Adobe Debuts eLearning Software

##AUTHORSPLIT##<--->

Adobe today announced an update to the company's electronic learning software, Captivate. The new version 3.0 will add enhanced recording capabilities and integration with Microsoft PowerPoint. It will ship in August.

Captivate 3 is an electronic learning tool designed for training, simulations, and interactive assessments. It provides virtual meeting rooms and operates within Adobe Acrobat Connect. Some of the features in version 3.0 include:

  • Support for SCORM 2004, SCORM 1.2, AICC, and PENS for integration with learning management systems;
  • Section 508 compliance;
  • Multi-mode recording for enhanced capture of meetings;
  • Re-recording capabilities;
  • The ability to import Microsoft PowerPoint presentations and convert them to Flash;
  • New visual effects for transitions;
  • Export of sessions to Flash Player-compatible formats;
  • XML export and import; and
  • Support for rich media, including Flash (SWF, FLV, FLA), MP3, and AVI.

Adobe Captivate 3 is expected be available in August--possibly next week--with support for various flavors of Microsoft Windows. (A Mac version, according to Adobe, is not presently in the works, though a company representative said the developer is open to the idea of bringing it to the Mac, should there be enough demand.) The software retails for $699, but the education price is $199 for a license, which is $100 less than the retail upgrade price of $299 for Macromedia Captivate 1 and 2 users. Localized versions in French, German, Japanese, Italian, and Spanish are expected to be available in September.

Read More:

READ MORE DAILY NEWS


About the author: David Nagel is the executive editor for 1105 Media's online education technology publications, including THE Journal and Campus Technology. He can be reached at [email protected].

Proposals for articles and tips for news stories, as well as questions and comments about this publication, should be submitted to David Nagel, executive editor, at [email protected].

About the Author

David Nagel is the former editorial director of 1105 Media's Education Group and editor-in-chief of THE Journal, STEAM Universe, and Spaces4Learning. A 30-year publishing veteran, Nagel has led or contributed to dozens of technology, art, marketing, media, and business publications.

He can be reached at [email protected]. You can also connect with him on LinkedIn at https://www.linkedin.com/in/davidrnagel/ .


Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation in Education

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education, from preschool through higher education.

  • teen studying with smartphone and laptop

    OpenAI Developing Teen Version of ChatGPT with Parental Controls

    OpenAI has announced it is developing a separate version of ChatGPT for teenagers and will use an age-prediction system to steer users under 18 away from the standard product, as U.S. lawmakers and regulators intensify scrutiny of chatbot risks to minors.

  • cybersecurity book with a shield and padlock

    Proposed NIST Cybersecurity Guidelines Aim to Safeguard AI Systems

    The National Institute of Standards and Technology has announced plans to issue a new set of cybersecurity guidelines aimed at safeguarding artificial intelligence systems, citing rising concerns over risks tied to generative models, predictive analytics, and autonomous agents.

  • a cloud, an AI chip, and a padlock interconnected by circuit-like lines

    CrowdStrike Report: Attackers Increasingly Targeting Cloud, AI Systems

    According to the 2025 Threat Hunting Report from CrowdStrike, adversaries are not just using AI to supercharge attacks — they are actively targeting the AI systems organizations deploy in production. Combined with a surge in cloud exploitation, this shift marks a significant change in the threat landscape for enterprises.