Firewall Problems and Solutions

Clark Quinn

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

Firewall Problems and Solutions

Tony Karrer

I would love to hear back from people on this as I received a question around firewall problems and solutions that I've not heard as much in the past couple of years. Their issue is that they are running into customers who are tightening their firewall settings and it causes some of their content to not work. Are you finding issues with firewalls these days? Anyone having issues with Windows Media and firewalls? Do Flash players cause any problems with firewalls?

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Hosted vs. Behind-the-firewall LMS – How To Decide?

Upside Learning

Adding to this dilemma is another level of decision making – whether to go for an OnDemand / SaaS / Hosted LMS service, or for a behind-the-firewall LMS deployment. If your organization has a strict (and I mean really strict) policy of not using hosted services for LMS (or other business applications), then you don’t have an option but to opt for a behind-the-firewall implementation. Be aware and sure of these costs before going in for behind–the-firewall deployment.

Has the SMCR created a new ‘accountability firewall’? [talking point]

Eukleia

Senior figures have continued to shelter behind an accountability firewall” 1. This brings with it, however, as an unintended consequence, the potential for this paperwork to be used to erect a protective wall around Senior Managers – in effect creating a new form of the very “accountability firewall” that the SMCR sought to remove. The post Has the SMCR created a new ‘accountability firewall’?

Blogging Inside or Outside the Corporate Firewall

Tony Karrer

I did suggest that they would either use a Wiki behind the firewall or use a password protected Wiki - because that's where the work product goes. If it's captured in a system inside the corporate firewall, it won't go outside. Stephen Downes commented on my recent post - Personal Work and Learning Environments (PWLE) - More Discussion and said - I am opposed to the trend coming from the corporate learning side of the house to treat PLEs as work tools.

Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

JIVE's clearspace takes social networking behind the firewall

Corporate eLearning Strategies and Development

experience behind the firewall. I've been watching Clearspace as one of those Enterprise products that just might have that something special that finally brings the Web2.0 R/WW reports tonight that Jive Software is releasing Clearspace2.0 tonight. The service takes on Microsoft's Sharepoint with a feature set that looks like something many consumer software users would be envious of. USAToday recently said that "Jive Software wants to be the Apple Computer of corporate social networks."

Jive 34

RSS: The new intranet protocol? Learning2.0 behind the firewall

Corporate eLearning Strategies and Development

It's not necessary when IT departments are deploying the informal learning tools behind the firewall. From ZDNet is the article RSS: The new intranet protocol? RSS is the LMS killer! Because it looks like LMS providers have been wanting to become all things to all people by trying to add KM, eLearning, ILT management, learning2.0, all into one package.

Can we talk?

Learning with e's

The Chinese people are finding their own ways around the 'Great Firewall of China', sidestepping filters, using proxy servers to gain access to the sites and ideas its government is trying to suppress. Tags: The Spectator firewall China Newsweek Google The World Wide Web may have connected many people together and made the world a smaller place in the short time it has existed, but it also has the potential to cause division and social upheaval. The web wars are hotting up.

When Does a Cloud-based LMS Make Sense?

Living in Learning

There was something about having my own staff running my own servers behind my own firewall that provided a sense of security and control. To an extent it did, and the IT staff would be the first to man the ramparts to fight off having anything living outside the firewall – much less allowing anyone outside to get into our systems. I feel their concern, and I respect the need to protect the network and data resources behind the firewall.

What To Include In Your Company’s First Security Training

eLearning Industry

With cyber scams like social engineering on the rise, firewalls and antivirus programs are nowhere near enough to protect sensitive data. In-depth security awareness and training is your best shot to defend your company against cybercrime. This post was first published on eLearning Industry. Learning Management Systems eLearning Security eLearning Security Tips LMS Security Mobile Learning Security

The Podfather (Part 1)

Learning with e's

DON PODLEONE: You never think to protect yourself with a firewall. with your firewall, the Stinger with the Freescan, Nanosera. firewall podcast spamA well-known scene from the film 'The Podfather' (Part 1).Dedicated Dedicated to a friend who was recently 'hit'. No names, no packdrill. DON PODLEONE: Nanosera, we know each other for years, but this is the first time you come to me for help. I don't remember the last time you invited me to your blogspot.

