Search
10 results
Filter search resultsExcel charts: Pie charts
This webpage, written by Jorge Camoes for ExcelCharts, outlines the arguments for and against using pie charts and then provides detailed advice and some dos and don'ts for using them.ResourceSketchnoting 101: How to create awesome visual notes
This guide by Matthew Magain outlines his process and tips for creating sketch-notes (what BetterEvaluation calls graphic recordings).ResourceSketcho frenzy: The basics of visual note-taking
This is a short (3-minute) video by Claudine Delfin about the benefits of visual note-taking. It's also a good example of a video that has been created from a visual note-taking process.ResourceTechnology for Evaluation in Fragile and Conflict Affected States: An Introduction for the Digital Immigrant Evaluator
This paper aims to help evaluators working in fragile and conflict affected states (FCAS) to determine which technology may be useful in various phases of an evaluation.ResourceCanva
Canva is a very simple, free to use, online infographic creation platform. It has a drag and drop interface and a range of templates that you can adapt.ResourceTalking about visuals: A discussion with graphic recorder Katherine Haugh
Often referred to as 'visual note-taking', graphic recording is a method that merges data collection and reporting to create a visual record of a discussion.BlogDigital dividends in natural resource management
The report sets out research findings on the "digital dividends" of various types of technology on natural resource management in low and middle-income countries.ResourceInfographics
An infographic (short for 'information graphic') represents data visually so that the information is able to be quickly and easily understood.MethodGraphic recording
Graphic recording is the translation of conversations into images and text on large sheets of paper during meetings and events.MethodSAVE Toolkit: Technologies for monitoring in insecure environments
In this toolkit from the SAVE research programme, users can find a detailed summary of technologies suited to monitoring in insecure environments, including applications, their pros and cons as well as many links to more detailed informatioResource