What is the best way to communicate with the Information Technology (IT) department? In this paper, we will look at two IT personnel and comparre communication styles. The most effective way to present this scenario is to engage you, the reader, in a mock computer/network crisis in your company.
For many years communicating with the IT department was not a priority. Most businesses used computers for word processing and simple spreadsheets. Networks were stations on the televisions and there was very little to no dependence on a computer system. The hardware was costly and the support was virtually non-existent (www.microsoft.com-small business solutions, 1998).
Today, hardware is affordable and support is abundant. With these major changes businesses are upgrading and installing complete network systems with multi-site databases and very complex Intranets. Along with the systems comes the support. The options are to have an outside firm support the system or an onsite/internal IT Department.
Either option a company chooses will require constant communication with the people in these areas and these people are a different breed of communicators.
The typical IT person is computer literate and usually very intelligent. They have incredible deductive reasoning and superior computational abilities. Most of them are very introverted and have little or no social graces, not to mention any ability to communicate.
Communication among their peers is usually something like a script from a very poorly written science fiction book or technical manual. Nevertheless they can communicate with each other.
Can they communicate with the average person in the real world?
Picture yourself managing a group of forty data processing people, all on a network feeding critical information to affiliates across the globe. At 3:00 p.m. one half of your network goes down and twenty of your people are not able to work. Your group is still producing, but at a reduced speed.
You pick up the phone and contact the company’s IT manager. Your situation is critical but not an emergency (at this point). You get him on the line and you get one of...
... middle of paper ...
...ferent is that Mark actually has compassion for the other person (the one that is communicating with him) while Joe is in a world all his own. Joe actually believes that other people should come to his level to communicate rather than Joe trying to find the most efficient level of communication.
When communicating with the typical IT person, you may want to try a few of these suggestions.
1. Remember that they are not very social and communicating is very uncomfortable for them; so do not try to engage them on the social playing field. Keep all communication relevant and to the point.
2. Do not diagnose the problem for them (unless you know it already in which case you would not need to call them in the first place). If you think you might know it, ask questions that will guide them to the answer you think that it might be.
3. NEVER get them started on the differences between the original Star Trek and Star Trek, The Next Generation!
References:
Administrative and Management Information Systems
http://www.microsoft.com-small business solutions, 1998
Because stem cells are essentially a blank slate, scientists are theoretically capable of growing any human tissue cell. There is enormous medical potential in this. Stem cell research is the next step in advancing the medical field. It is comparable to the discovery of penicillin or the inoculation for smallpox.
Stem cell research is one of the most widely expanding areas of scientific research being conducted all over the world today. In basic terms, stem cell research is the research of stem cells; however in actuality is much more complicated. A stem cell is a cell with the ability to develop into any of the cell types that make up the tissues and organs of the body. This makes these cells highly useful and provides endless opportunities in the field of regenerative medicine.
As stated on the Neostem website, “Stem cells have remarkable potential to develop into many different cell types in the body during early life and growth.” They are used for cell therapeutics and the advantages are many. They offer a source of renewable cells to replace the damaged or dead cells that can be cause disabilitating ...
Research on stem cells is advancing knowledge about how an organism develops from a single cell and how healthy cells replace damaged cells in adult organisms. This promising area of science is also leading scientists to investigate the possibility of cell-based therapies to treat disease, which is often referred to as regenerative or reparative medicine. There is genuine scientific excitement over the concept of using the body's own cellular building blocks to regenerate damaged or ageing organs. Stem cells are one of the most fascinating areas of biology today. But like ...
This theory has been subject to many articles and studies in the communication and social departments. Indeed, studying this theory can help us understanding human relations in interpersonal communication. Each of us has been one day confronted to uncertainty, whereas in initial encounters, or moving to a new a new place, or beginning a new work.
Hardware, software, support and maintenance costs grow each year with multiple systems in each local region running different types of software and hardware. The application and hardware support teams are larger than could be possible with one integrated solution.
As computers became more reliable they also became more business orientated, although they were still very large and expensive. Because of the expenditure, the productiveness of the system had to be magnified as to ensure cost effectiveness. Job scheduling and the hiring of computer operators, ensured that the computer was used effectively and crucial time was not wasted.
It is generally accepted that information is a vital commodity for the successful operation of today’s organizations. Nowadays modern business organizations are using computerized information systems in order to obtain such information. However as the technology advances rapidly the main issue is how can an organization should effectively use such an information system - which its management sometimes can be unpredictable - in order to effectively help the whole organization structure to improve and take the most out of it.
When most people think of an IT technicians the first thing that comes to mind is, they fix computers, but there are lots of challenges that occur throughout the day that people may not be aware of or think about often. IT technicians face a number of challenges on a day to day basis, other than just fixing computers, IT technicians deal with end users lack of computer knowledge and poorly tested system updates that sometimes cause system outages.
In order to implement the RCA described above, there is one additional resource needed. The most important artifact is creating a document that will outline the technical support standard that company XYZ wants to upkeep. This document must be detailed and should include answers to common problems. This document will allow the supervisor and the technical support team to respond to emails confidently.
Kharpal, A 2013, Cyber-crime is ‘greatest threat’ to companies survival: EY, CNBC, accessed 12 November 2013, http://www.cnbc.com/id/101155856
A busy executive with a data integrity mind set has to control information coming in, through its processing phases and ending in the customers hands as a usable product. Free from any modification and as accurate as it can possibly be, If they get the information at all. (DOS in mind). Information security executive needs to ensure that the organization has procedures for account management, backup, incident handling, standardized and authorized software and hardware, disaster recovery, and a Continuity of Operations Plan, or COOP. Moreover, identifying whom is responsible for what plays an important role as well.
Conversely, (O’Brien and Marakas, 2008) suggests that, with the above mentioned benefits of integrating information technology in an organization, there are some demerits. For example, the price for implementation of information technology is often high; especially the cost of hardware not lea...
Information technology is the application of computers and telecommunication equipment to store, retrieve, transmit, and manipulate data. This includes distributing and manufacturing information. This use of technology can be applied in the workforce, the educational system, and social life. Centuries ago, people did not have the means of technology that we have now. Alexander Graham Bell received the patent for his invention of the telephone in 1876. The first fully functioning computer was developed from 1936- 1938 by Konrad Zuse in his parent’s living room. The Internet has been developing since the 1950’s. Things are still being added to the Internet, the databases are surging with information. We live in a world where we are surrounded
Li, F 2007, What is E-business ?: how the Internet transforms organizations, Blackwell Publishing, Oxford.