Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Ways Millennials Can Reverse-Mentor Your Staff

b2ap3_thumbnail_learn_from_millenials_400.jpgMillennials may be looked down upon in the average workplace for a number of reasons that are entirely subjective, whether it be that they’re “spoiled rotten” or “just plain rude.” But in today’s workplace based around technology, millennials have a huge advantage, and have even given long-time CIOs a run for their money when it comes to technology management.

Venki Rao, the CIO of General Electric’s digital energy division, has seen this first-hand. He discovered this fact four years ago at GE’s IT Leadership Program, where he realized that millennials had a lot to offer the older generation of workers. In terms of new technologies, mobile apps, and social media, millennials have the upper hand. The reason for this is simply that millennials have literally grown up with technology in their hands, and they have grown to understand it in a way that Gen X’ers and baby boomers would be jealous of.

Rao (not a millennial) realized this distinction in the millennial generation, and came to the conclusion that millennials should work together with the older generation to collaborate and innovate in their respective industries. He experimented with letting interns reverse-mentor himself, and soon afterward, he put a program in place which let his other 18 senior staff members take part in the same kind of training. He argues that this practice allows executives to learn what makes millennials tick, and that’s important for the future--when millennials will make up most of the workforce and will have to be managed by knowledgeable executives.

Other companies, such as the well-known network component manufacturer Cisco, have also experimented with this idea, and found that Rao’s ideas were, in fact, true. Cisco's 55-year-old vice president Lance Perry has spent time with a group of millennial mentors to learn more about social media and blogging, and found it substantially beneficial to both parties involved. It even led to increased productivity in the workplace.

If a reverse-mentoring program sounds like something you would be interested in integrating into your business, you can try these following tips:

  • Identify where your executives could use the most help. If you know what parts of technology have your senior staff itching to learn more, you can better concentrate on that.
  • Make sure your millennial mentor candidates are able to work with the senior staff. In other words, make sure that your candidates are of a quality breed. If your business employs interns, you might be able to get them in on the experience.
  • Prove to your senior staff that millennials have skills that can benefit them. If they see with their own eyes what your millennial employees are capable of, they will be more likely to sign onto your program.
  • Create a formal structure for your mentoring program. This should include having a set number of goals and curriculum which should be discussed.
  • Acquire feedback. With more information about what works and what doesn’t for the mentor program, you can configure it to work more efficiently in the future.

What reverse-mentoring comes down to is good communication between two parties, which can be greatly enhanced by using the right technologies. This will also give millennials a sense of ownership, which in general, is a factor in how engaged they are at the workplace.

Do you think that millennials in your office can teach you a thing or two about technology? Or, as a millennial yourself, do you feel like your workplace can better attract and manage the workers of your generation? Share your thoughts with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Google Privacy Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management VoIP Smartphones Android Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Tech Term Network Remote Internet of Things Current Events Facebook Productivity Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Miscellaneous AI Remote Work Server Managed Service Provider Outsourced IT Information Holiday Encryption Spam Employee/Employer Relationship Compliance Office Windows 10 Business Continuity Government Training Data Management Virtualization Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Data Security Apps Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Vendor Mobile Device Management Chrome Gmail Managed Services Voice over Internet Protocol Budget WiFi How To BDR Computing Hacker Applications Information Technology Avoiding Downtime Marketing Access Control Office 365 IT Support Tip of the week Conferencing Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System HIPAA Computers Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Physical Security Display Printer Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Firewall Document Management Remote Workers Maintenance Safety Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Data storage Data Storage Smart Technology Supply Chain Word Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Humor Managed IT Service Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Undo Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Search Dark Web Cables CES Tablet IoT Communitications Application Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance IBM Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip User Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT IP Address Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Recovery Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Displays PowerPoint Domains Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Refrigeration Management PCI DSS Halloween Chatbots Navigation Writing Distributed Denial of Service Workplace Public Speaking Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Evernote Paperless Fun Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes

Blog Archive