E-Learning Platforms: The New Academy for Business Training and Education

WP_Query Object
    [query] => Array
            [page] => 
            [name] => e-learning-platforms-the-new-academy-for-business-training-and-education-87260

    [query_vars] => Array
            [page] => 0
            [name] => e-learning-platforms-the-new-academy-for-business-training-and-education-87260
            [error] => 
            [m] => 
            [p] => 0
            [post_parent] => 
            [subpost] => 
            [subpost_id] => 
            [attachment] => 
            [attachment_id] => 0
            [pagename] => 
            [page_id] => 0
            [second] => 
            [minute] => 
            [hour] => 
            [day] => 0
            [monthnum] => 0
            [year] => 0
            [w] => 0
            [category_name] => 
            [tag] => 
            [cat] => 
            [tag_id] => 
            TechNewsWorld => 
            [author_name] => 
            [tb] => 
            [paged] => 0
            [meta_key] => 
            [meta_value] => 
            [preview] => 
            [s] => 
            [sentence] => 
            E-Learning Platforms: The New Academy for Business Training and Education => 
            [fields] => 
            [menu_order] => 

A large drone swarm dropping these extinguishers could likely diminish a fire before it spread widely.

Coupled with a distributed sensor network like the one Huawei has developed with the Rainforest Connection (they repurpose cell phones as sensors), this network could provide far earlier warning than the old-fashioned methods we have today. A reconfigured Stingray -- or a flock of them -- could be launched to deal with the young fire within seconds of being identified, potentially eliminating it before more damage was done.

Human Transport

In a fire or flood, often there are situations where the roads are unpassable, yet we need to get first responders in and evacuating citizens out. Frequently, civilian or repurposed national guard helicopters are provisioned for this duty. But neither are designed to rescue people off roofs or from the front of raging fires.

Helicopters could be replaced with people-carrying drones that can land in tighter spaces, get first responders into remote locations, and evacuate rescuers and victims and from dangerous places.

There are several personal riding drones under development for both commercial and consumer use. One of the more interesting is the DP-14 Hawk being developed to evacuate an injured soldier to a base up to 100 miles away. This same drone could be used to evacuate people caught in a fire or flood zone without putting a helicopter and its crew at risk.

A larger version is the Cormorant, which can deliver cargo, like fire fighting gear and equipment, and evacuate a small team from a remote location.

There are autonomous vehicles for this purpose, but they would have limited use in a fire or flood. Still, they might be helpful in an earthquake or a localized situation like a remote hiking injury.

[wa-ads pos="55"]

The evacuation in Afghanistan is slowed by the size of the transports and their inability to function well without a landing strip. Granted, they have to worry about hostile fire. But no one should be shooting at responders in events like I'm describing. So, designs that may not work on the battlefield could work to evacuate people from a disaster area rapidly.

One of the more interesting efforts is the Lockheed LMH-1, a heavy lift airship expected to be 300 feet long and capable of carrying more than 23 tons of cargo, along with a capacity of 19 passengers and two crew. Swap in people for that 23 tons of cargo, figuring 100 people per ton, and we're looking at roughly 2,300 people. Although humans and cargo are not loaded on aircraft the same way; my point is the capability to transport large numbers of people in emergencies.

Another effort that could carry up to 3,000 metric tonnes is also under development. A water ton is 224 imperial gallons, giving this something like 672K gallons of water, which could be moved to address drought or fight a fire.

Wrapping Up

We have a problem: wars are profitable, which drives money and influence into starting these conflicts. This dynamic makes wars harder to get out of than to get into.

But with global warming, we have a battle that almost everyone supports: the war to keep people safe from fires and weather events that are crippling many parts of the globe.

If we shifted the military-industrial complex to fighting the effects of climate change, they could retain their profits and we'd be far safer. Everyone wins. The military firms get a sustainable non-war income, and we get a better defense against what is currently causing a lot of harm: a pissed-off Mother Nature.

The Candela C-8 Electric Boat

I grew up in and around the ocean, taught myself to sail, and was helming boats from when I was eight or nine years old. I've been on the hunt for an electric boat, and this Candela C-8 out of Sweden caught my eye.

