Remove IMS Remove Security Remove Voice
article thumbnail

The Sound of Silence | Social Learning Blog

Dashe & Thomson

If you had to choose an eLearning provider solely on the basis of samples, and one gave you a module with just text, and the other gave you a module with text and a voice-over provided by professional talent, you’d be likely to think the latter represented the better product. Think about it. And you’d be wrong.

article thumbnail

Twitter as Social Learning: Seven Ways to Facilitate the Exchange.

Dashe & Thomson

This is a tool you use to react to something you see, hear or do and an opportunity to create a voice. Retweet – A great way to find your own voice is to use existing information (other people’s Tweets) and tell others what you think about it. People want to learn something from you. I think of Retweets as blog comments.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cisco releases Jabber

Jane Hart

Cisco has just released Cisco Jabber “a unified communications application that brings together presence, instant messaging (IM), voice and video, voice messaging, desktop sharing and conferencing into a single consistent experience across PCs, Macs, tablets and smart phones.

article thumbnail

How AI Can Boost Employee Productivity?

Webanywhere

Im joined by Sean Gilligan , founder of Webanywhere and a leading voice in AI and education technology. AI is unlocking so much potential for employees and businesses, so Im excited to share some insights today. Alex: That sounds like a win for security too. Sean, great to have you here. Sean Gilligan: Thanks, Alex.

Product 52
article thumbnail

The Ultimate Glossary of eLearning Terms

LearnUpon

The primary purpose of the LTI standard, created by the IMS Global Learning Consortium, is to connect learning systems, such as an LMS, with external service tools. PCI (Payment Card Industry Data Security Standard). SSL (Secure Socket Layer). All data passed between the web server and browsers remain private and secure.

article thumbnail

eLearning Conferences 2010

Tony Karrer

link] December 2, 2009 Security and Defence Learning : International Forum on Technology Assisted Learning and Training for Defence, Security and Emergency Services, 5 th , Hotel InterContinental Berlin, Berlin, Germany. link] December 7-11, 2009 Computer Security Applications Conference, 25 th , Honolulu, Hawaii, USA.

article thumbnail

eLearning Conferences 2011

Tony Karrer

December 2010 November 30-December 3, 2010 International Workshop on Cloud Privacy, Security, Risk and Trust (CPSRT), Indiana University, Bloomington, Indiana, USA. link] December 6-10, 2010 Computer Security Applications Conference, 26 th , Austin, Texas, USA. And send that to Clayton.