This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
It was interesting to read this because when I was writing about a PLE really also supporting my work - I didn't think of it in the context of ownership of the work product. I'm sure that some employers would prefer to own the blog, i.e., it's a Sun Computer owned blogging system, therefore when you leave Sun you leave your content behind.
Dan Pallotta, president of Advertising for Humanity and HBR blogger, in a post titled “I Don't Understand What Anyone Is Saying Anymore”, writes about business jargon and how it affects communication in organizations. The blog post must have hit a nerve because it has broken the record for most comments to a single HBR Blog Network post.
Keeping with the theme of creating posts that really shouldn't be posts, but I need to have an appropriate page in my blog, I thought I should take the opportunity to create a page where I can list any and all disclosures about relationships with vendors, people, companies that may appear in my writing or speaking.
#SoMe for Trainers: Beating the Forgetting Curve This is the 9th stop of the Blog Book Tour for Jane Bozarth's new book, S ocial Media for Trainers. Needless to say, I am extremely proud to be a part of the tour and to have been invited by Jane Bozarth to add my thoughts along with thought-leaders and stalwarts in the field.
I am writing a book this year called "Learning in 3D" about using virtual worlds for learning, that will be a challenge as all of my books have been. Finding the time to write a peer reviewed article (I have said this the last 2 years, I need someone to hold me to this. I even have great research, just need to write it up.)
I'm writing this post for both attendees of the session to have some notes and for people who were not at the session to hopefully get value from the discussion that happened there. The suggestion by one audience member about requiring blogging (or similar forms) of sharing prior to a formal learning event was great.
The information in this series has been something I've been presenting, writing, blogging about and more recently doing workshops around. But I'm worried, because while I just got through writing about my concern in Using SharePoint that learning organizations seemed to be making the same mistake of Not Preparing Workers for Web 2.0.
€ When I originally conceived the course, I assumed that most attendees would know about Blogs, Wikis, etc. introducing 3 new technologies (blogs, BlogLines , wikis) at the same time is a bit much" "Specific introductory directions would have been helpful.†generally, but would not have experience using them.
You will want to know how your learners will access the course and anticipate any restrictions (firewall restrictions, for example). Christie Wroten graduated from Indiana Wesleyan University with a bachelors degree in English and Writing. When shes not writing about e-Learning, Christie enjoys traveling or playing piano and guitar.
Lots of widgets on the site View other users who are logged in and talk to them Watch videos of CEO, corporate commercials If logged in behind Sun Firewall, see Tag Cloud and more links to internal information. Blog Book Tour: Learning in 3D #lrn3d Allison Rossett: ELearning Isn’t What You Think It. They are really rocking.
Okay, yes, I am overreaching in the title of the post, but it was satisfying to write that because I am so massively frustrated by this. I was reading this blog post, and found myself nodding a lot. </rant> Tags: HigherEd Human Behavior Wackiness Academic Publishing Sux It's my blog and I'll rant if I want to.
Over at the Learning Circuits Blog the Big Question is "How do we break down organizational walls when it comes to learning?" A big barrier for too many organizations is simply getting access outside the firewall especially access to social media. Search This Blog. Blog Archive. My insights on elearning and mlearning.
Instead of just the rules, people will write about the best practices connected to these rules. I’m afraid nothing in this world is a 100% secure but I truly do believe that our SaaS solution is more secure than most ‘behind the firewall’ solutions. How is your writing and review process organized now? And we will gather data.
Give me a way to voice my opinions and show my personality, as on my blog. You can’t afford to replicate Facebook or Google behind your firewall. link to your blog and bookmarks, people in your network, links to documents you frequently share, members of your network. ing is on Google or YouTube. Others are not.
In this blog, we will explore the best compliance training vendors of 2024 who stand out for their extensive portfolios, creative strategies, and track histories of successfully providing compliance education. User data is protected by a strong hardware firewall with Litmos’ sophisticated security features.
If you follow my writing — even casually — you know how excited I am about the direction of LMS innovation and its ability to help organizations create business value. We founded this blog to research the industry and provide fiercely independent reporting and analysis of learning for measurable business impact.
My feed reader (I use Google Reader) tracks 160 blogs. At long last, there’s now a way to find the most important, essential writing about working smarter. I am encouraging companies to consider using private versions behind their firewalls for dynamic knowledge management. Less is more. That’s unwieldy. Social signals.
