Firewalls and Security in Software as a Service

Tony Karrer

Tools - A Summary - was general consensus around: Software as a Service is Great for Learning Professionals inside Corporations Firewall restrictions still pose a problem for SOME services Security is a concern, but generally should not stop use The reason that Software as a Service is so attractive is that it is often hard to get Corporate IT to spend time on getting even simple software packages set-up and even harder to get them to agree to support these packages.

Formal Learning vs. Informal Learning

Learningtogo

While studies vary on the exact percentage, most learning in today’s workplace is informal. In this post, we’ll distinguish between informal and formal learning and explore ways to identify and encourage informal learning within your organization. What is informal learning?

Social Bookmarking behind the Firewall

Corporate eLearning Strategies and Development

Instead of having a closed committee of “experts&# sitting in a room deciding how to organize the information you rcv, YOU, and communities of practice you belong too, decide, tag, and bookmark. Techcrunch introduced me to Connectbeam. Connectbeam is just another company convinced that the activities of this new web generation will be a productive part of how we do business. It’s another tool that democratizes the web.

Informal Learning – the other 80%

Jay Cross

The start-up stiffed me but the paper morphed into the Informal Learning book. I’ll be leading a series of master classes on informal learning and working smarter in Europe. Informal Learning – the other 80%. Informal learning is effective because it is personal.

Learning and the Changing Workplace – Part 1

Tom Spiglanin

Jay Cross recently summarized presentations by Peter Henschel from 1999, calling for changes in L&D and how most learning is social and largely informal. And virtually all of them envision these as forms of formal learning, taking place behind the corporate firewall.

Change 130

Top 9 e-Learning Predictions for 2014

Learnnovators

Learning Modes (Informal Learning/Social Learning). Social Learning/Informal Learning. The 70:20:10 Forum continued playing a major role in spreading the positive implications of embracing informal learning in organizations.

Learning and the Changing Workplace – Part 3

Tom Spiglanin

When an organization’s data, information, platforms, and services are housed in the cloud and outside the corporate firewall, employees have more facile access to their information and will be more free to work at times and places of their choosing.

Change 130

Frequently Asked Questions (FAQ) for Adobe Captivate

Adobe Captivate

Pricing and purchasing information. Support information. Subscription information and pricing. Pricing and purchasing information. Support information. If your company has firewall restrictions that prevent the computers from connecting to the Internet, have your IT administrator contact your local Customer Service. I work for a company that has a license with Adobe, and our company systems do not connect to the Internet due to firewall restrictions.

FAQ 40

Learning and the Changing Workplace – Part 2

Tom Spiglanin

They’re looking to decommission their behind-the-firewall server farms, applications, services, and platforms by migrating to more cost-effective cloud-based infrastructures that are also “elastic,” able to be expanded and contracted as needed.

Change 130

L&D: Learning and Dystopia

Association eLearning

The thought tracker on her left wrist lit up briefly as it logged the new information. “I’m I tried to talk IT into letting you project in but the firewall is the firewall, no exceptions for non-personnel.”. “It’s Error, information not found,” Ms.

Cammy Beans Learning Visions: My Top Ten Tools for 2009

Learning Visions

Google Reader Its how I stay informed on the latest blog posts and news. Not only is Twitter great for the occasional laugh, but also a great source of information and links. My iPod Touch I know that this is a piece of hardware, but it makes learning and recording information on the fly a breeze, at least when theres wireless around. Hey Mark, Would love to hear more about how youre using Yammer within the firewall as well as those IJAs youre creating with Articulate.

Giving up control

Jay Cross's Informal Learning

In an article titled Taking the Social Media Plunge: Learning to Let Go , Andy McAfee explores the reluctance of traditional organizations to embrace social media (and informal learning). They’re worried about secrets slipping over Chinese walls and firewalls.

Discover Your Organization’s Learning Ecosystems

Watershed

While many learning opportunities are obvious, others can be subtle—such as informal conversations or impromptu Google searches. Employees may be using hundreds of informal pathways to learn new things. These informal learning programs have their own informal learning ecosystems that can consist of mentors, peers, performance support tools, Google, YouTube, industry publications, and many other resources. Informal Learning. Outside the Firewall.

7-Steps to Creating an Effective E-learning Program Part 3: Online Learning Systems

Your Training Edge

On the design side, would you like to see a built-in content development engine, where content developers can essentially “dump” information into the LMS and create effective courses? Your existing content has been converted and your new content is ready to be delivered. Now what?

How to Replace Top-Down Training with Collaborative Learning (3)

Jay Cross

In its place enters social and informal learning hubs like on-demand content, live online discussions, wikis and forums, and searchable content archives. A diverse learning library, made up of videos, FAQs and links to relevant information. Community Informal Learning ITAshare Web 2.0

Your Team for the Win?

Litmos

Yet, hackers are on the offensive and their Lombardi trophy is your Personal Health Information (PHI). Create a game plan through education and let your staff become your human firewall. It’s hard to believe that January 2017 has come to a close.

Teams 64

Mitigating the Risks of BYOD in corporate learning

G-Cube

Passwords, Firewalls and Encryption: The platform of corporate learning is the enterprise Learning Management System for most organizations. In addition to authorized Passwords, Firewalls can be installed to allow only authorized devices to access the enterprise LMS.

Lectora Online V2.0 is Coming

Trivantis

1) Escape the Firewall – You need to be able to work across states, countries and even continents. Working in the cloud lets you access project information securely outside your company’s firewall.