At around 28 feet and $340K, it is too big and too expensive for me at the moment. But this is still an initial electric offering. I expect prices will come down and smaller sizes will come to market.

While expensive to buy, it is inexpensive to run and expected to cost 5 percent of what it costs to maintain a similar-sized powerboat. It is virtually maintenance-free with 3,000 hours of service-free use (that's estimated to be 50-100 years of typical recreational use).

The Candela C-8 is a hydrofoil, which means it will be smooth over choppy water and, once upon the foils, it only takes 21 horsepower to keep it flying at its 22-knot cruise speed.

Candela C-8 electric boat

Its range on a charge is 50 nautical miles, or around two hours at 22 miles per hour. That'll get to Catalina Island from Newport Beach in California with range to spare. Granted, there probably aren't any fast chargers at Catalina Island, so you'll need to spend the night before returning. (I used to work on Catalina Island. When John Wayne was alive I would wave to him on his yacht where he'd sit out on the deck in the mornings.)

This boat is equipped with fly-by-wire steering and over-the-air upgradeable software. Expect developments in battery technology to reduce weight while increasing capacity. Future versions of this boat should go greater distances at faster speeds.

The company that makes these has offered to let me try one out, but it would require travel. Unfortuately, the Covid mess and the age of my vaccine has me avoiding travel at the moment. I do look forward to a time when I could take it for a spin.

Options include a toilet and septic tank, freshwater shower, cooler, and underwater LED lights (so you can look for great white sharks before jumping in for that swim). Unless you can find a high-speed charger near the water (good luck with that), you'll likely have to trailer the boat to charge it. Charging time is two hours, with three-phase charging.

It sleeps two adults and two children and has seats for up to eight people. Think of it more like a tiny, inexpensive yacht than a big expensive cruiser.

This Telsa-like boat is my product of the week because it is just very cool. Imagine blowing by a yacht on foils dead silent on this hydrofoil boat. I'll bet even Elon Musk would be a tad jealous.

The opinions expressed in this article are those of the author and do not necessarily reflect the views of ECT News Network.

[post_title] => Tech Weapons We Need To Combat Global Warming [post_excerpt] => What if we applied the military's capacity to build "weapons" to save people from natural disasters? Let's talk about some of the inventions that could be used to make us all safer, and switch our focus from harming to helping. We'll close with the product of the week, arguably the coolest Tesla-like electric-powered hydrofoil boat that's trying to transition boating away from fossil fuels. [post_status] => publish [comment_status] => open [ping_status] => closed [post_password] => [post_name] => tech-weapons-we-need-to-combat-global-warming-87253 [to_ping] => [pinged] => [post_modified] => 2021-08-27 17:48:51 [post_modified_gmt] => 2021-08-28 00:48:51 [post_content_filtered] => [post_parent] => 0 => [menu_order] => 0 [post_type] => post [post_mime_type] => [comment_count] => 0 [filter] => raw ) [3] => WP_Post Object ( [ID] => 93252 [post_author] => 1 [post_date] => 2021-08-27 04:00:00 [post_date_gmt] => 2021-08-27 04:00:00 [post_content] =>

Imagine reading a headline in tomorrow's news stating that your neighbor's identity was stolen and their life savings cleaned out by criminals who entered through their 'smart' washing machine.

Ridiculous, you say? Well, have you checked your own home Wi-Fi network lately?

You might have several connected household gadgets and other internet of things (IoT) devices tethered wirelessly through a misconfigured router with no firewall settings. Is the firmware current? Are security patches up to date?

Still not convinced this is a serious problem? Then consider this glaring example of how dangerous an outdated device can be.

In June, Western Digital My Book NAS owners worldwide found out that their devices were mysteriously factory reset and all their files were deleted. My Book Live and My Book Live Duo are personal cloud storage devices.

When the WD product users attempted to log in via the web dashboard, the devices responded that they had an "invalid password." WD My Book owners could no longer log into the device via a browser or an app.

My Book Live and My Book Live Duo products experienced data loss due to a security incident, according to the Western Digital website. WD informed customers that the company would cover the costs of eligible users with qualifying products to recover their data using the data recovery services (DRS) provided by a Western Digital-selected vendor.