A decade ago, Roy Saunderson issued a challenge to himself: to write consistently, because “writing causes you to think differently,” said the CLO of Canada-based Rideau Recognition Solutions. Running his own blog and contributing columns to several industry magazines has him writing about recognition several times a week. “I
We have to create a learning environment inside the corporate firewall that is as rich and responsive as Google. A version of this post originally appeared on the LEO Learning blog. If someone is struggling with a task and the resource isn’t there at the moment of need, the opportunity is lost. Want to know more?
That’s short for a phrase that kept coming up in conversation when he was writing Enterprise 2.0. You probably can’t afford, and definitely don’t need, to create your own Facebook or Google behind your firewall. link to your blog and bookmarks, people in your network, links to documents you frequently share, members of your network.
Explaining complex technical procedures using video makes more sense than writing every little step down.even though that may need to happen as well, later. Obvisously the statistics will be much different. Manufacturing Example: What if each "area" had access to a video camera and upload computer station.
Obviously I have a professional interest in social networking and am particularly keen to find out how well it can work both inside and outsie the firewall and in a learning context. In this sense I would like Facebook to demonstrate more value than other online communities that I have participated in.
The first step discussed is how to write a security policy, which outlines the rules and regulations applicable to your company. The post 10 Cyber Security Resources appeared first on EdApp Microlearning Blog. It also includes articles and practical activities to increase engagement. . Resource Type: Online Course. Malware types.
Trained employees can serve as a human firewall that protects your organization from data loss, financial loss, and operational disruption. Considering the gravity of the issue, I’ve shared a few cybersecurity tips for employees in this blog post. Make a Note of Unsafe Behaviors in the Workplace.
Use a password manager to keep them all in one place without having to memorize them or write them down. IT Professionals : The CIO and IT team are responsible for making sure that the file servers, firewalls and company-supplied devices are all set up on a secure network. Or contact us for a conversation. We’d love to help!
Subscribe to our blog to get the latest on SCORM delivered to your inbox. But given the scrutiny both technologies are under, and their love/hate relationship with firewalls , JavaScript APIs represent a sensible approach. They also have a definition that states whether or not the attribute is read only or read/write.
Subscribe to our blog to get the latest on SCORM delivered to your inbox. But given the scrutiny both technologies are under, and their love/hate relationship with firewalls , JavaScript APIs represent a sensible approach. They also have a definition that states whether or not the attribute is read only or read/write.
OnPoint stepped up to plate here – to satiate pent-up demand in some and spark new interest in others – by introducing an integrated set of social features that blend “formal with informal” with support for PRIVATE mobile discussion forums, access to blogs and wikis, and support for mobile captured/user-generated content. Maybe next year.
… A Roadmap for Building an E-Learning Course - Rapid eLearning Blog , February 16, 2010 When we’re new and just getting started with elearning, we need templates and project plans to guide us. The result is a perfect fit to these unique competency-based programs, one that also supports the students after graduation. Read about it here!
We struggled for a long time for, do we want to become like a security company that is doing security research and think there would be a firewall and all those things like that. We actually have a blog post on the cheapest cloud storage both for the free plans and then the paid plans. Vic Drover: I appreciate you bringing that up.
Blog C4LPT Jane Hart Advice Workshops Social Learning Handbook Resources Contact Happy Christmas! Here are 5 key themes in my reflective blogging this year. Here are 5 key themes in my reflective blogging this year. Happy Holidays! Surely others could see how laughable they were!
Aspects like automatic firewalls, bot protection, all those features start being expected. Every WordPress freelancer, product creator, just regular user creating content, websites, and blogs and whatever, they have to get hosting. I can’t write a line of code. Chris Badgett: That’s awesome. Died years ago.
Years ago a start-up commissioned me to write a white paper that would help put them on the map. In his new book, Clusters of Creativity [4] , Rob Koepp writes “The dot-com craze was often seen in humanist terms — a force democratizing information, building online communities, increasing opportunities for entrepreneurs.
Proxy error or firewall problem. Morse code would have worked if I knew how to read/write it (and if the audience knew it too). On this occasion the technology amplified the distance, but hopefully this blog post will narrow the distance again, and that readers will contribute to a semblance of debate through the comments box below.
For services outside the firewall, blockage continues to be an issue driven by such barriers as organizational culture, bandwidth limitations, security issues, IT resistance, and lack of resources. Organizations are just beginning to use social media technologies and few are using the social learning technologies available in their LMSs.
As a blog post it’s probably pretty crap – too long, too much scrolling, but as a record of the event, and a method for me to retain my learning, it is just dandy, thank you. Hopefully you, my brave reader, can get similar value from my scribblings, but I make no apology for the size or the content of this blog post.
We organize all of the trending information in your field so you don't have to. Join 59,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content