SlideShare a Scribd company logo
1 of 40
Got a Minute?
Microlearning, Tracking,
and Compliance in
ANCILE uAlign®
2
Microlearning
Compliance
Tracking
uAlign®
3
“I am always ready to learn although
I do not always like being taught.”
- Winston Churchill
4
Ready to
Learn!
5
Effectiveness!
6
https://www.flickr.com/photos/henriksent/
7
https://www.flickr.com/photos/blueoxen/
8
Almost 3 hours
9
So that fixes everything.
https://www.flickr.com/photos/tanj/
10
Time
https://www.flickr.com/photos/smemon/
11
Attention
https://www.flickr.com/photos/liberato/
12
Attention
13
What Is Microlearning?
“Microlearning emerges from the publication
of small pieces of loosely joined digital
information, which is often limited to a single
topic.”
Hall: Five Ways to Provide Microlearning, Hall, Chief Learning Officer Magazine, November 2009
“Learning processes that have been called
‘microlearning’ can cover a span from some
seconds (e.g. in mobile learning) to 15
minutes (learning objects sent as e-mails).”
Lindner: Use Your Tool, Your Mind Will Follow. Learning in Immersive Micromedia & Microknowledge Environments
14
Diagram of a Microlearning “Course”
15
16
17
•Grab their attention
•Relate to topics they
already know
•Pretend you’re on fire
•Repetition for retention
•Pull, don’t push
•Mix it up
•Say it again with feeling
•Stones to cross the river
Microlearning
18
Tracking –
Who’s doing what?
https://www.flickr.com/photos/mricon/
19
•Who completed what?
•By when?
•How many are left?
•What next?
•Who needs help?
•How do you track it?
Tracking Needs Don’t Change
20
Yes, you could use Excel.
http://supergrat.deviantart.com
21
Compliance –
Why track this stuff?
https://www.flickr.com/photos/mskogly/
22
Compliance issues relate to:
• Situations
• Activities
• And Transactions
that could potentially violate
Federal, State, or District laws and
regulations, or violate your
company’s policies and procedures.
And, that’s only in the U.S.,
international companies have
additional regulations to track.
Possible Areas of ConcernA World of Compliance
• Research
• Taxation
• Fraudulent financial activities
• Political activity
• Conflict of interest
• Sexual harassment
• Discrimination
• Information security
• Health/safety, environmental
• Financial reporting and
controls
23
Foreign Corrupt Practices Act (FCPA)
• Makes it unlawful for a U.S. person, and certain foreign issuers of securities, to
make a corrupt payment to a foreign official for the purpose of obtaining or
retaining business for or with, or directing business to, any person.
• The law also requires publicly traded companies to maintain records that
accurately and fairly represent the company’s transactions. Additionally, it
requires these companies to have an adequate systems of internal
accounting controls.
• FCPA enforcement actions
combined cost an average
of $40M last year.
• Enforcement Statistics:
24
Elements of a Compliance Program
• Program oversight at the highest level of the business (often by the Board of
Directors).
• Thorough risk assessments to prioritize key legal risks to the business.
• Standards and procedures designed to detect and prevent violations of the
law.
• Compliance training targeted to individuals’ roles and responsibilities.
• A means for employees to report alleged misconduct anonymously if they
choose to do so.
• Consistent discipline for violators.
• A monitoring system to evaluate the effectiveness of the program and to
make adjustments as necessary. This is a key step, as your compliance
program needs to stay up-to-date with changing circumstances and
regulations.
25
26
27
https://www.flickr.com/photos/mogwai_83/
28
https://www.flickr.com/photos/thegajman/
29
Or, you could trust Excel.
http://supergrat.deviantart.com
30
What now? ®
31
Align your workforce
---------------------------------------------
Empower to take action
---------------------------------------------
Validate their engagement
ANCILE uAlign®
Communications simplified, mobilized, and measured –
because employee alignment is everything.
32
• uAlign enables real-time
communication and validation.
• uAlign empowers you to easily push
messages to your workforce and apply
action items. You can then validate
workforce understanding and
performance.
• uAlign facilitates operational
compliance and readiness, propels
sales force enablement and enhances
workforce effectiveness.
Align Your Workforce
--------- In The Cloud ---------
®
33
1
2
3
Wherever
(cloud, mobile)
Employee
Partner
Vendor
To the right people
(targeted)
Ensuring comprehension
(knowledge check)
!
At the right time
(prioritized)
!
The Process
!
Stakeholder
Deliver the right information
(filtered, relevant, agnostic)
34
With ANCILE uAlign, employees are always informed,
always engaged, always productive.
35
CREATE a new message or link to
online content
SEND a prioritized message to key
employees wherever they are
TRACK employees as they consume the
message and complete an assessment
TARGET actions with
employees/subscribers
• Prohibit employee activity
• Remediation
• Training
• Further communication
ENSURE performance compliance
With ANCILE uAlign, employees are always informed,
always engaged, always productive.
36
What can you do with ANCILE uAlign?
• Distribute a how-to video to your
consultants.
• Send a new product
announcement to your sales
team.
• Schedule an internal
communications campaign to
introduce a new employee
benefit.
• Provide an alert on a new SEC
rule to your finance team and
assess their comprehension.
• Send a workplace safety
reminder to your warehouse
employees.
37
A Trackable “Stone” of Content
4
3
2
1
38
Dashboard – Tracking Responses
• How many people have
completed a campaign?
• When did they complete it?
• Who still needs to?
• What were the responses?
• Complex reporting
39
Microlearning
Compliance
Tracking
uAlign®
Short
Targeted
Mobile
Mandatory
High Consequences
Changing
Who
What
When
Targeted
Tracking
Compliance
40
For more information http://www.ancile.com/products/

