Experts Matter. Find Yours.

Connect for media, speaking, professional opportunities & more.

Filters

Richard Kerr-Bell

Richard Kerr-Bell

Author - ConsultantRangi Point

The Heart of the Matter

Teenage IssuesCross Cultural Communication
Lisa Horvat

Lisa Horvat

VP Storytelling and Digital StrategyStrategic Storytellers

Corporate Storytelling, Social Media, Video

StorytellingSocial Media
Chris McNulty

Chris McNulty

SharePoint Strategic Product ManagerQuest Software

Microsoft SharePoint product management, solution architect, speaker, author on Sharepoint, SQL, EPM, with Quest Software

SharepointMicrosoft Business Intelligence (Sql)Microsoft Enterprise Project Management (Project Server)
Daniel Lathrope

Daniel Lathrope

Professor EmeritusUC Hastings

Contact Information: lathrope@uchastings.edu

John Kreiss

John Kreiss

PresidentJPKreiss

John P. Kreiss

Social MediaInbound MarketingContent Marketing
Sarah Red-Laird

Sarah Red-Laird

Advisory Board MemberThe New York Bee Sanctuary

Executive Director at Bee Girl

Grant WritingCommunity OutreachBeekeeping
Stephen Di Biase

Stephen Di Biase

Chief Scientific OfficerElevance Renewable Sciences

Application and Product Development in Specialty Chemicals and Lubricant Additives

Innovation ManagementBusiness Model DevelopmentOrganizational Design
ALife Allah

ALife Allah

Senior Editor and PromotionsSupreme Design Publishing

Urban Health Monk, Media Mogul, Information Merchant, Solar Powered Architect, Hood Health, Science Solutions

HealthScience
Omid Ardakani

Omid Ardakani

Assistant ProfessorGeorgia Southern University

Professor Ardakani researches econometrics, financial and monetary economics

Computational StatisticsFinancial EconomicsEconometricsMonetary Economics
Brian Levine

Brian Levine

Director of Cybersecurity Institute and Distinguished Professor in the Manning College of Information & Computer SciencesUniversity of Massachusetts Amherst

Brian Levine's work focuses on thwarting child sexual exploitation on the internet.

internet-based child exploitationDigital ForensicsNetwork SecurityInternet SecurityChild Rescue