• Sep 03
    2013
    More than three-quarters (78%) of U.S. white collar workers now use mobile devices for work. Organizations are increasingly adopting mobile versions of critical applications, such as customer relationship management software. Increasingly, employers want to give employees constant access to business information and job tasks.instructor-led training But this constant access comes at a price. Every week brings headlines about new security breaches. Large websites like Amazon.com are under constant attack. International ...
  • Aug 26
    2013
    In a world of thieves and vandals, mobile devices are “data-rich targets.” They are brimming with emails, passwords, credit card numbers, GPS coordinates, and whatever data they can download from your corporate network. In addition, they are often connected unsecurely with laptops, desktops, and networks. Mobile Tech Training An article on the CompTIA IT Careers Blog in May surveyed the current state of security in mobile app development. The article ...
  • Aug 19
    2013
    We all take for granted that we live in a world of revolutions. From computers to communications, healthcare, and entertainment, the way we live is regularly upended. But cell phones in our pockets, the knowledge of the world at our fingertips, and pharmaceuticals that cure our diseases are only the most visible of our revolutions. There’s another revolution we are living through. It began several centuries ago, and it has ...
  • Aug 12
    2013
    If you have read many of these blog posts, you know Logical Operations is a great believer in BYOD because of its potential for e-Learning. And I think we have put our money where our mouth is in Logical CHOICE, our training and content delivery platform accessible on any device for anywhere, anytime learner access.BYOD - Bring Your Own Device So we try to follow news and trends related to ...
  • Aug 05
    2013
    In 1947, B. F. Skinner reported in a scholarly journal on an experiment which he said caused pigeons to behave in ways that seemed a great deal like superstitious ritual. Skinner had built a machine that automatically dispensed foot pellets to the birds on some schedule of his devising. The birds tended to replicate whatever behaviors they had been performing at the time the food was dispensed. The result was ...
  • Jul 26
    2013
    One of the principal advantages of cloud computing can also create a major nuisance for eLearning. “Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places,” according to Wikipedia. What happens to Online Learning if the maintenance of the application includes a change in the interface? Last week I suggested that most application training ...
  • Jul 22
    2013
    Contrast, repetition, alignment, and proximity are the fundamental principles of screen design. You can use their first initials to create a mnemonic that is unfortunately ugly but easy to remember. I’ll give you a minute to work it out. I’d rather not use the word. What, if anything, does it have to do with eLearning? Screen design is critical to application training, because most of application training is interface training. ...
  • Jul 15
    2013
    I was thinking about business training course development recently when a friend told me about his experience of working in a doctoral program in history at an American university in the 1970s. His program required completing a year’s worth of history seminars as well as gaining reading competence in two foreign languages. But these requirements were just a warmup for the main event: the preliminary examination. The preliminary examination, or ...