Distance Learning

1800 Words8 Pages

Within the context of shifting market conditions and rapid technological change, the workforce is becoming more and more geographically dispersed. The challenge to keep this workforce knowledgeable and educated is being met by distance education programs. These programs are being offered by more and more organizations over their computer network or intranet. It is important for training professionals to understand the use of these networks so they can optimize their use of educating workers via an intranet. The following review of literature will provide an understanding of distance learning, computer-based training and intranet-based training. Distance learning is the most important aspect of any distant education program is meeting the instructional …show more content…

Computers can facilitate self-paced learning by individualizing learning while giving immediate reinforcement and feedback. Computers are a multimedia tool with integrated graphic, print, audio and video capabilities effectively linking various technologies. CD-ROM technologies are often incorporated in computer-based instructional units. Computers are interactive with various software packages being extremely flexible that maximizes learner control. Computers also allow for increased access through local, regional and national networks that link people and resources. Finally, computer technology is rapidly advancing while related costs …show more content…

A user’s identity is verified based on the credentials presented by that user, such as username/password, digital certificate, standard Security Assertion Markup Language (SAML) token, or Kerberos token (more on this later in this document). In the case of web services, credentials are presented by a client application on behalf of the end user.
• Authorization (or Access Control): Granting access to specific resources based on an authenticated user’s entitlements or specific role (e.g., corporate buyer).
• Confidentiality, privacy: Keeping information secret. Personally Identifiable Information (PII) or confidential business data could be present in web service request or response messages. Confidentiality of such data can be achieved by encrypting the content of request or response messages using the XML Encryption standard.
• Integrity, non-repudiation: Making sure that a message remains unaltered during transit by having an authority digitally sign that message; a digital signature also validates the sender and provides a time stamp ensuring that a transaction can’t be later repudiated by either the sender or the receiver. XML messages are signed using the XML Signature

Open Document