The company promised to cover the costs of shipment of the qualifying product to the DRS vendor and for the data recovery service. Any recovered data would be sent to the customer on a My Passport drive.

Western Digital confirmed that "some My Book Live devices are being compromised by malicious software." The company also confirmed reports this has led to a factory reset that erased all data on some customer devices.

The My Book Live device received its final firmware update in 2015. The June 2021 statement from Western Digital suggested users disconnect their My Book Live devices from the internet to protect the data on their device.

[wa-ads pos="55"]

The My Book Live vulnerability shows there is still a long way to go in IoT security. Much attention has been paid that such devices are not hardened or built according to best practices, according to John Bambenek, threat intelligence advisor at Netenrich.

"In this case, we see that devices are being built that are meant to outlast their vendor's support commitments; so not only are they vulnerable, but consumers cannot protect themselves either. Whether it is data loss, ransomware, or DDoS, these issues will keep recurring until vendors commit to protecting their customers," he told TechNewsWorld.

Flawed Business Model

Original equipment manufacturers (OEMs) take no responsibility for this fiasco, as their aging connected devices are no longer for sale.

However, most customers are not aware that these devices actually have an expiry date, and consumers are not alerted to the dangers of continuing to use unpatched firmware, with countless outdated connected devices waiting to be infiltrated by opportunistic attackers, suggested Asaf Ashkenazi, COO at connected devices security firm Verimatrix.

"OEMs should either transform their business model to sustain a long-lasting software update service or install more sophisticated tech that would make hacking these devices much more difficult," he told TechNewsWorld.

Ashkenazi is not outright blaming problems like the Western Digital fiasco on the OEM industry. The problem is with the business model. No standards exist to regulate how IoT devices should be maintained and secured.

"Unfortunately, I do not see anything that is addressing the standardizing of security on these IoT devices. Maybe the government or consumer protection, or some companies will decide to build a consortium that will say who is responsible," he said.

A need definitely exists for more transparency in terms of the level of support for the software on these devices. Nothing can be done to deal with the problem until the industry decides to pick up that challenge, he added.

Education and Consumer Pressure

It will take an educational awareness effort to make consumers mindful of the dangers inherent in buying insecure IoT devices. That can then translate into enabling consumers to consider device security as part of their buying decision, suggested Ashkenazi.

Most consumers are now clueless that devices endemic to their household can be connected to the internet through their wireless routers. If they have a device that connects to the network, they need to make sure that the device's software is updated, he added.

"When the software is no longer updated, the device can be dangerous to use.," he warned.

[wa-ads pos="55"]

The goal, as Ashkenazi sees it, is to first protect consumers. Then he hopes that consumers will put enough pressure on manufacturers that companies will start to say how long they are going to support the software.

Apple, Google, and some other big companies are saying that for certain devices. But for a lot of the other devices, the companies after six months or so stop supporting them. Consumers continue using these abandoned devices because they otherwise appear to be working fine, he said.

Fuzzy Responsibility

Consumers must be just as meticulous as enterprise businesses when it comes to cybersecurity. Enterprise security teams understand that vulnerabilities come in all shapes and sizes, observed Yaniv Bar-Dayan, CEO and co-founder at Vulcan Cyber, a SaaS provider of enterprise cyber-risk remediation.

"In the case of the Western Digital My Book Live devices, threat actors took advantage of a daisy-chained set of circumstances to wipe the data from exposed hard drives. Consumers should have known to keep the drive firmware patched, and to only connect the drives to the internet when needed. However, where does the responsibility fall? On the consumer or on Western Digital? There is not a clear-cut answer," he told TechNewsWorld.

One of the main problems with IoT security at the present is that the rush to market often deprioritizes security measures that need to be built into our devices. This issue has made many IoT devices low-hanging fruits for criminals interested in stealing sensitive data and accessing exposed networks, noted Stefano De Blasi, threat researcher at Digital Shadows.

