Thought Leadership

Sponsored
On March 7th, hundreds of members of Minnesota’s entrepreneurial ecosystem will gather at the The Minnesota Entrepreneur Kickoff.  A focal point of conversation is emergent technologies. Read More
Sponsored
Eighty-six percent of college undergraduates own smartphones. But even with so much information at their fingertips, today’s college students remain novices when it comes to their finances. More than half of students surveyed in a recent LendEdu study reported having no personal finance education in high school. Read More
Sponsored
Founded 75 years ago by Don Rosen, Pilgrim Dry Cleaners has a long history of giving back to the community and incorporating corporate social responsibility into their business plan.  Read More


Sponsored
There are winners and losers under the new tax reform law, the Tax Cuts and Jobs Act (TCJA) which is primarily designed to provide tax cuts for businesses of all types. Read More
Sponsored
Recent developments in U.S. courts may remind business owners of the aphorism, “be careful what you wish for.” Last year was another one of landmark evolution in the law and procedures relating to patent infringement litigation. Read More
Sponsored
As Minnesota's gross domestic product grows, more and more manufacturing companies are looking for guidance in how to protect themselves without impeding innovation. Late last year, Minnesota Business convened a panel of experts to address those issues. Read More
Sponsored
While no product or service can be a good fit niche products have an even narrower market than most. Marketing a niche product starts with creating a marketing plan that’s in step with your business plan.  Read More
Sponsored
Jordan Hopkins always dreamt of owning his own company. In June 2017, that dream became a reality when he purchased his employer of the past 13 years — Perfection Heating & Air Conditioning, Inc. — with the help of a Small Business Administration loan.  Read More
Sponsored
When developing cybersecurity programs, many businesses focus on protecting their infrastructure perimeters and device endpoints. But it’s also important to consider what happens when a threat bypasses perimeter defenses and targets an employee in the form of a malicious email, text, or even a voicemail. Read More