tips LMS Security Mobile Learning Security

The Podfather (Part 1)

Learning with e's

DON PODLEONE: You never think to protect yourself with a firewall. with your firewall, the Stinger with the Freescan, Nanosera. firewall podcast spamA well-known scene from the film 'The Podfather' (Part 1).Dedicated Dedicated to a friend who was recently 'hit'. No names, no packdrill. DON PODLEONE: Nanosera, we know each other for years, but this is the first time you come to me for help. I don't remember the last time you invited me to your blogspot.

Why Are Finance Training Programs Important for Employees?

Infopro Learning

This is possible with eLearning, as organizations can train employees online within their VPN or firewall. As an ever-evolving global market, the finance industry moves quickly and adapts to new advancements just as swiftly.

xAPI Video Profile in Resource Videos

RISC

For this reason, we have now created support for Resource videos that reside elsewhere, even behind your firewall. RISC has long supported YouTube videos in the VTA Resource feature. This support includes xAPI statements to track usage.

xapi 52

Worried About Course Security? Start With Your Website.

LearnDash

Offers site monitoring to detect malware, firewall protection, and backup services. Provides malware scanning and firewall protection. Malware and firewall protection. Just like on your computer, you can also get malware and firewall protection for your online course website.

Virtual Classroom Adoption – The Four Stages of Change

InSync Training

Organizations spend more time worrying about firewalls, security, hardware, and software (important topics all) than they think about adoption and usability. Adopting, and excelling at, the virtual classroom is much more about attitudinal change than it is about implementing technology. Ultimately, people need to BELIEVE that the virtual classroom will work.

How Can Utilities Prepare Against Cyber Attacks?

BlueVolt

Like any technology, firewall and encryption is essential, but what about where the new technologies blend with legacy systems? In an article posted in. T&D World , David Shadle points out that.

Global eTraining Announces the Launch of New Revit and Autodesk Construction Cloud Courses

Global eTraining

These tools are an update of Autodesk’s BIM 360 project and design collaboration tools and allow users from different organizations to work without firewall access in real-time.

Big IBM/Second Life Announcement this Week!

Kapp Notes

He let everyone know on his blog posting The i-web Singularity Redux that at Virtual Worlds III this week the announcement was made that Second Life has worked out a deal with IBM to move Second Life behind the IBM corporate firewall. If this can be a standard business practice for Second Life (living behind corporate firewalls) it is a removal of a huge obstacle for entry into 3D worlds for many industries like Pharmaceutical and Financial.

How L&D is Changing the BFSI Sector Landscape

Infopro Learning

With VPN/firewalls in these systems educating employees happens in a secure environment. Modern learning, virtual learning, and learner experiences have undergone radical changes to fit the needs of today’s workforce. The digital age got an unexpected boost with the arrival of COVID-19.

Change 221

Unable to Install Captivate 2017 – 64 bit

Adobe Captivate

In addition, I am not connected to any client network and my firewall is turned off. Dear Users, When I try to install Captivate 2017 – 64 bit in my machine, the setup file runs up to 3% and then stops. It doesnt throw any error messages or alerts but it keeps buffering at 3% with the installation time increasing a minute. I am using Windows 10 Enterprise Edition. Any suggestions or ideas would be highly appreciated. Regards.

[Part I] How to Understand and Improve Your Moodle LMS Performance

eAbyas Info Solutions

Secondly, the network issues such as DNS, networking files, firewalls, etc. And finally, the firewalls and security tools have to be in sync with the software and the hardware to run the system smoothly.

The Weakest Link in Cyber Security

HCMguru

Of course, we have firewalls and security software but as it has been already pointed out, the most vulnerable point in this situation is your workforce and they have to be taught how to tackle the attacks on your company’s cyber presence. … are your employees. There. We said it.

Eight Tips for LMS Implementation

Upside Learning

We looked at a series of things focusing on the right way to go about open source LMS , in case you are switching to a new LMS system , the critical consideration on how to decide between hosted and behind-the-firewall option , and even a few tips on what not to do while selecting an LMS. Again, this may not be true for a hosted LMS, but in case of behind-the-firewall option you may have to face such situations.

Tips 207

Network Testing for Configuration Changes

Hurix Digital

Updates of Firewall rules: It is advisable to verify if a new firewall ruleset for blocking, or allowing, certain traffic is successfully implemented. Network testing, as the term implies, is the testing of a network to ensure that the network configuration is working as designed.

cp 8 not recording background

Adobe Captivate

This issue occurs with or without admin access, and with or without firewall blocks. I am recording an application e using cp 8.0.3.290. Recently, the program stopped recording the background of the application. The filmstrip below is an example. You can see what the library shows below for a bad background (#1) and a good background (#3). I cannot edit, edit, import, or otherwise fix the background. I have tried many instances of recording, preferences, et cetera.