Eight Tips for LMS Implementation

Upside Learning

We looked at a series of things focusing on the right way to go about open source LMS , in case you are switching to a new LMS system , the critical consideration on how to decide between hosted and behind-the-firewall option , and even a few tips on what not to do while selecting an LMS.

Tips 173

Lower Your Cybersecurity Risks with Proper Employee Training

Your Training Edge

A cybercriminal’s best chance at getting your company’s information is through a poorly trained, poorly motivated employee. A cyberattack may disable or bypass your technical safeguards, such as a firewall or antivirus program.

Shifting from Trainer to Community Manager

Bottom-Line Performance

Knowledge workers are constantly pursuing the information they need to perform their jobs. While L&D is able to design, develop and deploy these courses in a highly prescribed, organized way, learners are constantly in need of new information throughout the course of their work days.

3 Steps to Maximize Volunteer Engagement

Litmos

Your volunteers will be exposed to your benefactors personal information, possibly medical conditions, as well as Personal Identifiable Information (PII), including the amount of money they have donated. Using a secure firewall?

Blending social and mobile

Bottom-Line Performance

The term “social learning” – along with “informal learning” – has been bandied about for a couple years. The concepts of social learning and informal learning are intertwined with social tools such as Facebook, blogs, microblogs (e.g.

This Week on #TalkTech: Apple Slows Innovation, PKM Not a Technology, and Digital Natives

Bottom-Line Performance

Topic 2: Personal Knowledge Management (PKM) is Not a Technology…so how do we help organizations learn informally? Harold Jarche, writer and consultant on social learning and PKM, often explains that informal learning is how we naturally learn and NOT a product that can be purchased.

PKM 156

Engage in Learning Launches Learning Materials to Help Prevent Card Fraud

Engage in Learning – for Business Minds

Complying with PCI DSS means that an organisation is doing its best to keep its customers’ information safe, secure and out of the hands of those who could use that data in a fraudulent way. Build and Maintain a Secure Network - install and maintain a firewall configuration to protect data. Encrypt the transmission of cardholder data and sensitive information across the public net. Some £58bn was spent via credit and debit cards in the UK in April last year - some 6.8

Surprise! Knowledge Guru Summer Release Adds SCORM, Security Features

Knowledge Guru

That means players can access it on a company intranet or behind a firewall, if you’d like. We’ll test drive the SCORM version of Knowledge Guru, show off the new security features and provide information on how to test Knowledge Guru in your LMS environment.

8 E-Learning Tips I Wish I Knew When I First Started to Build Courses

Rapid eLearning

Go Beyond Information Sharing – 5 Ways Your E-learning Courses Can Create Understanding. Lo and behold, all of the projects are locked behind a firewall and the person has nothing to show. Many of the courses I see are mostly information dumps.

Learning Solutions Conference Day 1, my recap

Challenge to Learn

and are very informal. In fact the cloud is nothing else then a bunch of web servers behind a firewall, like the servers data would live on your corporate servers. Yesterday we had day 1 of LSCON2013 and here are my findings.

Why Cybersecurity is an Every-Employee Initiative

Avilar

The list of hacker attacks, data breaches, information leaks and other cybersecurity incidents is varied, long and growing. Yet hackers from around the world are active and bold – cooking up more devious ways to access personal data and company information. Websites : Only visit secure websites – especially if they require a password or financial information. If it’s not there, skip the site and find the information from a secure source. Edward Snowden and the NSA.

Search - Implications on Knowledge Work

Tony Karrer

This post was sparked by a couple of recent articles: Babson Knowledge: How Google Plans to Change the Scope of Googling (And Why Information and Knowledge Workers Should Care). InfoWorld: Reinventing the Intranet These articles point out what we already know: It is generally easier to find stuff that is in the mass of public information than it is to find stuff inside our own corporations.

Answers: How Do I Get Started With xAPI?

MakingBetter

We’ve put out a few posts and articles that should help with some general information — like, what is the value proposition of the Experience API? Getting Started.

xapi 151

5 Top IT-enabled business trends that are affecting Corporate Learning

G-Cube

Developments in information technology affect every nook and corner of the business world – creating leading trends that dictate business discourse and atmosphere.

Trends 185

Piecing together collaboration and cooperation

Clark Quinn

Note that the firewall tends to cross the middle of the diagram, and by blocking access you’re effectively cutting off a portion of the corporate brain!

Web 2.0 Tools in the Enterprise

Tony Karrer

Then I saw Bill Ives Is Blogging Inside the Firewall an Oxymoron? It could be information about how to use some software, or interesting content that people have collected about a topic, or whatever. I first saw Andrew McAffee's post on uses of Web 2.0 approaches inside of corporations - quite good at identifying some different patterns.

Steps for Designing a Virtual Learning World Experience

Kapp Notes

Step Eight: Ensure that technical obstacles such as downloads, open ports, firewalls and graphic cards have been addressed. Step Nine: Create guidelines to inform facilitator and learners of what they will be doing in the virtual learning environment. Here is a step-by-step process for designing and launching a virtual world learning experience within an organization. Step One: Identify the learning objective and outcomes required of learners.

What is Cmi5? A new set of rules for xAPI

LearnUpon

The structure is imported rather than the content so the content can be hosted anywhere such as on another system, behind a firewall or on a mobile device. For more information on xAPI and cmi5 Download our free eBook. SCORM has long been the most common standard for eLearning content.

xapi 55

Organizational Knowledge Mastery?

Clark Quinn

And yes, the experiments can be outside the firewall, trying new things with customers and visitors and reading reactions, but that’s still in the realms of the understood or expected. It’s about flows of information, which can’t happen if you’re in a Miranda Organization.