Click here to advertise in this news brief.
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
![]() Webinar materials: How to use Social Media for Learning Training Industry The following resources are now available from the April 24 TrainingIndustry.com webinar, How to use Social Media for Learning sponsored by eCornell.
![]() Training evaluation mistake No.2: Not concerning yourself with on-the-job performance and subsequent results Kirkpatrick Partners Value must be created before it can be demonstrated. Research suggests that as much as 90 percent of training resources are spent on the design, development and delivery of training events that yield 15 percent on-the-job application (Brinkerhoff, 2006). Reinforcement that occurs after the training event produces the highest level of learning effectiveness, followed by activities that occur before the learning event.
![]() ![]() Training evaluation mistake No.3: Using up all training evaluation resources on levels 1 and 2 Kirkpatrick Partners Tips for keeping evaluations short for the rest of your programs. For the rest of your training programs, we encourage you to think about the data you've collected through two lenses: usefulness and credibility. Usefulness relates to information that the program facilitator and the training department need to ensure that they are doing their jobs well. Credibility relates to the data and information stakeholders expect to see to validate the program’s value to the organization.
![]() 2013 Top 20 Training Outsourcing Companies announced TrainingIndustry The Top 20 list recognizes the leading training outsourcing companies for their high quality services and comprehensive capabilities. All have demonstrated experience managing major BPO engagements, and they use their influence and expertise to advance the training industry.
![]()
![]() Using technology to fight cheating in online education Los Angeles Times While Jennifer Clay was at home taking an online exam for her business law class, a proctor a few hundred miles away was watching her every move. Using a webcam mounted in Clay's Los Angeles apartment, the monitor in Phoenix tracked how frequently her eyes shifted from the computer screen and listened for the telltale sounds of a possible helper in the room. Her computer browser was locked — remotely — to prevent Internet searches, and her typing pattern was analyzed to make sure she was who she said she was: Did she enter her password with the same rhythm as she had in the past? Or was she slowing down?
![]() The real story of adult online learning The Huffington Post To watch the TV ads, one might think that earning a post-secondary degree online is easier than through traditional classroom study. Certainly, it is true that one might do a lot of work in one's pajamas (something not common even with the informality of today's campuses). Furthermore, one does not have to fight traffic or search for a parking place, except when there is a specific reason to go to a campus or education center. But these enticements do not capture the full picture of what online students encounter.
![]() PRODUCT SHOWCASE
Congratulations to our IACET Authorized Providers IACET The following organizations were accredited in April 2013.
![]() Professional development: Where the rubber meets the road Today's Facility Manager Over the past decade, technology has dramatically altered the world around us and reshaped entire industries. Music and television are delivered in new ways. We shop online for everything from clothing to the best airline flights. Now technology is changing the landscape of building efficiency. And it is the ever increasing focus on sustainability and efficiency that is propelling these changes. Sustainability and efficiency have become important factors in defining an organization's reputation.
![]() Online brain-training: does it really work? The Guardian Websites that claim to increase concentration, verbal reasoning and memory have become big business, despite research that challenges their effectiveness.
![]() |
![]() ![]() |
|