"Additionally, criminals can exploit vulnerable products by leveraging their computing power and orchestrate massive IoT botnet campaigns to disrupt traffic on targeted services and to spread malware," he told TechNewsWorld.

Cybersecurity Blind Spots

IoT security, or the lack of it, suffers from industry shortcomings. The primary issue is that traditional vulnerability management tools do not scan past the operating system. Thus, they do not detect any security issues or vulnerabilities in the firmware layer, according to Baksheesh Singh Ghuman, global senior director of product marketing and strategy at connected devices security firm Finite State.

"The secondary issue involves device manufacturers, who are often in charge of performing device security despite commonly lacking the appropriate security controls to scan for firmware layer vulnerabilities," he told TechNewsWorld.

[wa-ads pos="55"]

It's important for manufacturers to conduct a thorough analysis for vulnerabilities of any kind, and if they discover any, inform potential users about available firmware upgrades and patches, he recommended.

"It is a very reactionary process, unlike the automated proactive process found in enterprise vulnerability management practices. As a result of these factors, firmware vulnerabilities are often ignored and become cybersecurity blind spots which draw the attention of threat actors," said Ghuman.

IoT Security Complicated

Depending on the industry and application, providing a patch is not always available. In the case of consumers, patching is a twofold process, according to Ghuman.

First, the device manufacturer needs a standard upgrade process in place to push upgrades/patches to their devices. The second step requires the spread of consumer awareness about the need to upgrade and patch vulnerabilities.

"This is quite challenging because it requires constant reminders and education regarding cybersecurity hygiene," said Ghuman.

Device manufacturers can take a few steps to prevent more episodes like the Western Digital dilemma, he suggested. Those include:

  • Making sure there is a product security group present within their organization;
  • Incorporating firmware layer vulnerability management as part of their overall product development and product security programs, so that they can detect firmware layer vulnerabilities before they are distributed;
  • Proactively scan for exploitable vulnerabilities in their firmware and, if discovered, quickly develop patches; and
  • Having a standard and secure firmware upgrade process in place which pushes patches as they become available.

Inevitable Targeting

The consumer move to a preference for digital-first interactions will grow the potential threat landscape that can be targeted by attackers, observed Tyler Shields, CMO at JupiterOne. More apps, more data in the cloud, more digital experiences, mean more targets of both opportunity and chance.

“There will be a continued increase in data compromise as we move more and more of our daily life into the cloud. We have really only just begun to see the expansion of digital experiences and the attacks that will grow alongside them,” he told TechNewsWorld.

[wa-ads pos=”55″]

Security has always been offset by ease-of-use. The cybersecurity vendor community must drive toward creating easy-to-use cybersecurity experiences that deliver an acceptable level of security to the technologies that the consumers demand, according to Shields.

A good example of this is the move to single sign-on and password-less authentication. Users have failed to maintain proper passwords for decades, and that situation will never change. Therefore, innovation must build an easy-to-use alternative that provides appropriate security with a much better user experience.

“Enterprises have to find the right balance of technology innovation alongside security for traditional models,” he said.

[post_title] => Unsupported IoT Devices Are Cyber-Trouble Waiting To Happen
[post_excerpt] => Imagine finding out that your neighbor’s identity was stolen and their life savings cleaned out by criminals who entered through their ‘smart’ washing machine. Ridiculous, you say? Well, have you checked your home Wi-Fi network lately? You might have several connected household gadgets and other devices tethered wirelessly through a misconfigured router with no firewall settings.
[post_status] => publish
[comment_status] => open
[ping_status] => closed
[post_password] =>
[post_name] => unsupported-iot-devices-are-cyber-trouble-waiting-to-happen-87252
[to_ping] =>
[pinged] =>
[post_modified] => 2021-08-26 17:51:25
[post_modified_gmt] => 2021-08-27 00:51:25
[post_content_filtered] =>
[post_parent] => 0 =>
[menu_order] => 0
[post_type] => post
[post_mime_type] =>
[comment_count] => 0
[filter] => raw

[4] => WP_Post Object
[ID] => 93287
[post_author] => 1
[post_date] => 2021-08-25 04:00:00
[post_date_gmt] => 2021-08-25 04:00:00
[post_content] =>

When 21-year-old Linus Torvalds, a then computer science student from Helsinki, released a new type of computing system built on a kernel he created on Aug. 25, 1991, he laid the foundation for what became the Linux operating system.