Sitecore Connector

InWhatLanguage

inwhatlanguage Requirements: Pass through the enterprise firewall to access the on-premise installation. Firewall Configuration for On-premise installation: Installation must be accessible from the following IP addresses: 34.243.87.13 , 34.248.197.209 , 108.129.22.31 , 3.248.158.93. Available for. Enterprise editions. Get in touch with Sales for licensing questions. Sitecore is a web content management service that helps users build and manage websites.

Online Workspaces with Acrobat.com

Take an e-Learning Break

No more sending out e-mails with multiple attachments to teams or individuals outside of your firewall. Easily distribute and collaborate on a set of documents related to a project. Sign up for a free account to try it out: five PDF conversions total, three person web conferencing, online office applications and forum-based support. Check it out: [link

Going the distance: Tips for managing and engaging remote workers

Learning Pool

You need to guarantee access that doesn’t compromise firewalls and other data security measures. As the pandemic recedes remote working seems set to stay. So how do you manage employees who continue to work away from the office? Where we are.

How to Design Cybersecurity Training for Employees: 4 Best Practices

Absorb LMS

Humans are less predictable than the technology your organization uses to prevent cybercrime, like firewalls. An incredible 35% of data breaches are caused by human error, according to the Office of the Australian Information Commissioner. In some industries, such as health care, over half of breaches are caused by insider error.

Speaking today (noon ET) at Train-For-Success

Kapp Notes

It does not work through most corporate firewalls. Join us for the new season of Train for Success with a panel of virtual worlds thought leaders: • Karl Kapp, Professor at Bloomsburg University, consultant & author of “The Gamification of. Learning and Instruction” and “Learning in 3D”. Maria Korolov, editor of Hypergrid Business, president of Trombly International. John “Pathfinder” Lester, blogger and Chief Learning Officer at Reaction Grid.

Learning and the Changing Workplace – Part 2

Tom Spiglanin

They’re looking to decommission their behind-the-firewall server farms, applications, services, and platforms by migrating to more cost-effective cloud-based infrastructures that are also “elastic,” able to be expanded and contracted as needed. In traditional information technology (IT) infrastructure, the firewall connects the workplace to the Internet while protecting workplace IT assets and the proprietary information they contain.

Change 100

Make employees learn about the safety of home PC’s through an LMS

Creativ Technologies

Compromise of firewall : Once the hacker can install some malware on your system, the firewall becomes disabled leading malicious websites to open up on the system. In our age, implementing an LMS is an absolute necessity to deliver knowledge to employees.

How to Be CyberSmart in a COVID-19 World

Avilar

Firewalls, networks, collaboration tools, and servers should all be configured to accept – and track – remote access. Do you provide firewalls and tech support for personal devices?

ATUM Barium LMS runs on Raspberry Pi

Stratbeans

Forget LMS’ that run on cloud, also forget LMS’ that run on firewall. Please welcome LMS in your pocket. Yes sir, our ATUM Barium LMS runs on a pocket size card Raspberry Pi. So lets start with a punchline. Here is the screenshot of the hardware. This is how the welcome screen looks as we login to our LMS. Why was this done – 1000 ft view. We are living the IoT revolution, which is powered by low priced cards like raspberry pi, #microsoft waala, #intel waala.

Arlo has opened a new data center in the US for North American training providers

Arlo Training & Events Software

Servers are protected by a Web Application Firewall, VPC segregation, IP-restricted port access and hardened OS configurations. Recently, we announced a new Arlo data center in Canada.

Social Networking – A Contrarian View

Upside Learning

Sure, lots of companies want to replicate ‘Facebook’ behind the firewall; safe from prying eyes, but open enough for employees to freely express themselves. Today, I’m going to adopt a contrarian view. We all know social networks promote learning; while the mechanisms aren’t documented or well-understood, that it works isn’t in doubt anymore. But we must ask, are the ‘social media/networking systems’ out there promoting this learning? Or does it happen in spite of these systems?

Piecing together collaboration and cooperation

Clark Quinn

Note that the firewall tends to cross the middle of the diagram, and by blocking access you’re effectively cutting off a portion of the corporate brain! In an insightful piece , Harold Jarche puts together how collaboration and cooperation are needed to make organizations work ‘smarter’, integrating workgroups with the broader social network by using communities of practice as the intermediary.

Shaping an eLearning Solution

Zephyr Learning

Accessing secure servers for outside the company’s firewall was always a difficult task and in addition the fact that we needed a browser based device with us at all times was also problematic! Developing elearning tends to focus on three areas – content, design and technology, which really is a given, but there is no strategic substance to focus our vision and desired outcomes.