Remove Firewalls Remove Knowledge Worker Remove Network Remove Security
article thumbnail

eLearning Predictions Further Thoughts

Tony Karrer

I expected it to be about how to use twitter as a knowledge worker. This goes along with the prediction that employees will increasingly hack work so that they can get access to information and people they need to reach. People end up staying home to be able to attend virtual events. That should be a bit of a “wow”.

article thumbnail

Learning Organizations, eLearning 2.0 and Edupunk

Clark Quinn

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. Most knowledge workers are used to thinking about that type of content being created for internal use only. It makes sense in many of these cases to keep it inside the firewall.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Learning Organizations, eLearning 2.0 and Edupunk

Tony Karrer

Corporate IT is interested in rolling out systems that they can control for security, auditing, back-up and a host of other control reasons. Most knowledge workers are used to thinking about that type of content being created for internal use only. It makes sense in many of these cases to keep it inside the firewall.

article thumbnail

Ten years after

Jay Cross's Informal Learning

Networks are connecting everyone and everything. The coming of the network age is as big a change as any of us are likely to see. What is this Age of Networks and what does it mean to me? Rosabeth Moss Kanter likens the age of networks to the croquet game in Alice in Wonderland. The Information Era has arrived.

article thumbnail

SMBs and Social Learning Technologies

Janet Clarey

Challenges to SMBs: resources, culture, loss of control of information, fear of loss of productivity/abuse, security. For services outside the firewall, blockage continues to be an issue driven by such barriers as organizational culture, bandwidth limitations, security issues, IT resistance, and lack of resources. Action Plan.