More Related Content

Similar to Microlearning, Tracking, and Compliance in ANCILE uAlign

Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Jisc
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attranhcrowley
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessCBIZ, Inc.
 
Australian speech pathologists in private practice: reduce stress by building...
Australian speech pathologists in private practice: reduce stress by building...Australian speech pathologists in private practice: reduce stress by building...
Australian speech pathologists in private practice: reduce stress by building...Speechiesinbusiness
 
the_five_functions.pptx
the_five_functions.pptxthe_five_functions.pptx
the_five_functions.pptxssuser2428171
 
Contractor management topic 6 & 7
Contractor management topic 6 & 7 Contractor management topic 6 & 7
Contractor management topic 6 & 7 Michael Shellshear
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxbagotjesusa
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’sHow Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’sHuman Capital Media
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Resilient Systems
 
Curate Learning Experiences to Ensure Change Success
Curate Learning Experiences to Ensure Change SuccessCurate Learning Experiences to Ensure Change Success
Curate Learning Experiences to Ensure Change SuccessANCILE Solutions, Inc.
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentResilient Systems
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...ZoneFox
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmcanpaksolutions04
 
Webinar: A Communicator’s Guide To Metrics And Measuring Success
Webinar: A Communicator’s Guide To Metrics And Measuring SuccessWebinar: A Communicator’s Guide To Metrics And Measuring Success
Webinar: A Communicator’s Guide To Metrics And Measuring SuccessSocialChorus
 

Similar to Microlearning, Tracking, and Compliance in ANCILE uAlign (20)

Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
 
Planning and monitoring work section 22
Planning and monitoring work section 22Planning and monitoring work section 22
Planning and monitoring work section 22
 
Post 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attrPost 11. Long term GoalThe Group’s goal is to offer attr
Post 11. Long term GoalThe Group’s goal is to offer attr
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 
Australian speech pathologists in private practice: reduce stress by building...
Australian speech pathologists in private practice: reduce stress by building...Australian speech pathologists in private practice: reduce stress by building...
Australian speech pathologists in private practice: reduce stress by building...
 
the_five_functions.pptx
the_five_functions.pptxthe_five_functions.pptx
the_five_functions.pptx
 
Contractor management topic 6 & 7
Contractor management topic 6 & 7 Contractor management topic 6 & 7
Contractor management topic 6 & 7
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’sHow Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s
How Microlearning is Having a $2.2 Million Annual Impact at Bloomingdale’s
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
 
Curate Learning Experiences to Ensure Change Success
Curate Learning Experiences to Ensure Change SuccessCurate Learning Experiences to Ensure Change Success
Curate Learning Experiences to Ensure Change Success
 
Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...Harnessing UEBA and Machine Learning technologies to protect enterprises from...
Harnessing UEBA and Machine Learning technologies to protect enterprises from...
 
