Remove Firewalls Remove Reference Remove Study
article thumbnail

Shaping an eLearning Solution

Zephyr Learning

A study carried out by neurologists in Brussels stated that the brain goes in to auto-shut down after 10 minutes if it is not stimulated! Throughout the eLearning series of articles we have referred to game based learning and the need to use utilise the game mechanics to deliver stimulating learning. This wasn’t really true though.

article thumbnail

How to Use Microblogging in Workplace Learning

Upside Learning

As a personal learning tool, Twitter is great but it’s a public platform and what you share on it is available to everyone, some organizations may need tools which can be installed behind their firewalls (Laconica, Yonkly) or that is available as a secure private service (Yammer). A Case Study of Micro-Blogging for Learning at Qualcomm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LMS Security and Compliance: Steps for Protection and Adherence

Gyrus

It involves measures like firewalls, encryption, and antivirus software. Compliance, on the other hand, refers to adhering to established guidelines set by regulatory bodies or industry standards. Utilizing case studies and simulations for practical application. Here are some LMS security methods : 1.

article thumbnail

Seven Tips for an Easy and Effective LMS Switch

Upside Learning

I’d written a few posts on how to decide between hosted and behind-the-firewall option , what typical things training companies look in an LMS for , and a recent one on five things not to do while selecting an LMS. Otherwise the same study may find an even higher number of customers not happy with their LMS next year as well.

article thumbnail

PLE - PWLE Discussion Contiunes - Corporate vs Personal and IP Rights

Tony Karrer

Clearly this is a different use of PLE's than those outside the firewall, for free rangers, and for learning from everything of personal interest. We've spent centuries studying this and we spend years teaching people these skills in schools. Stephen tells us. And they are not, therefore, PLEs. and Michelle says. Just do it.

PWLE 100
article thumbnail

LMS Security and Compliance: Steps for Protection and Adherence

Gyrus

It involves measures like firewalls, encryption, and antivirus software. Compliance, on the other hand, refers to adhering to established guidelines set by regulatory bodies or industry standards. Utilizing case studies and simulations for practical application. Here are some LMS security methods : 1.

article thumbnail

LMS Security and Compliance: Steps for Protection and Adherence

Gyrus

It involves measures like firewalls, encryption, and antivirus software. Compliance, on the other hand, refers to adhering to established guidelines set by regulatory bodies or industry standards. Utilizing case studies and simulations for practical application. Here are some LMS security methods : 1.