• Sep 23
    2013
    “Half the money I spend on advertising is wasted; the trouble is I don't know which half.” The man said to be the author of this quote, John Wanamaker, was the founder of Philadelphia’s first department store. He was considered a marketing genius. In 1874, he was the first retailer to buy a half-page newspaper ad. Five years later, he was the first to buy a full page. I wonder ...
  • Sep 16
    2013
    Wikipedia has no entry for job instruction training (JIT). There’s an entry for jit, which is a style of popular Zimbabwean dance music, but there’s nothing for job instruction training. This surprised me, because most modern training, although it looks nothing like JIT, is built on the original JIT model, which was developed during World War II to train industrial workers to produce the weapons and supplies needed to wage ...
  • Sep 09
    2013
    Over the summer, the government of Switzerland issued guidelines to the country’s banks that could indirectly affect how you think about IT training. “The new guidelines”, according to CNNMoney.com, “allow the banks to apply for permission to provide the U.S. with certain information about offshore bank accounts. They're still blocked from revealing information about individual clients, but can share details about employees who worked on the accounts and about accounts ...
  • Sep 03
    2013
    More than three-quarters (78%) of U.S. white collar workers now use mobile devices for work. Organizations are increasingly adopting mobile versions of critical applications, such as customer relationship management software. Increasingly, employers want to give employees constant access to business information and job tasks.instructor-led training But this constant access comes at a price. Every week brings headlines about new security breaches. Large websites like Amazon.com are under constant attack. International ...
  • Aug 26
    2013
    In a world of thieves and vandals, mobile devices are “data-rich targets.” They are brimming with emails, passwords, credit card numbers, GPS coordinates, and whatever data they can download from your corporate network. In addition, they are often connected unsecurely with laptops, desktops, and networks. Mobile Tech Training An article on the CompTIA IT Careers Blog in May surveyed the current state of security in mobile app development. The article ...
  • Aug 19
    2013
    We all take for granted that we live in a world of revolutions. From computers to communications, healthcare, and entertainment, the way we live is regularly upended. But cell phones in our pockets, the knowledge of the world at our fingertips, and pharmaceuticals that cure our diseases are only the most visible of our revolutions. There’s another revolution we are living through. It began several centuries ago, and it has ...
  • Aug 12
    2013
    If you have read many of these blog posts, you know Logical Operations is a great believer in BYOD because of its potential for e-Learning. And I think we have put our money where our mouth is in Logical CHOICE, our training and content delivery platform accessible on any device for anywhere, anytime learner access.BYOD - Bring Your Own Device So we try to follow news and trends related to ...
  • Aug 05
    2013
    In 1947, B. F. Skinner reported in a scholarly journal on an experiment which he said caused pigeons to behave in ways that seemed a great deal like superstitious ritual. Skinner had built a machine that automatically dispensed foot pellets to the birds on some schedule of his devising. The birds tended to replicate whatever behaviors they had been performing at the time the food was dispensed. The result was ...