Today the Linux community is estimated to be 86 million users strong. It has become the backbone of large enterprises and is installed in government systems and embedded in devices worldwide.

That percentage of Linux users is a bit misleading. When we dig down under that 86 million figure, we find that server, network, and enterprise use of Linux is extensive. But the number of desktop Linux users is vastly less large.

Consider these statistics gleaned from a report compiled by Nick Galov:

  • Microsoft Windows users (business and personal) number some 83 percent of the world’s computing market.
  • At the start of 2021, the net market share of Linux was 2.35 percent.
  • Digging deeper, we find that 100 percent of the world’s top 500 supercomputers run on Linux.
  • So do 96.3 percent of the top one million servers. They, too, run on Linux.
  • Only two of the top 25 websites in the world do not use Linux.
  • When it comes to cloud computing infrastructure, 90 percent run on Linux, and nearly all of the best cloud hosts use it.

So yes, Linux is of vital importance to technology globally. For some industries, running proprietary software on an open-source Linux distro is not the exception — it’s the rule of thumb.

“Almost every network and security device available today runs a Linux kernel,” Chris Grundemann, analyst at engineering-led technology research firm GigaOm, told LinuxInsider.

“The open networking revolution currently underway is driving even more access to that Linux kernel and the power and security of an open Linux platform through the disaggregation of hardware and software,” he said.

Server-Desktop Divide

The Linux desktop offers users a reliable and rigorously secure computing alternative to Windows and macOS. But with no real marketing plan for desktop Linux, typical computer users are clueless that Linux exists as a viable and free operating system.

Even computer users preferring other platforms benefit from Linux. It has been ported to more hardware platforms than any other operating system, thanks to the popularity of the Linux-based Android operating system.

[wa-ads pos=”42″]

Perhaps non-Linux users do not yet know that the Linux desktop — and all the thousands of software titles it runs — is free. Maybe they have the misconception that Linux is still a command line nightmare. Or maybe they wrongfully think its graphical user interface (GUI) is unfamiliar.

Actually, Linux desktop environments can mimic the appearance of Windows and Mac computers. Plus, there are dozens of Linux desktop UI options and literally hundreds of Linux distributions from which to choose.

Awareness Took Time

Awareness of Linux in the enterprise was nonexistent 30 years ago. Even by the late 1990s, Linux could not provide the support and predictability needed in an enterprise setting. Companies using Linux had to build their own skill sets based on a free distribution or build their own in-house version. The adoption risk was high.

In the early 1990s, the use of Linux in enterprise settings typically was geared toward web servers, FTP, corporate back ends, and smaller-scale applications. Linux was much less about workloads.

As the ’90s progressed into the 2000s, commodity servers became the norm, and Linux had the best stability and largest ecosystem of developers. That was and still is very appealing for enterprises.

Most enterprises in the ’90s had mixes of hardware with a lot of Sun and SGI hardware. Add to that a long list of software applications that were very particular about the hardware they ran on. All that changed in the early 2000s.

The financial markets were one of the first to embrace Linux. Wall Street banks demanded Linux support for their enterprise application servers. Every major company has an open-source strategy now. Linux in the enterprise is much different today.

“As the years passed, first Linux became the OS of choice for corporate engineers working on their own projects, and then it started to appear in set-top boxes and other low-cost electronics,” GigaOm analyst Jon Collins told LinuxInsider.

The now-dominance of the x86 architecture has to play a big part in the growth of Linux, he added. But it nonetheless took a life of its own to be the de facto force we see today, he said.

Linux Takes Over

It is hard to point to another technology that has changed the technical and business landscape the way Linux has. Linux proved its resilience after 30 years of being free and open.

For instance, embedded Linux is used in a large variety of devices and machines. It is built into cars, network routers, facility automation controls, entertainment equipment, and medical equipment.

By having Linux embedded into the retail supply chain, retailers are able to efficiently offer 24/7 service and quick delivery, according to Gerald Pfeifer, CTO at Suse.

