Design components of a learning system (Part 6_)

First thing is a landing page. Landing pages are different now than they were and this one encompasses a lot of internal and externally available information. So the first part is the landing page has to be mobile friendly in both forms of mobile friendly.

·       Don’t assume a high bandwidth connection

·       Offer the ability to buffer connections (I.e. load multiple trainings off-line while in high-bandwidth areas)

1.1.1.1      Building the device checker:

The first thing we have to do then is verify the device. There is training that our organization doesn’t want on mobile devices. The reality of mobile devices is they are convenient. The other reality is they are frankly easily stolen. While we can remotely wipe our training container it still offers risk, in that cellular chips can be removed or disabled. That means our training container itself has to have a TTL so that the information in the training isn’t at risk if the device is at risk. This gives us our initial matrix of the device and the risk to the organization. The lowest risk is a secured desktop in the facility. Given a user requesting off-line training on an internal desktop system it provides least risk and can be quickly authorized. The next is a laptop (hopefully encrypted) that the user can take out of the facility with them. Lower risk than the user consuming the training on a mobile device but higher risk than the user

imageusing the company provided desktop. This gives rise to the next category of training provision that will will discuss separately. The next is a high risk device. This is a mobile device such as a tablet or cellular phone. They are higher risk than the laptop or desktop.

Finally we have the unusable device.e This is the first check although the last category. If the training request assets not available on the requesting device notify the user right away that the device isn’t supported. While this is a rare issue, it would apply to classes or training that include direct technology instruction not supported by tables or other mobile devices.

This initial device checker than leads us to the other side of risk. Sometimes risk is a good thing because it opens the door to reward. The risk of the training is initial checked device specific. The secondary risk is what is the cost if the training isn’t provided. This results in a more formalized risk assessment process that has to be completed. The automation of this initial assessment isn’t something huge, but should be part of the device checker application.

ID Risk

Exposure

Cost

Impact

Accept/Decline

Mitigation

Contingency

Executive heading off to an event will be speaking about organizations “new” offerings. Needs new offering (competitive advantage) training on mobile device

High

High

High

Accept

Place training in a TTL container on the Execs mobile device.

Rely on WIFI of facility where exec is attending event and stream live new product training.

User is going on vacation to a known problem country and wants to take training on mobile device

High

High

High

Decline

User is informed of risk and is offered non-business risk training

User provides business case for training risk that exceeds potential loss, decision is reversed.

.doc

Creator The Edison Scale