Help your users retain memory for durable, flexible, use knowledge
Improve memory retention with adaptive learning software grounded in cognitive science and powered by human-centered AI. Securely integrate Memre into your internal training systems or LMS via LTI, SAML, or our APIs.
Easily create learning content with the power of AI
Quickly import your existing learning material or create new material from lengthy manuscripts to video content. Our Natural Language Processing (NLP) algorithms will automatically scan lengthy text passages, transcribe videos, highlight and develop key concepts within the transcription, and suggest quiz questions. You can then review, and edit the material to launch the content for learning and testing within seconds.
You can also create an entire course based on a single topic. Our AI-powered content creation tools will scan the web to construct a course template, including separate assignments for each series of related concepts. You can edit the draft course, create assignments and tests, all customized to the skill and knowledge level of your learners.
Personalize memory retention at scale
Memre’s patented AI algorithms learn more and more from each user's interactions to create a learning schedule unique to each user's own forgetting curve. The adaptive learning software tracks each learner’s progress and prior performance, including how quickly they answer questions, and how often they engage with the material. Our AI automatically builds that study schedule based on the desired level of memory retention. Notifications and email reminders induce learners to study at optimum intervals to improve memory and reinforce knowledge.
Memre: Spacing Out Your Learning Over Time
Memory decays and knowledge fades. That is part of our biology. According to German psychologist Hermann Ebbinghaus in his landmark psychology study, humans typically forget around 75% of what they have learned within 48 hours. Training through spaced repetition is a proven method to reverse the “Forgetting Curve” and improve instructional effectiveness. Distributing instruction over shorter sessions is a cognitive science principle that serves as the foundation for our adaptive learning software. Using the "testing effect," we incorporate quizzes into every micro-learning session, helping build stronger retention to provide a clear snapshot of memory in real time.
Forecast performance and results with predictive insights
Get powerful, actionable insights into learner progress on an intuitive analytics dashboard. Track learning progress to assess readiness for every user in every course in real-time. Identify and address areas of weakness early on, even before users take a test. Memre’s human-centered AI records each user’s progress and can report performance data towards objectives before they take a test.
Integrate your LMS
Integrate for deeper engagement
Secure learning with peace of mind
Access to Memre is provided by a combination of a username or email, and a password, or through OAuth 2.0 based authentication strategy for API or SSO access. We never store your passwords in plaintext, and all passwords are individually salted and hashed using the Blowfish algorithm, one of the highest standards for password protection. Sessions are maintained using an encrypted cookie utilizing the latest OWASP recommendations for session management.
Permissions and Access scoping:
All permissions to resources within our system are managed by a role based permission system which vets each endpoint and only serves appropriate content to the authenticated account. Multiple tiers of roles allow users to finely control and tailor access to management tasks within your organizational account.
Logging and Auditing:
Memre uses a centralized logging solution in order to manage all access logs and provide a reliable audit trail.
All Memre services are provided using auto-scaling servers and automated self-healing failovers. We guarantee 99.9% uptime to all of our clients. We monitor all of our services continuously and have numerous automated checks that alert our engineering team in the event of an incident.
Memre tests all changes in a dedicated replica of its production environment. Our engineering team uses Test Driven Development (TDD) practices to ensure our APIs are verified against a suite of thousands of automated tests that are continuously running.
Disaster Recovery and Business Continuity
Memre stores all its data in highly secured cloud-based services, off-site, distributed across different AWS data centers across the U.S. . Memre performs daily backups of its databases, and maintains a redundant database for immediate failover. Memre performs automatic testing of its database failover and recovery procedures, and performs manual testing every several months.
Memre has data integrity checks to make sure data is self-consistent for efficacy.
Memre database failures are restored immediately through an automated failover, otherwise data can be restored from a backup that is at most one day old. Database restoration should take no longer than a few hours to prevent any application “downtime”, considered to be the time(s) where critical application functionality (student study, instructor analytics, etc.) is not available across the user base.
FAQs on Security, Data Privacy and Protection
Q: Is a senior official or officer within Memre directly responsible for the oversight and implementation of the security policies?
Q: Does Memre employ procedures to ensure compliance with privacy laws and regulatory requirements related to maintaining security, confidentiality, and protection of third-party personal information (e.g., information pertaining to customers’ employees, customers, and/or producers)?
Q: Can Memre submit documents proving it maintains liability insurance and preferably cyber risk insurance?
Q: Does Memre publish and enforce security policy document(s)?
Q: Does Memre communicate these procedures to subcontractors who may have access to customer data?
Q: Does Memre monitor these procedures?
Q: How does Memreo prevent clients from accessing each other's data?
A: Memre has a rigorous permission subsystem that protects clients from having their data accessed by other users.
Q: Does Memre employ mechanisms that facilitate secure data exchange such as SSL, TLS, SFTP, VPN, etc?