Activity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmmActivity 2 Presentation1.pptxlllllllmmmm
Activity 2 Presentation1.pptxlllllllmmmm
 
File000168
File000168File000168
File000168
 
Microlearning A New Paradigm to Train
Microlearning A New Paradigm to TrainMicrolearning A New Paradigm to Train
Microlearning A New Paradigm to Train
 
Webinar: A Communicator’s Guide To Metrics And Measuring Success
Webinar: A Communicator’s Guide To Metrics And Measuring SuccessWebinar: A Communicator’s Guide To Metrics And Measuring Success
Webinar: A Communicator’s Guide To Metrics And Measuring Success
 

More from ANCILE Solutions, Inc.

There's No Customer Engagement Without User Adoption
There's No Customer Engagement Without User AdoptionThere's No Customer Engagement Without User Adoption
There's No Customer Engagement Without User AdoptionANCILE Solutions, Inc.
 
Building User Adoption Into Your Enterprise Software (TSW2015)
Building User Adoption Into Your Enterprise Software (TSW2015)Building User Adoption Into Your Enterprise Software (TSW2015)
Building User Adoption Into Your Enterprise Software (TSW2015)ANCILE Solutions, Inc.
 
User Adoption: Getting Past the Buzz to the Value and Tactics
User Adoption: Getting Past the Buzz to the Value and TacticsUser Adoption: Getting Past the Buzz to the Value and Tactics
User Adoption: Getting Past the Buzz to the Value and TacticsANCILE Solutions, Inc.
 
User Adoption to Drive Retention: Whose Responsibility Is It?
User Adoption to Drive Retention: Whose Responsibility Is It?User Adoption to Drive Retention: Whose Responsibility Is It?
User Adoption to Drive Retention: Whose Responsibility Is It?ANCILE Solutions, Inc.
 
The Importance of User Skills Related to Enterprise System Implementation, R...
The Importance of User Skills Related to Enterprise System Implementation,  R...The Importance of User Skills Related to Enterprise System Implementation,  R...
The Importance of User Skills Related to Enterprise System Implementation, R...ANCILE Solutions, Inc.
 
SMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to ShareSMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to ShareANCILE Solutions, Inc.
 
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...ANCILE Solutions, Inc.
 

More from ANCILE Solutions, Inc. (9)

New Traffic Pattern Ahead
New Traffic Pattern AheadNew Traffic Pattern Ahead
New Traffic Pattern Ahead
 
There's No Customer Engagement Without User Adoption
There's No Customer Engagement Without User AdoptionThere's No Customer Engagement Without User Adoption
There's No Customer Engagement Without User Adoption
 
Clear These 3 User Adoption Hurdles
Clear These 3 User Adoption HurdlesClear These 3 User Adoption Hurdles
Clear These 3 User Adoption Hurdles
 
Building User Adoption Into Your Enterprise Software (TSW2015)
Building User Adoption Into Your Enterprise Software (TSW2015)Building User Adoption Into Your Enterprise Software (TSW2015)
Building User Adoption Into Your Enterprise Software (TSW2015)
 
User Adoption: Getting Past the Buzz to the Value and Tactics
User Adoption: Getting Past the Buzz to the Value and TacticsUser Adoption: Getting Past the Buzz to the Value and Tactics
User Adoption: Getting Past the Buzz to the Value and Tactics
 
User Adoption to Drive Retention: Whose Responsibility Is It?
User Adoption to Drive Retention: Whose Responsibility Is It?User Adoption to Drive Retention: Whose Responsibility Is It?
User Adoption to Drive Retention: Whose Responsibility Is It?
 
The Importance of User Skills Related to Enterprise System Implementation, R...
The Importance of User Skills Related to Enterprise System Implementation,  R...The Importance of User Skills Related to Enterprise System Implementation,  R...
The Importance of User Skills Related to Enterprise System Implementation, R...
 
SMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to ShareSMEs Unleashed - Enabling those with the Knowledge to Share
SMEs Unleashed - Enabling those with the Knowledge to Share
 
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
Accelerate Your Customers' User Adoption and Your Revenue with Performance Su...
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Microlearning, Tracking, and Compliance in ANCILE uAlign

