|

SEARCH RESULTS


How All Kinds of Businesses Can Use AI Productively

This video, also available as a podcast, explores how entrepreneurs, family businesses, startups and Read More...

Category: Interviews

Author: Mat Hughes

Technical Specialized Knowledge and Founder Leadership at Initial Public Offering

We conceptualize the relationship between knowledge and a firm’s activities along two dimensions. Read More...

Category: Theory and Research

Authors: Jon Eckhardt , Marc Junkunc and Mingxiang Li

Cautionary Advice About Small-Business Credit Cards

Schulze Family Foundation and EIX. Read More...

Category: Features

Author: Kerry Hannon

LinkedIn CoFounder: Start with a Team, Not an Idea

could do for other professionals what our mutual friend had done for us: make productive business relationships Read More...

Category: Commentary

Author: Konstantin Guericke

The Entrepreneur's Profit Model: A Diagnostic Tool

can only buy/use at certain periods prices tied to customer characteristics, such as size of their family Read More...

Category: Applied and Practice

Authors: Michael Morris and April Spivack

Seven Legal Pitfalls Your Startup Should Avoid

Wrong Co-Founder or Relationship The idea that you can pick the wrong co-founder presumes that one should Read More...

Category: Practice Insight

Author: Paul Swegle

How Mentors Help People Turn Great Ideas into Viable Businesses

Little compared mentor relationships to custom lighting because they are tailored to meet the specific Read More...

Category: Features

Author: Rachel Leland

Building a Company Step by Step, Ch. 8: Introduction to Customer Validation

He is the co-founder of Troops, a technology company building a mobile customer relationship management Read More...

Category: Interviews

Author: Jon Eckhardt

Entrepreneurship in an Era of Digital Transformation

Management and relationship problems became more pronounced during the pandemic, when almost everyone Read More...

Category: Commentary

Author: Elisabeth E. Bennett, PhD

Non-Competes Are a Double-Edged Sword

defense mechanism, shielding a business's proprietary information, trade secrets, and customer relationships Read More...

Category: Applied and Practice

Author: Cassandra Torgnes