Technology Training: Trends for the 21st Century
These three terms form a cutting-edge trend all by themselves. In IT, there is one thing that trainers and executives can reasonably expect—the unexpected. Software marketers and producers are already acting on this notion. Voice activation and recognition will begin to play a larger role in how we compute. There is also a trend in the desire for simulations. This cutting-edge technology allows the learner to “try the job” prior to actually “doing the job”.
It's a matter of thinking ahead. Red Hat, Inc., which has been building the enterprise credibility of Linux for several years now, tells would-be trainers and trainees that “staying current with technology, best practices and user communities are all essential.”
Not so long ago, Price-Waterhouse introduced a CBT (computer-based training) Multimedia program as a prerequisite for a week-long classroom course. The program reduced by 50% the time needed for users to get up to speed. The cost per learner was $760 for traditional instructor-led training, versus $106 per learner for multimedia training. Price-Waterhouse estimated that sustained use of such multimedia instruction could amount to a savings of some $10 million US.
Content is important with any course, but high-quality, competent instructors are also a must. You don't send a boy to do a man's job, and you don't send an actor to represent the challenging world of network training. Along with experts in knowledge, you need expert teachers. It helps if trainers are tops in their field.
Paul D. Sheriff, a past president of the Orange County Visual Basic User Group, has more than 14 years of experience in programming business applications. “I like to teach people real-world concepts, not just how to use the syntax of the language,” he says. “I stress good programming standards, how to approach problems, and give real examples that I take right from my consulting business.”
Dr. Hany Greiss works as a Senior Technical Instructor for PEAC, Inc., in Ottawa, Ontario. His teaching philosophy shows why he is a sought-after teacher and trainer. “I say to all those I teach, do not become encyclopedias, but rather understand concepts, and when you're on the job, you can look things up.” In hiring trainers, he says to look for people with a passion for their product, people with an eye for conveying the big picture. Small details can always be tended to in the field.
Everyone likes to learn at his or her own speed. Taking time away from an already-crammed schedule to attend a one-week seminar in a far-flung city requires lots of time and manpower. Here is where video technology comes to the rescue. For organizations that prefer quality training at a fraction of the cost of traditional classroom and web-based training or distance-learning applications, videos and CD-ROMS are an effective and creative alternative. Students are able to start, view, stop, review and start again at their own speed. Even better, there's no one in the front row dominating the lecture or asking all the questions.
Individualized learning means the freedom, if not the necessity, of learning when and where you want. “On-line users and students need specific, detailed and often repetitive instruction,” says Paul Swanson. One of the most valuable advantages of self-paced training over a classroom setting is that while the classroom instruction will be over in an hour or two, the videos will still be around. The material is always there if the trainee forgets a concept or application.
A 1998 study by PC Computing Business Labs found that training increases employee performance by nearly 20% and pays for itself within weeks. The Gartner Group of Stamford, Connecticut, surveyed 250 enterprise managers in 1997 and found that 93% of companies surveyed pay for certification and 89% pay for training. Alert executives are closely scrutinizing trends in certification and testing.
It's good to be realistic. Training, too, is affected by the old law of diminishing returns. Red Hat's web site puts it this way: “Training alone is not enough to become a competent user, operator, system administrator or engineer. Good training can provide a foundation; the participant must do the rest.”
Some challenges of the 20th century will remain to test 21st-century trainers. Gwen Wakal, president of the Edmonton-based Active Computer Service, a pioneer in computer training in Canada, says: “It's still not as easy as it seems out there for one network to talk to another, even with Intranet and CD-ROM going for you.” Training for bridge-building platforms and cross-supporting technologies will be called for more and more as software packages try to find the middle of the road between greater complexity and a call for standardization. This means that at least as far into the future as we can see, affordable, high-quality, self-paced computer training products and trainees will be a mainstay as IT enters the new millennium. “On a scale of 1 to 10, I rate training as a 10,” says Liz Peterson. “Training will always be necessary,” concludes Wakal. “Make sure you get the best you can.”
The age of the laptop learner and the cyber-student is here. As the 1990s dawned, America's Secretary of Education warned that traditional learning methods were in a time warp when measured against the mushrooming explosion in technology. This warning has specific application for the technology training industry. Too often, the chalkboard or out-of-town seminars are still the norm. Yet in this fast-moving world of intranet and Internet education, it is vital to sort out the glitz from the gold. What's needed is a holistic and realistic look at the trends affecting technology training today and in the future.
Brian Holt is Marketing Director of Keystone Learning Systems.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- The Death of RoboVM
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide