article thumbnail

Blogging Inside or Outside the Corporate Firewall

Tony Karrer

I don't personally think this is the right direction for individuals and in my recent presentations on eLearning 2.0 , I suggested in my examples for what this looks like in a corporate environment that people use a tool like Blogger. If it's captured in a system inside the corporate firewall, it won't go outside.

Firewalls 100
article thumbnail

Firewalls and Security in Software as a Service

Tony Karrer

For us to be successful doing this, we first need to make sure that the system will work with whatever firewall restrictions exist. For example, in our course, we found that Yahoo Groups were restricted in some corporate environments. Elluminate did not work through several firewalls, so we had to switch to WebEx.

Firewalls 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LMS Security and Compliance: Steps for Protection and Adherence

Gyrus

It involves measures like firewalls, encryption, and antivirus software. Security controls implementation includes technical measures like firewalls and encryption, access controls like user authentication, and physical safeguards like restricted access to data centers. Here are some LMS security methods : 1.

article thumbnail

How to Use Microblogging in Workplace Learning

Upside Learning

As a personal learning tool, Twitter is great but it’s a public platform and what you share on it is available to everyone, some organizations may need tools which can be installed behind their firewalls (Laconica, Yonkly) or that is available as a secure private service (Yammer). All these tools have functionality that’s similar to Twitter.

article thumbnail

Five Things Not to do While Selecting an LMS

Upside Learning

The web today holds a great deal of information on how to select an LMS, LMS Selection tools, directories of leading LMS systems, sample RFIs, and a whole lot of other very useful and handy information. Related posts: Top 5 reasons for implementing LMS: LC Survey Hosted vs. Behind-the-firewall LMS – How To Decide?

LMS 207
article thumbnail

LearnTrends: Personal Knowledge Management

Experiencing eLearning

For example, he now makes clearer blog titles so in 3 years he can find info easily, rather than being witty in his titles. Social bookmarking sites are less often blocked by corporate firewalls. This is related to the trust issue–I’m more likely to trust services that let me get my data out to back it up somewhere.

article thumbnail

4 Key Emerging Trends in LMS

Upside Learning

Gone are the days when having your own staff running your own servers behind your own firewall provided a sense of security and control. While there is no knowing for sure what will happen over the next 3 – 5 years, there are some key trends that may find a prominent place in the evolution of the LMS in the coming time. Cloud Based LMS.

LMS 270