Share Business Whitepapers and Research Papers.

Join the community of professionals just like you.

Featured Whitepaper

Expert Guide to Secure your Active Directory

You probably are already aware of the importance of protecting your Active Directory, but that’s just part of the...

The do’s and dont’s of a successful Hyper-V deployment

Microsoft’s latest release of Hyper-V delivers a number of new improvements and features that are exciting for new and...

SMB and Consumerization of IT

As social media becomes an integral part of consumer technology, an increasing number of employees are bringing their personal...

Stay Compliant AND Improve Service: Extending Call Recording to Mobile Devices

For many enterprises, call recording helps reduce business risks and improve service and support. For some, especially in finance...

8 Key Mobile Device Management Concerns and how BlackBerry Responds

Balancing personal and business needs of today’s mobile workforce can be daunting. Users demand access while the business requires...

Water and sanitation issues in relation to sexual and reproductive health across the female lifespan

Water and sanitation have an impact on the sexual and reproductive health (WSSRH) of females across their lifespan.This document...

5 Ways to Manage the Rising Costs of Benefits

A robust benefits package can be the difference between a talented superstar choosing to work with you versus a...

Privileged User Activity Auditing: The Missing Link for Enterprise Compliance and Security

Detailed actions of privileged users is critical in today\'s business environment of IT outsourcing, off-shoring and supplementing IT staff...

Webroot Secure Anywhere – Try the fastest and lightest antivirus and firewall protection

Webroot Secure Anywhere provides a new approach and delivers faster, more effective virus protection that\'s always up to date....

10 Step B2C Marketing Automation Action Plan

B2C marketing executives are increasingly becoming more interested in the exciting world of marketing automation. The problem is the...

Best Practices for Training and Retaining Online Adjunct Faculty

Becoming a new faculty member is seldom easy. Whether the instructor is simply transi- tioning to a new university...

Designing a System for More Meaningful Results

The past few years have ushered in more strident calls for accountability across institutions of higher learning. Various internal...

Stem Cell Backup

This white paper discusses how iPS cells are used in cell therapy. It discusses the main scientific studies, the...

2012 Business Software Demand Generation Marketing Report

During November, December and January, Frantz Group Research conducted a survey of senior marketing executives at business software companies...

Strategies for Teaching Large Classes

Large classes are among the most important at any institution because many students who enroll in these classes are...

Usage Habits and Trends of Today\’s College Faculty

Although the majority of faculty do not currently use Twitter, their reasons are varied. While many questioned its educational...

Strategies for Increasing Online Student Retention and Satisfaction

Despite the tremendous growth of distance education, retention remains its Achilles’ heel. Estimates of the failed retention rate for...

Social Media Usage Trends Among Higher Education Faculty

For the past two years, Faculty Focus conducted a survey on Twitter usage in higher education, this year we...

Course Design and Development Ideas That Work

It’s the thoughtful contemplation of your vision for the course — from what you want your students to learn,...

Promoting Academic Integrity in Online Education

Ask most people who don’t teach online about the likelihood of academic dishonesty in an online class and you...
 
Page 286 of 291«284285286287288»