[wa-ads pos=”42″]

“Linux enables retailers to have the visibility needed to better manage the supply chain from producing goods to transporting them, from picking products in warehouses to shipping them off to customers using a delivery agent with a smart device (running Linux) to deliver it,” he told LinuxInsider.

Linux has been highly prevalent in driving digital transformation during a period that has seen the meteoric rise of e-commerce, he observed. Open-source software has allowed retailers around the world to run their operations efficiently and safely. It also enabled them to anticipate needs and offer the personalized services to which retailers have all become accustomed.

“In fact, Amazon EC2 started out as Amazon’s own infrastructure for their retail business. Many PoS systems run on Linux as do most Wi-Fi routers, IoT devices, and e-commerce websites,” said Pfeifer.

Linux High Tech Today

As people around the world celebrate and discuss 30 years of Linux, the focus, rightly so, is on supercomputers and Martian helicopters and many other very developer-centric initiatives, observed GigaOm’s Grundemann.

“Linux plays an essential role in routers, switches, firewalls, and other appliances. It is the connective tissue of our internet-enabled economy,” he said.

Even Juniper Networks’ Junos OS, originally built on FreeBSD, has now shifted to a native Linux kernel with Junos OS Evolve. This is true whether the appliance is physical or virtual. All those virtual network functions (VNFs) run on Linux too, he added.

“So, as you celebrate Tux turning 30 this year, remember it is Tux — I mean Linux — all the way down the infrastructure stack,” Grundemann said in referring to the Linux Mascot.

[wa-ads pos=”42″]

Linux over the last 30 years has been instrumental in transforming industries around the world by helping them overcome complex challenges and being a catalyst for business and technology innovation, according to Suse’s Pfeifer.

“Linux touches what we use every day, at work, at home, and on the way. It has become one of the most widely recognized and adopted software projects. On the way, it reimagined how communities and companies develop code, and it helped establish the concept of open source — a term that did not exist yet when Linux was born,” he added.

Beyond the Clouds

Linux has been playing a pivotal role in the transformation of space exploration and keeping satellites operating in space. Already by Linux’s 20th birthday, essentially all data NASA received back from space was processed by Linux servers. Its supercomputers have been running Linux, along with the top 500 supercomputers worldwide.

“It was Linux that powered the Ingenuity Mars helicopter’s 293-million-mile trip to Mars aboard the Perseverance Rover last July. The International Space Station has been relying on Linux for years, as well as leveraging open-source software in R&D, including SpaceX’s reusable rocket,” said Pfeifer.

Space missions today are now focused on the use of technologies that are more agile, less expensive, and more accessible. No wonder open source is increasingly more common in space exploration projects, he added.

To that end, Linux offers interoperability and wide adoption, a low-cost barrier to entry, high quality, and the power of communities.

“Linux and open source have proven effective and reliable. Now on into orbit and to the Moon and Mars again,” Pfeifer remarked.

[post_title] => 30 Years Later, the Trajectory of Linux Is Star Bound
[post_excerpt] => Today the Linux community is estimated to be 86 million users strong. It has become the backbone of large enterprises and is installed in government systems and embedded in devices worldwide. As people around the world celebrate and discuss 30 years of Linux, the focus, rightly so, is on supercomputers, Martian helicopters and many other developer-centric initiatives, noted GigaOm analyst Chris Grundemann.
[post_status] => publish
[comment_status] => open
[ping_status] => closed
[post_password] =>
[post_name] => 30-years-later-the-trajectory-of-linux-is-star-bound-87247
[to_ping] =>
[pinged] =>
[post_modified] => 2021-08-31 03:40:16
[post_modified_gmt] => 2021-08-31 10:40:16
[post_content_filtered] =>
[post_parent] => 0 =>
[menu_order] => 0
[post_type] => post
[post_mime_type] =>
[comment_count] => 1
[filter] => raw


[post_count] => 1
[current_post] => 0
[in_the_loop] => 1
[post] => WP_Post Object
[ID] => 93305
[post_author] => 1
[post_date] => 2021-09-07 04:00:00
[post_date_gmt] => 2021-09-07 04:00:00
[post_content] =>

Education for businesses, just like education in general, has undergone a dramatic transformation in the last year toward e-learning. Obviously, much of this shift was provoked by the urgent need to accommodate social distancing for health and safety bought about by the global pandemic.