  • 1. Got a Minute? Microlearning, Tracking, and Compliance in ANCILE uAlign®
  • 3. 3 “I am always ready to learn although I do not always like being taught.” - Winston Churchill
  • 9. 9 So that fixes everything. https://www.flickr.com/photos/tanj/
  • 13. 13 What Is Microlearning? “Microlearning emerges from the publication of small pieces of loosely joined digital information, which is often limited to a single topic.” Hall: Five Ways to Provide Microlearning, Hall, Chief Learning Officer Magazine, November 2009 “Learning processes that have been called ‘microlearning’ can cover a span from some seconds (e.g. in mobile learning) to 15 minutes (learning objects sent as e-mails).” Lindner: Use Your Tool, Your Mind Will Follow. Learning in Immersive Micromedia & Microknowledge Environments
  • 14. 14 Diagram of a Microlearning “Course”
  • 15. 15
  • 16. 16
  • 17. 17 •Grab their attention •Relate to topics they already know •Pretend you’re on fire •Repetition for retention •Pull, don’t push •Mix it up •Say it again with feeling •Stones to cross the river Microlearning
  • 18. 18 Tracking – Who’s doing what? https://www.flickr.com/photos/mricon/
  • 19. 19 •Who completed what? •By when? •How many are left? •What next? •Who needs help? •How do you track it? Tracking Needs Don’t Change
  • 20. 20 Yes, you could use Excel. http://supergrat.deviantart.com
  • 21. 21 Compliance – Why track this stuff? https://www.flickr.com/photos/mskogly/
  • 22. 22 Compliance issues relate to: • Situations • Activities • And Transactions that could potentially violate Federal, State, or District laws and regulations, or violate your company’s policies and procedures. And, that’s only in the U.S., international companies have additional regulations to track. Possible Areas of ConcernA World of Compliance • Research • Taxation • Fraudulent financial activities • Political activity • Conflict of interest • Sexual harassment • Discrimination • Information security • Health/safety, environmental • Financial reporting and controls
  • 23. 23 Foreign Corrupt Practices Act (FCPA) • Makes it unlawful for a U.S. person, and certain foreign issuers of securities, to make a corrupt payment to a foreign official for the purpose of obtaining or retaining business for or with, or directing business to, any person. • The law also requires publicly traded companies to maintain records that accurately and fairly represent the company’s transactions. Additionally, it requires these companies to have an adequate systems of internal accounting controls. • FCPA enforcement actions combined cost an average of $40M last year. • Enforcement Statistics:
  • 24. 24 Elements of a Compliance Program • Program oversight at the highest level of the business (often by the Board of Directors). • Thorough risk assessments to prioritize key legal risks to the business. • Standards and procedures designed to detect and prevent violations of the law. • Compliance training targeted to individuals’ roles and responsibilities. • A means for employees to report alleged misconduct anonymously if they choose to do so. • Consistent discipline for violators. • A monitoring system to evaluate the effectiveness of the program and to make adjustments as necessary. This is a key step, as your compliance program needs to stay up-to-date with changing circumstances and regulations.
  • 25. 25
  • 26. 26
  • 29. 29 Or, you could trust Excel. http://supergrat.deviantart.com
  • 31. 31 Align your workforce --------------------------------------------- Empower to take action --------------------------------------------- Validate their engagement ANCILE uAlign® Communications simplified, mobilized, and measured – because employee alignment is everything.
  • 32. 32 • uAlign enables real-time communication and validation. • uAlign empowers you to easily push messages to your workforce and apply action items. You can then validate workforce understanding and performance. • uAlign facilitates operational compliance and readiness, propels sales force enablement and enhances workforce effectiveness. Align Your Workforce --------- In The Cloud --------- ®
  • 33. 33 1 2 3 Wherever (cloud, mobile) Employee Partner Vendor To the right people (targeted) Ensuring comprehension (knowledge check) ! At the right time (prioritized) ! The Process ! Stakeholder Deliver the right information (filtered, relevant, agnostic)
  • 34. 34 With ANCILE uAlign, employees are always informed, always engaged, always productive.
  • 35. 35 CREATE a new message or link to online content SEND a prioritized message to key employees wherever they are TRACK employees as they consume the message and complete an assessment TARGET actions with employees/subscribers • Prohibit employee activity • Remediation • Training • Further communication ENSURE performance compliance With ANCILE uAlign, employees are always informed, always engaged, always productive.
  • 36. 36 What can you do with ANCILE uAlign? • Distribute a how-to video to your consultants. • Send a new product announcement to your sales team. • Schedule an internal communications campaign to introduce a new employee benefit. • Provide an alert on a new SEC rule to your finance team and assess their comprehension. • Send a workplace safety reminder to your warehouse employees.
  • 37. 37 A Trackable “Stone” of Content 4 3 2 1
  • 38. 38 Dashboard – Tracking Responses • How many people have completed a campaign? • When did they complete it? • Who still needs to? • What were the responses? • Complex reporting
  • 40. 40 For more information http://www.ancile.com/products/