How Video-Based Learning Impacts The Future Of Corporate Training

eLearning Industry

Outside the firewall, the future of video-based learning is already here. How will the future arrive in your company? Here’s what you need to know to chart a successful path forward with video-based learning. This post was first published on eLearning Industry. Video-based Learning Corporate eLearning Best Practices eLearning eBooks Employee Engagement Employee Training Video In eLearning

xAPI Video Profile in Resource Videos

RISC

For this reason, we have now created support for Resource videos that reside elsewhere, even behind your firewall. RISC has long supported YouTube videos in the VTA Resource feature. This support includes xAPI statements to track usage. We realize that many customers cannot link to YouTube videos due to corporate policy. And our player fully. The post xAPI Video Profile in Resource Videos appeared first on RISC INC. Learner VTA xAPI and cmi5 Resources xAPI

xapi 40

Virtual Classroom Adoption – The Four Stages of Change

InSync Training

Organizations spend more time worrying about firewalls, security, hardware, and software (important topics all) than they think about adoption and usability. Adopting, and excelling at, the virtual classroom is much more about attitudinal change than it is about implementing technology. Ultimately, people need to BELIEVE that the virtual classroom will work.

Unable to Install Captivate 2017 – 64 bit

Adobe Captivate

In addition, I am not connected to any client network and my firewall is turned off. Dear Users, When I try to install Captivate 2017 – 64 bit in my machine, the setup file runs up to 3% and then stops. It doesnt throw any error messages or alerts but it keeps buffering at 3% with the installation time increasing a minute. I am using Windows 10 Enterprise Edition. Any suggestions or ideas would be highly appreciated. Regards.

Big IBM/Second Life Announcement this Week!

Kapp Notes

He let everyone know on his blog posting The i-web Singularity Redux that at Virtual Worlds III this week the announcement was made that Second Life has worked out a deal with IBM to move Second Life behind the IBM corporate firewall. If this can be a standard business practice for Second Life (living behind corporate firewalls) it is a removal of a huge obstacle for entry into 3D worlds for many industries like Pharmaceutical and Financial.

Eight Tips for LMS Implementation

Upside Learning

We looked at a series of things focusing on the right way to go about open source LMS , in case you are switching to a new LMS system , the critical consideration on how to decide between hosted and behind-the-firewall option , and even a few tips on what not to do while selecting an LMS. Again, this may not be true for a hosted LMS, but in case of behind-the-firewall option you may have to face such situations.

Tips 207

How to Be CyberSmart in a COVID-19 World

Avilar

Firewalls, networks, collaboration tools, and servers should all be configured to accept – and track – remote access. Do you provide firewalls and tech support for personal devices?

How to Design Cybersecurity Training for Employees: 4 Best Practices

Absorb LMS

Humans are less predictable than the technology your organization uses to prevent cybercrime, like firewalls. An incredible 35% of data breaches are caused by human error, according to the Office of the Australian Information Commissioner. In some industries, such as health care, over half of breaches are caused by insider error.

cp 8 not recording background

Adobe Captivate

This issue occurs with or without admin access, and with or without firewall blocks. I am recording an application e using cp 8.0.3.290. Recently, the program stopped recording the background of the application. The filmstrip below is an example. You can see what the library shows below for a bad background (#1) and a good background (#3). I cannot edit, edit, import, or otherwise fix the background. I have tried many instances of recording, preferences, et cetera.

Online Workspaces with Acrobat.com

Take an e-Learning Break

No more sending out e-mails with multiple attachments to teams or individuals outside of your firewall. Easily distribute and collaborate on a set of documents related to a project. Sign up for a free account to try it out: five PDF conversions total, three person web conferencing, online office applications and forum-based support. Check it out: [link

Leadership Webinar Wisdom: Six Critical Elements for Engagement and Learning

InfoPro Learning

There’s no getting around it… webinars involve technology and technology (the Internet, your computer, your webinar administrator’s computer, the webinar platform system you are using, your firewall, even your power) can have its good days and its bad days. Involving the Learner. Webinars pose a challenge to the basic adult learning principle of involving the learner in experience-based activities that have immediate relevance to work.

Learning and the Changing Workplace – Part 2

Tom Spiglanin

They’re looking to decommission their behind-the-firewall server farms, applications, services, and platforms by migrating to more cost-effective cloud-based infrastructures that are also “elastic,” able to be expanded and contracted as needed. In traditional information technology (IT) infrastructure, the firewall connects the workplace to the Internet while protecting workplace IT assets and the proprietary information they contain.

Change 100

Mitigating the Risks of BYOD in corporate learning

G-Cube

Passwords, Firewalls and Encryption: The platform of corporate learning is the enterprise Learning Management System for most organizations. In addition to authorized Passwords, Firewalls can be installed to allow only authorized devices to access the enterprise LMS. The trend of Bring-Your-Own-Device is on the rise and is seen capturing the interest of employees as well as organizations.

Five Reasons Why Technology Still Hasn't Totally Taken Off in Schools

The Learning Dispatch

Firewalls, filters, and strict school policies are the culprit here. School Internet Use Policies Are Restrictive This makes sense: technology isn''t going to be a big hit with schools that have drawn boundaries for its usage. A 2011 report from Project Tomorrow indicated that 53% of middle and high school students are not able to use cell phones, smart phones, or MP3 players in their schools.