Meanwhile, there are more reasons why organizations are turning to online platforms, called learning management systems (LMS), to offer education and training for employees, customers, and partners. The advantages of fast and cost-effective knowledge transfer, to and from anywhere in the world, make good business sense.

TechNewsWorld spoke with several experts in the field of learning management systems to get a sense for what’s happening with e-learning in the business sphere, and where it’ll be trending from here.

E-Learning Now Expected

“The global pandemic accelerated a shift in how we define the workplace,” Tyson Chaplin, chief learning architect for Tovuti LMS, told TechNewsWorld. “More remote employees means more opportunities to move to a blended, or asynchronous, training modality. At this point, it just makes sense for most businesses to offer online learning opportunities to their employees, or at least add them to their training toolbelt.”

“In-person training is not going to go away,” he added, “but there will be a significant increase in online learning, because employees are starting to expect it — and in many cases prefer it to its classroom counterpart.”

Offering online learning is a key stratagem that organizations can implement to enrich their offerings to both internal and external audiences.

“I think the intersection of the knowledge economy with online learning presents a unique opportunity for businesses to add value, especially as we begin to navigate the post-Covid world,” Brendan Ecclesine, senior account executive at Academy Of Mine, explained to TechNewsWorld.

“The pandemic has highlighted the effectiveness of online education, and the fact that remote learning is becoming the new norm would lead us to believe that e-learning is still in its infancy.

“Apart from the financial rewards of offering training for purchase, those businesses that are training their internal employees will also enjoy heightened worker productivity through better-equipped teams,” he reasoned.

How To Engage Online Learners

One of the most important elements to make e-learning initiatives productive for businesses is to make the content engaging and relevant for adult students who have other tasks competing for their attention.

“Effective online training is relevant, concise, and engaging,” said Chaplin. “Relevance is key to adult learning. I could be taking a course that is very interactive and informative, but if that information isn’t useful to me, I’m definitely not going to retain it and I am wasting my time by going through it.”

Chaplin emphasized that learners in these settings also expect the content to be focused on precisely what they need and want to know; the training must be to-the-point and concise.

“Many employees engage with online education on their mobile devices, and the time they have to dedicate to learning may only be a few minutes here and there. E-learning is also in direct competition with myriad of other distractors that assail online learners. Shopping, email, social media, etc.

“If businesses want to reach their learners, their training needs to be concise. The average attention span for a user on the web is about eight seconds. That means your organization’s training has eight seconds to hook the learner and pull them into the content,” he explained.

[wa-ads pos=”55″]

Because of all the distractions out there, making the learning environment engaging is vital.

“If learners find your training boring, you’ve lost them,” said Chaplin. “They may complete it, but they won’t retain what they have learned, and they definitely won’t be coming back for more anytime soon unless they’re forced to.”

“There are simply too many other things out there vying for employee time and attention,” he added. “But if employees find the training novel and fun, they are going to remember that online course and talk about it with others. This leads to retention of material and wider adoption of your learning platform — all of which are big wins for your organization.”

Part of making course content engaging is effectively using the available technologies to deliver it.

“Most learning programs are broken, consuming enormous amounts of resources with unclear results,” Chris Dornfeld, president of Whistle, told TechNewsWorld. “These programs are not keeping up with how the work experience is changing, how people consume content, and how people want to engage technology.”

“The future will be about delivering the right information, to the right person, at the right time. Future learning programs will integrate learning with the other elements needed to change behavior and produce the desired business results, because they will leverage data science and AI tools to understand, measure, and predict outcomes,” he remarked.

Distinctly Defined Coursework

Being clear with prospective students about the value of the curriculum is also a critical component of e-learning offerings.

“You start out by defining what is the course about,” Hatla Faerch Johnsen, COO and co-founder of uQualio, told TechNewsWorld. “If your course does not have a clear use case, then add why this course is useful. Who is the target audience? For any course to succeed with its audience, it needs to be created with a specific target group in mind.

