Direct Technology Group Blog

Direct Technology Group provides professional IT Support and Network Services for Businesses around South Florida. Computer Services, Tech Support, IT Solutions and more!

Tip of the Week: Video Conferencing, Done Better

Video conferencing has become a staple in the workplace, especially as social distancing encourages teams to remain at home and collaborate remotely. Considering this, it only seemed prudent to dedicate this week’s tip to how to use video conferencing more effectively.

Setup Properly

When you need to work from home and join a video conference, you and your surroundings should get a little attention before the meeting begins.

First, you need to find a quiet area where you won’t be disturbed. While the video of Prof. Robert Kelly’s BBC World News interview being interrupted by his kids is adorably hilarious, it might not be as endearing to your coworkers if Rover jumps up and knocks over your workstation.

Make sure the area behind you (that will be visible to your fellow participants) is neat and tidy, and that your lighting makes you look okay. Once you’re properly settled, you’re ready to start your meeting… but wait!

Even though you’re working from home, you still need to maintain some level of business decorum. Tidy yourself up as though you were still participating in an in-house meeting and behave accordingly. Show up on time and dress appropriately for your workplace culture.

Plan Ahead

Furthermore, it pays off to take the time beforehand to set the stage for the meeting itself. Rather than allowing tangents and errant thoughts to dominate the meeting and eat up the available time you have, put together an agenda. By sharing the agenda with the other participants, you are preparing the group to hit the ground running.

The same goes for any documents or files that will be referenced in the meeting. Make sure that access to them is shared to the group beforehand so there isn’t an interruption later, like one person not being able to open them.

That being said, you should go into your meeting expecting some level of off-topic courtesy. People are going to ask about each other, especially after working together for any length of time. Instead of quashing this time, prepare for it and get down to business after pleasantries have been exchanged.

Collaborate Courteously

Once the meeting gets underway, it is important to remember that the rules are a little different than they would be during an in-person one.

For instance, a live meeting wouldn’t require you to have a microphone during the exchange. When it isn’t your turn to talk, make sure you are muted appropriately. Your coworkers don’t need to hear what is happening in your house at the time, and certainly don’t need to hear you if you step away to use the bathroom.

Your coworkers also deserve your complete attention, so even though they are not in the room with you, make sure that you remain focused. Working on other things or checking email throughout the meeting is another no-no.

By keeping these basic guidelines in mind, you are much better prepared to participate in an effective and productive remote meeting. Direct Technology Group can make sure you have the technology to do so. To learn more about what you’ll need, give us a call at 954-739-4700.

How Cloud Solutions Fit into Businesses Today
Cyberattacks Circulating Around World Health Organ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 31 May 2020

