Search

  • Excel charts: Pie charts

    This webpage, written by Jorge Camoes for ExcelCharts, outlines the arguments for and against using pie charts and then provides detailed advice and some dos and don'ts for using them.
    Resource
  • Technology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator

    This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.
    Resource
  • Canva

    Canva is a very simple, free to use, online infographic creation platform. It has a drag and drop interface and a range of templates that you can adapt.
    Resource
  • Digital dividends in natural resource management

    The report sets out research findings on the "digital dividends" of various types of technology on natural resource management in low and middle-income countries.
    Resource
  • Infographics

    An infographic (short for 'information graphic') represents data visually so that the information is able to be quickly and easily understood.
    Method
  • Mentoring

    Mentoring is a process where people are able to share their professional and personal experiences in order to support their development and growth in all spheres of life.
    Method
  • Mentoring matters

    This Primary Health Care Research & Information Service webpage provides an overview of the importance and benefits of a good mentoring program.
    Resource
  • Mentoring made easy

    This guide from the NSW Premier's Office outlines the process and advantages of setting up a formal mentoring program in the workplace.
    Resource
  • Mentoring for the new millennium

    This article outlines the rationale behind mentoring and argues that developing a formal mentoring program will lead to the development of a learning organisation.
    Resource
  • SAVE Toolkit: Technologies for monitoring in insecure environments

    In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatio
    Resource