Social Networking – A Contrarian View

Upside Learning

Sure, lots of companies want to replicate ‘Facebook’ behind the firewall; safe from prying eyes, but open enough for employees to freely express themselves. Today, I’m going to adopt a contrarian view. We all know social networks promote learning; while the mechanisms aren’t documented or well-understood, that it works isn’t in doubt anymore. But we must ask, are the ‘social media/networking systems’ out there promoting this learning? Or does it happen in spite of these systems?

Piecing together collaboration and cooperation

Clark Quinn

Note that the firewall tends to cross the middle of the diagram, and by blocking access you’re effectively cutting off a portion of the corporate brain! In an insightful piece , Harold Jarche puts together how collaboration and cooperation are needed to make organizations work ‘smarter’, integrating workgroups with the broader social network by using communities of practice as the intermediary.

Corporate Social Bookmarking Tools

Tony Karrer

I was just asked on twitter about use social bookmarking tools that work behind the firewall. I thought I had blogged about this before, but I'm not finding the post. Here are the social bookmarking tools that I commonly cite in presentations: BEA Pathways Cogenz Connectbeam del.irio.us - perl based, very similar to del.icio.us IBM Lotus Connections Scuttle – Open Source WSSsearch - SharePoint add-on Any others? Good comparisons of these?

L&D: Learning and Dystopia

Association eLearning

I tried to talk IT into letting you project in but the firewall is the firewall, no exceptions for non-personnel.”. “It’s You know that feeling you get when something is hyped as “the ultimate solution”? If you’re like me your reaction is probably along the lines of, “That’s too good to be true. Therefore, it probably isn’t true.” Back in the day, household radio sets were going to be the big breakthrough for learning.

A bit more detail

Clark Quinn

Those communities span both internal to the organization (if it is big enough), but also across the firewall out to other practitioners that are in other organizations. In the Coherent Organization model that we (the ITA ) came up with, it talks about how work teams are fed by and feed up to communities as they too feed up to and are fed from social networks. And while this is all good, it may not be completely clear. So I tried to take a pass at representing it another way.

8 Cybersecurity best practices to keep your small business safe online

Matrix

Use a good firewall. A firewall ensures that none of the programs running on any of your devices/systems are infected by any virus, malware, spyware, or any other kind of malicious program. It’s essential that you invest in a good firewall program for your small business because that single investment can go a long way in protecting your data and systems from hackers. Running a business nowadays is as challenging as ever.

Speaking today (noon ET) at Train-For-Success

Kapp Notes

It does not work through most corporate firewalls. Join us for the new season of Train for Success with a panel of virtual worlds thought leaders: • Karl Kapp, Professor at Bloomsburg University, consultant & author of “The Gamification of. Learning and Instruction” and “Learning in 3D”. Maria Korolov, editor of Hypergrid Business, president of Trombly International. John “Pathfinder” Lester, blogger and Chief Learning Officer at Reaction Grid.

New Hire Onboarding Blog or Social Network

Tony Karrer

How about asking select new hires to keep an inside the firewall blog as they begin their jobs at your company? Just wanted to through an idea at everyone that came up during several discussions today at DevLearn. or If they come into the company in waves, how about providing them a discussion group or better yet a social network tool that has good discussions as a means of communicating with each other and with coaches? Is this already being done all the time? If not, why not?

A Tale of Two Seminars: FUN Compliance Training and Virtually Real Conversations

ThinkingKap Solutions

Firewall Compliance Training. Within this client, everyone turned to a single person as the “face” of their firewall policy. She wanted to detach herself from being the only place people turned for firewall info, so we created a new face. The firewall course used our VR Conversations ( Virtually Real Conversations) technique to bring the narrator to life.

Lectora Online V2.0 is Coming

Trivantis

1) Escape the Firewall – You need to be able to work across states, countries and even continents. Working in the cloud lets you access project information securely outside your company’s firewall. Have you been dreaming of developing in the cloud, but can’t find an easy-to-use tool? Or maybe you already use Lectora® Online and love it, but wouldn’t mind a few updates. I have good news for you. Dramatic pause. Lectora Online V2.0’s

How to Protect Your Organization from Cybersecurity Attacks During COVID-19

KnowledgeCity

Firewalls and filtering are useful in preventing DDoS attacks. In the meantime, do these things to arm yourself against attacks: Keep firewalls turned on – A firewall can protect your computer from attackers by creating a barrier between an untrusted network and a trusted network Install antivirus software and keep it updated – It’s a good idea to invest in antivirus software to prevent malicious programs from attaching to your computer.