article thumbnail

Is training really the answer? Ask the flowchart.

Making Change

By Cathy Moore Here's a flowchart that will help you identify the best solution to a performance problem, whether it's a job aid, a workflow improvement, training, or something else. It's based on action mapping , my streamlined approach to instructional design. Get the flowchart: PDF or interactive First, download the flowchart.

Scanning 147
article thumbnail

An 8-Step Guide to Digitization for Book Publishers

Kitaboo

Book digitization , as the name suggests, refers to the process of creating digital versions of physical books, magazines, manuscripts and records. Destructive book scanning. In this method, the book has to be unbound and then scanned one sheet at a time. The loose papers are then fed into the document feeder for scanning.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How do you build eLearning?

B Online Learning

What is the learning outcome your client wants you to achieve, or the problem that needs to be solved? Are we sure we have identified the right goal, or is the real problem something else? Would a reference document do the trick instead? Let’s take a step back from the point of building, and ask some questions.

article thumbnail

An 8-Step Guide to Digitization for Book Publishers

Kitaboo

Book digitization, as the name suggests, refers to the process of creating digital versions of physical books, magazines, manuscripts and records. Destructive book scanning. In this method, the book has to be unbound and then scanned one sheet at a time. The loose papers are then fed into the document feeder for scanning.

article thumbnail

Worried About Course Security? Start With Your Website.

LearnDash

Provides malware scanning and firewall protection. The “multifactor” in this case refers to different ways to prove that you are who you are. These factors can be something you know (like your password or your username), something you “are,” like a fingerprint or a facial scan, or something you own, like your phone. VaultPress.

Security 344
article thumbnail

Bad Apple

E-Learning Provocateur

So I turned to my trusty adviser, Google, and found that I was not the only one with this problem. Thankfully he provided an alternative: scan the receipt and the card, then attach them to a reply email. However I had a second problem – because I didn’t buy the card myself, I didn’t have the receipt.

Apple 171
article thumbnail

AR Object Recognition: The Essentials And Two Examples In Training

Roundtable Learning

AR object recognition is one of three AR technologies that augments the real world by scanning a real-life 3D model and attaching a digital object to it. Learners scan the real-world 3D object, then a simulated 3D model is attached to it. The app stores feature descriptors that help identify the reference image. .