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Business Computing Cloud Efficiency Hackers Google Malware Productivity Microsoft Network Security Data Innovation User Tips Software Smartphones Business Miscellaneous Backup Hardware Email Workplace Tips communications Computer Hosted Solutions Mobile Devices Internet Communication Small Business Android IT Support Productivity Business Management Ransomware VoIP Smartphone Windows 10 Cybersecurity Outsourced IT Upgrade Windows Browser Managed IT Services Social Media Mobile Device Users Network Tech Term Microsoft Office Collaboration Passwords Bandwidth Save Money Apps Business Continuity Holiday Windows 10 IT Services Employer-Employee Relationship Automation Cloud Computing Managed IT Services Office Facebook Gadgets Internet of Things Data Backup Quick Tips Marketing Chrome Saving Money Networking Managed Service Phishing Server Disaster Recovery IT Support Data Recovery Gmail Wi-Fi Mobile Device Management Wireless Router Alert Apple Applications Health Password Information Hacking Virtualization VPN App Mobility Access Control Office Tips Managed Service Provider Remote Computing Computers Settings Business Intelligence Retail BDR Office 365 Cybercrime Government Website Remote Monitoring Law Enforcement Operating System iPhone Recovery Excel Going Green Data Management Analytics Blockchain Patch Management Laptop BYOD Physical Security Application Big Data Telephone Systems Google Drive Word Biometrics Safety Workers Virus History Mouse Paperless Office Social Engineering VoIP Politics Compliance Managed IT Service Data Breach Humor Artificial Intelligence Mobile Computing Battery Environment Maintenance Value Bring Your Own Device Entertainment Lithium-ion battery WiFi Twitter Spam Mobile Office Human Resources HIPAA Remote Monitoring and Management Virtual Assistant Cleaning Hybrid Cloud Data Protection RAM DDoS Robot Hard Drives How To Tech Support IT solutions PowerPoint Cost Management Tech Terms Sports Net Neutrality Customer Relationship Management Employee-Employer Relationship Shadow IT Risk Management Processor Information Technology Company Culture Customer Service Healthcare Internet Exlporer Business Technology Scam G Suite Vulnerability Streaming Media Fax Server Data Security Printer Smart Technology The Internet of Things Cortana Telephony Two-factor Authentication Printer Server Medical IT Files Connectivity Voice over Internet Protocol Data storage Managing Stress End of Support eWaste Batteries Current Events Search User Error Social Network Best Practice Hosted Solution Virtual Reality Telephone System Payment Cards Education Tablet Wireless Charging Dark Web Shortcut Conferencing Tip of the week Windows 7 Bluetooth Hiring/Firing Taskbar Botnet Entrepreneur IT Service Microsoft Office 365 Public Cloud IT budget Tactics Remote Support Touchpad Content Filtering Remote Control Scams SaaS Social Networking Training Legal Unified Communications Time Management Tablets Multi-Factor Authentication USB Staffing Meetings National Security Managed IT Mobile Authentication IT Management Internet Explorer User Tip Spam Blocking Project Management Security Cameras Technology Tips Chrome OS Windows XP Holidays Analysis Relocation WannaCry Updates Remote Authorization PDF Threat File Sharing Backup and Disaster Recovery Microsoft Teams Telecommuting Email Management Distributed Denial of Service Insurance Wearables Video Games Computer Accessories Memory Virtual Private Network Hard Drive Consultant Budget User Security Remote Workers Troubleshooting Network Attached Storage Printing SSD Black Market Millennials Electronic Health Records Cameras Webcam Co-Managed IT Processors Licensing Best Available Gadget Display Programming Covid-19 Update Server Management Paper YouTube Inventory Worker Alerts Employees Memes Reporting Spyware Travel SharePoint Benchmarks Outlook Machine Learning Ink NarrowBand Mobile Security File Management Cables Downtime Encryption WIndows 7 E-Commerce Unified Threat Management Work/Life Balance Solid State Drive Avoiding Downtime Analyitcs IT HP Live Streaming Sales Recycling Automobile Profitability Windows Media Player Telecommute Wireless Technology Hacker e-waste Managed Services Provider Voice over IP Multi-Factor Security Notifications Payment Hard Disk Drive Hosted Desktop GDPR Document Management disposal WhatsApp Knowledge Eliminating Downtime Data loss Downloads Chromecast Science Vendor Monitor eCommerce Access instant Messaging Video Firewall Storage Internet exploMicrosoft Digital News Comparison Copy Bitcoin Antivirus Wireless Internet Techology Staff Trends Windows 8 Amazon Reputation Online Shopping Phone System Printers Vulnerabilities OneNote Google Maps Profiles Error Advertising Edge User Specifications Paste Wearable Technology Social Help Desk HaaS Websites A.I. Spotify Distribution Plug-In Customer Cryptocurrency People Windows Server 2008 R2 Bloatware Computer Repair Touchscreen Private Cloud Database Running Cable Threats Personal Information Certification Flexibility Dongle Movies Cabling Fleet Management Proactive IT Lead Generation Uninterrupted Power Supply