Remove Firewalls Remove Server Remove Services Remove Summary
article thumbnail

Firewalls and Security in Software as a Service

Tony Karrer

Thus, there is real attraction in being able to sign up for hosted services that provide these tools without Corporate IT being involved. For us to be successful doing this, we first need to make sure that the system will work with whatever firewall restrictions exist. Instead, we should have used Del.icio.us. That's its job.

Firewalls 100
article thumbnail

How WordPress Professionals Can Provide Recurring Revenue Services at Scale with Victor Drover

LifterLMS

But he has seen DIY customers with 5+ sites who just want to simplify the process, and then there are some enterprise customers with small IT teams who have a closed system but just take Watchful’s services to update a lot of websites at once without them have to do it as a huge project. And the timing was also very good, 2011, 2012.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

70:20:10 and user generated learning: no way!

Challenge to Learn

All updates, support and bug fixes are included in the services. I’m afraid nothing in this world is a 100% secure but I truly do believe that our SaaS solution is more secure than most ‘behind the firewall’ solutions. With Easygenerator all content always stays within the secure boundaries of our cloud server. No extra charges.

article thumbnail

Web 2.0 Applications in Learning

Tony Karrer

Tools - A Summary and particularly my use of the course wiki as the basis for putting course notes, having each team put up their work, etc. Firewalls - You can certainly install tools behind the firewall. You have to decide about inside the firewall vs. SaaS, but this shouldn't hold you back. There were a few others.

Wiki 105
article thumbnail

Notes from DevLearn and the Adobe Learning Summit

Steve Howard

interaction behind the company firewall – safe, secure conversations not visible to the public. e.g. if you are *accused* 3 times of piracy, you get internet service cut off, and your name circulated to prevent access elsewhere. ultimately companies will be able to run their own wave server – behind firewall if they want.