How to Have a Productive Remote Meeting - for a Change - Slide 13

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23
Next For Facilitators: During the Meeting-13 Next

For Facilitators: During the Meeting

Ensure everyone has the same understanding. People are more reluctant to question meaning over the phone or in a fully online meeting and there are fewer body language cues available to detect confusion.

Slide Show

Download a customizable best practices checklist from our partners at 
Info-Tech to help you get the most out of your remote meetings.

Done well, remote meetings mean saved travel dollars and greater collaboration of skilled resources. Done poorly, they can be highly unproductive, negative experiences.

Good practices of regular meetings still apply, but more is required for remote meetings. Use the following Facilitator and Participant best practice checklist items, from our partners at Info-Tech Research Group, to get the most benefit from remote meetings. To download the list as a customizable checklist for your own office, visit the Knowledge Network, where you will find more Info-Tech Research tools as well as additional guidance on having productive meetings.

Also see our popular slideshow on 10 Tips on Having a Great Meeting.
 

Related Topics : Intranets, Network Protocols, Networking, OS Interoperability, TCO

 
More Slideshows

Classroom tech Ten New Technologies Transforming the Classroom

Here are 10 ways that college professors are taking advantage of the technology students currently use and adding new technologies to enhance the teaching and learning experiences. ...  More >>

hurricanes How Communications, Preparation and Willingness to Help Were Keys in Hurricane Crises

Entrepreneurial thinking, innovation and selflessness can make things better during crises. Here is a look at how organizations reacted and telecommunications products helped during recent hurricane crises. ...  More >>

PAM PAM Solutions: Critical to Securing Privileged Access

To protect the company from those insiders who abuse their privileged access and from hackers with stolen credentials, many companies are turning to a privileged access management (PAM) solution. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.