Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Ways Millennials Can Reverse-Mentor Your Staff

b2ap3_thumbnail_learn_from_millenials_400.jpgMillennials may be looked down upon in the average workplace for a number of reasons that are entirely subjective, whether it be that they’re “spoiled rotten” or “just plain rude.” But in today’s workplace based around technology, millennials have a huge advantage, and have even given long-time CIOs a run for their money when it comes to technology management.

Venki Rao, the CIO of General Electric’s digital energy division, has seen this first-hand. He discovered this fact four years ago at GE’s IT Leadership Program, where he realized that millennials had a lot to offer the older generation of workers. In terms of new technologies, mobile apps, and social media, millennials have the upper hand. The reason for this is simply that millennials have literally grown up with technology in their hands, and they have grown to understand it in a way that Gen X’ers and baby boomers would be jealous of.

Rao (not a millennial) realized this distinction in the millennial generation, and came to the conclusion that millennials should work together with the older generation to collaborate and innovate in their respective industries. He experimented with letting interns reverse-mentor himself, and soon afterward, he put a program in place which let his other 18 senior staff members take part in the same kind of training. He argues that this practice allows executives to learn what makes millennials tick, and that’s important for the future--when millennials will make up most of the workforce and will have to be managed by knowledgeable executives.

Other companies, such as the well-known network component manufacturer Cisco, have also experimented with this idea, and found that Rao’s ideas were, in fact, true. Cisco's 55-year-old vice president Lance Perry has spent time with a group of millennial mentors to learn more about social media and blogging, and found it substantially beneficial to both parties involved. It even led to increased productivity in the workplace.

If a reverse-mentoring program sounds like something you would be interested in integrating into your business, you can try these following tips:

  • Identify where your executives could use the most help. If you know what parts of technology have your senior staff itching to learn more, you can better concentrate on that.
  • Make sure your millennial mentor candidates are able to work with the senior staff. In other words, make sure that your candidates are of a quality breed. If your business employs interns, you might be able to get them in on the experience.
  • Prove to your senior staff that millennials have skills that can benefit them. If they see with their own eyes what your millennial employees are capable of, they will be more likely to sign onto your program.
  • Create a formal structure for your mentoring program. This should include having a set number of goals and curriculum which should be discussed.
  • Acquire feedback. With more information about what works and what doesn’t for the mentor program, you can configure it to work more efficiently in the future.

What reverse-mentoring comes down to is good communication between two parties, which can be greatly enhanced by using the right technologies. This will also give millennials a sense of ownership, which in general, is a factor in how engaged they are at the workplace.

Do you think that millennials in your office can teach you a thing or two about technology? Or, as a millennial yourself, do you feel like your workplace can better attract and manage the workers of your generation? Share your thoughts with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Privacy Google Email Workplace Tips Computer Workplace Strategy Backup Collaboration Small Business Hosted Solutions Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Information Miscellaneous Holiday Automation Artificial Intelligence Facebook Cloud Computing Covid-19 Training Gadgets Compliance Server Remote Work Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Blockchain Wi-Fi Vendor Business Technology Windows 10 Bandwidth Virtualization Apps Two-factor Authentication Mobile Office Managed Services Data Security Employer-Employee Relationship BYOD Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Voice over Internet Protocol Apple Networking App Computing Physical Security Hacker HIPAA Information Technology Avoiding Downtime Applications Marketing Access Control Office 365 Password Conferencing Managed IT Services How To BDR Operating System Computers Virtual Private Network Risk Management Router Website Health Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Bring Your Own Device Healthcare Big Data Cooperation Free Resource Going Green Patch Management Save Money Project Management Remote Monitoring Windows 7 Vulnerability End of Support Vendor Management Customer Service Cybercrime Microsoft 365 Solutions Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel The Internet of Things Scam Data loss Remote Workers Managed IT Service Telephone Social Data Privacy Robot Customer Relationship Management Settings Images 101 Printing Wireless Content Filtering Telephone System Multi-Factor Authentication Mobility Hacking IT Management Cost Management Presentation VPN YouTube Meetings Cryptocurrency Wireless Technology Computer Repair Employees Integration Virtual Desktop User Tip Modem Data storage LiFi Processor Mobile Security Word Holidays Outlook Machine Learning Data Storage Money Smart Technology Supply Chain Humor Video Conferencing Managed Services Provider Maintenance Saving Time Virtual Machines Professional Services Safety Antivirus Sports Mouse Downloads Administration iPhone Licensing Entertainment Vulnerabilities Travel Trends Supply Chain Management Cortana Customer Resource management FinTech Regulations Google Calendar Term Google Apps Techology Google Maps Alt Codes Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Staff Value Business Intelligence Competition Downtime Unified Threat Management Gamification Flexibility Organization Social Networking Legislation Shortcuts Unified Threat Management Hosted Solution Typing Fileless Malware Digital Security Cameras Smart Devices Ransmoware Wearable Technology Memory Vendors Network Congestion Content Remote Working Knowledge Health IT Motherboard Data Breach Comparison Google Play Be Proactive Google Drive User Error User Directions Videos Assessment Electronic Health Records Permissions Workforce Wasting Time Threats Point of Sale 5G Experience Trend Micro Specifications Security Cameras Workplace Strategies IP Address Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Microchip Internet Exlporer Software as a Service Fraud Meta Managing Costs Amazon Google Wallet Monitors Username eCommerce Black Friday SSID Recovery Hard Drives Windows 8 Laptop Websites Database Surveillance Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Media Domains Drones Electronic Medical Records Proxy Server Reviews Cookies Cyber Monday Medical IT SharePoint Hotspot Transportation Small Businesses Refrigeration Halloween Tactics Development Writing Mirgation Hypervisor Displays Public Speaking Lenovo Virtual Reality Shopping Nanotechnology Optimization PowerPoint Lithium-ion battery Language Employer/Employee Relationships Outsourcing Hacks Server Management Entrepreneur Scary Stories Private Cloud Addiction Fun Management PCI DSS Chatbots Navigation Superfish Identity Theft Deep Learning Twitter Gig Economy Screen Reader Distributed Denial of Service Workplace Computing Infrastructure Teamwork Hiring/Firing Undo Error Service Level Agreement Internet Service Provider Social Engineering Regulations Compliance Identity Evernote Paperless Education Remote Computing Bookmark Smart Tech Memes Co-managed IT Alerts SQL Server Technology Care Mobile Computing Download Net Neutrality Search Financial Data History Business Communications Tablet Application Best Practice Alert Browsers Smartwatch Connectivity IT Break Fix Scams Azure Hybrid Work Managed IT Buisness File Sharing Dark Data Upload Procurement How To Social Network Telework Cyber security Multi-Factor Security Tech Human Resources IBM Legal IT solutions Business Growth Notifications CES IoT Communitications Dark Web Cables

Blog Archive