How to Have a Productive Remote Meeting - for a Change - Slide 14

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23
Next For Participants: Prior to the Meeting-14 Next

For Participants: Prior to the Meeting

All participants need to understand how to use the functions and features available. Avoid interrupting the meeting with technology questions.

Slide Show

Download a customizable best practices checklist from our partners at 
Info-Tech to help you get the most out of your remote meetings.

Done well, remote meetings mean saved travel dollars and greater collaboration of skilled resources. Done poorly, they can be highly unproductive, negative experiences.

Good practices of regular meetings still apply, but more is required for remote meetings. Use the following Facilitator and Participant best practice checklist items, from our partners at Info-Tech Research Group, to get the most benefit from remote meetings. To download the list as a customizable checklist for your own office, visit the Knowledge Network, where you will find more Info-Tech Research tools as well as additional guidance on having productive meetings.

Also see our popular slideshow on 10 Tips on Having a Great Meeting.
 

Related Topics : Intranets, Network Protocols, Networking, OS Interoperability, TCO

 
More Slideshows

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Fake news How Can We Fix the Fake News Problem?

Is fake news a security issue? Some say yes, as it can be used as a social engineering tool to spread disinformation and conceivably to get unsuspecting users to click on malicious links. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.