A: Memre mandates SSL/TLS for all web-based access and key only SSH for server maintenance.
Q: Does Memre employ a “Default Deny” for all data except where a customer explicitly grants access?
Q: Does Memre support authentication methods such as Federation (SAML compliant) or single sign-on?
A: OAuth2, LTI, and SAML are supported for single sign-on.
Q: Does the hosting service provide authentication mechanisms?
Q: Can Memre’s system be configured to require strong passwords?
A: Yes, customers can require that passwords be composed of at least 1 uppercase, 1 lowercase, 1 symbol, 1 number and be at least 12 characters long.
Q: Can customers (partner organizations) dictate password criteria as needed to ensure compliance with applicable security standards?
A: Yes, within existing options.
Q: Does Memre encrypt all passwords during network transit?
A: Yes. Memre encrypts all requests with SSL/TLS.
Q: Are passwords encrypted in storage?
A: Yes. Memre encrypts all passwords using bcrypt.
Q: How does Memre maintain authorization controls?
A: Memre sessions expire every 2 weeks.
Q: Can Memre configure authorization process controls to automatically disable user accounts or access privileges after a defined period of non-use
Q: Does Memre’s system offer the ability to restrict access within the application based on roles assigned to authorized users?
Q: Can Memre’s security controls detect and report unauthorized access attempts?
Q: Are all attempted and successful logins logged, including date/time, userid, source network address, and maintained for at least one year?
Q: Can Memre’s system provide easy-to-read security reports that identify users and their access levels for periodic review?
Q: Are security incidents monitored and tracked until resolved?
Q: Does Memre have a breach response plan that includes notifying customers if sensitive data is unknowingly or accidentally released?
Q: Is incident information and common vulnerabilities or threats shared with data hosting customers?
A: Under NDA, when appropriate.
Q: Will a third party ever have access to the service provider’s hardware or systems that store a partner organization’s Restricted Data?
Q: Are Memre’s database and web server access and error logs regularly reviewed for anomalies that could indicate a compromise?
Q: What process does Memre have in place to identify security breaches on vendor-managed systems (e.g., file integrity checks)?
A: Memre makes extensive use of AWS Security Audit Services
Q: In case of a security breach or unexpected exposure of Restricted Data, what are the Memre incident response procedures?
A: Memre will work together with the partner organization to message and handle the response.
Q: What is Memre’s process for disclosing any data requests, such as subpoenas or warrants, from a third party?
A: See our Terms of Service for more information.
Q: Has Memre ever experienced a breach of customer data?
Q: Which intrusion prevention/detection systems does Memre employ?
A: Application and Network anomaly detection; Monitoring of security policy violations and application/networked services availability; Logging of account success and failures events
Q: What software development life-cycle methodologies does Memre use to develop its software (e.g., TSP-Secure, SAMM, Microsoft SDL, OWASP, NIST SP800-64 rev 2)?
A: Application Specific, we also follow OWASP recommended best practices for session management.
Q: Are security components identified during each phase of the software development life-cycle?
Q: Does Memre have change management policies in place?
Q: Are customers notified of changes?
A: Yes, Application Specific.
Q: Does Memre regularly perform source code audits?
Q: Are source code audits performed by someone other than the person or team that wrote the code
Q: Does Memre employ firewall services to protect the network?
Q: Is Memre’s firewall installed on a dedicated system and is kept up-to-date?
Q: Does Memre allow non-standard (>1024) IP ports to pass through the firewall?
Q: Does Memreo regularly scan and verify all the allowable services provided by the firewall server?
Q: Does Memre use firewall-reporting tools to analyze the firewall log?
Q: Does Memre periodically document and verify security policies on the firewall?
Q: Does Memre protect internal IP address range(s)? (e.g., use NAT/RFC 1918)
Q: Does Memre scan all emails for malware?
Q: Is there an explicit policy requiring anti-malware software on networked computers?
Q: Does Memre have centralized administration of malware control, such as distribution of signature updates, reporting, policy enforcement, and vendor management?
Q: Are additional measures in place to protect against malware?
Q: Does the malware checking software run in the background with established frequency of scanning, etc.?
Q: Does Memre allow installation of personal and non-corporate software or hardware on network computers?
Q: Does Memre employ Application Whitelisting to ensure non-approved programs such as malware cannot execute on managed workstations?
Q: What is Memre’s approach to scalability?
A: Memre uses AWS auto-scaling groups across all of our stack.
Q: How does Memre handle load balancing?
A: All Memre endpoints are behind an Elastic Load Balancer.
Q: What tools does Memre use for API monitoring?
A: Memre uses Cloudwatch and Datadog to monitor uptime and notify on-call engineers.
Want to learn more?
Book a 30-minute complimentary consultation with a Memre expert.