“Once you define your target group,” she continued, “you can start thinking about what kind of content would resonate with them, and how high should the quality be.”

Organizing course content so it’s easy to find and access is imperative, noted Whistle’s Dornfeld.

“Learning content will continue to explode, increasing the need for curation and organization. People don’t just need more learning content; they need more relevant and valuable learning content that will empower their success,” he observed.

Personalized, Experiential Learning

As learning management systems for businesses evolve, they’re becoming more personalized to learners, fields, and segments of the market.

“Personalized and experiential — or hands-on — learning is the path forward to deliver online education that meets the needs of both the learner and the organization,” Jack Koziol, CEO and founder of Infosec, explained to TechNewsWorld.

“It allows learners to get the knowledge they specifically need while putting their skills to the test in the realistic scenarios they’d encounter on the job.” “From an organizational perspective,” he offered, “time and resources are often the limiting factors of delivering effective online security training. The scalability of personalized and experiential education will be essential.”

[wa-ads pos=”55″]

Businesses are taking a holistic approach about what content to offer, how to offer it, and what value it offers to those who take the courses. “The approach to learning has become one of transformation,” said Brendan Noud, CEO and co-founder of LearnUpon.

“Learning is seen to enable performance, whether it’s employees, customers, or partners. Training is much more learner-centric, with programs designed for the learner’s expectations. Where learning was previously a cost center, it is becoming a value-generating center,” he added.

Ultimately, business e-learning offerings must be seen not as separate from the organization, but as an integral part of its entire identity.

“Learning systems are becoming increasingly integrated, not only with other learning tools, but with the wider business tech ecosystem,” explained Noud. “This is enabling businesses to centralize their systems and build a bigger picture of insights to make better decisions.”

[post_title] => E-Learning Platforms: The New Academy for Business Training and Education
[post_excerpt] => Organizations are taking advantage of online learning platforms to provide fast and cost-effective knowledge transfer, to and from anywhere in the world. We spoke with several experts in the field of learning management systems to get a sense for what’s happening with e-learning in the business sphere, and where it’ll be trending from here.
[post_status] => publish
[comment_status] => open
[ping_status] => closed
[post_password] =>
[post_name] => e-learning-platforms-the-new-academy-for-business-training-and-education-87260
[to_ping] =>
[pinged] =>
[post_modified] => 2021-09-06 09:32:06
[post_modified_gmt] => 2021-09-06 16:32:06
[post_content_filtered] =>
[post_parent] => 0 =>
[menu_order] => 0
[post_type] => post
[post_mime_type] =>
[comment_count] => 0
[filter] => raw

0 => Array

[comment_count] => 0
[current_comment] => -1
[found_posts] => 1
[max_num_pages] => 0
[max_num_comment_pages] => 0
[is_single] => 1
[is_preview] =>
[is_page] =>
[is_archive] =>
[is_date] =>
[is_year] =>
[is_month] =>
[is_day] =>
[is_time] =>
[is_author] =>
[is_category] =>
[is_tag] =>
[is_tax] =>
[is_search] =>
[is_feed] =>
[is_comment_feed] =>
[is_trackback] =>
[is_home] =>
[is_privacy_policy] =>
[is_404] =>
[is_embed] =>
[is_paged] =>
[is_admin] =>
[is_attachment] =>
[is_singular] => 1
[is_robots] =>
[is_favicon] =>
[is_posts_page] =>
[is_post_type_archive] =>
[query_vars_hash:WP_Query:private] => 0338783bddaf39e3985619cf8ec7f172
[query_vars_changed:WP_Query:private] =>
[thumbnails_cached] =>
[stopwords:WP_Query:private] =>
[compat_fields:WP_Query:private] => Array
[0] => query_vars_hash
[1] => query_vars_changed

[compat_methods:WP_Query:private] => Array
[0] => init_query_flags
[1] => parse_tax_query

[comments_by_type] => Array


Most Related Links :
reporterwings Governmental News Finance News

Source link

Back to top button