What is the best way to communicate with the Information Technology (IT) department? In this paper, we will look at two IT personnel and comparre communication styles. The most effective way to present this scenario is to engage you, the reader, in a mock computer/network crisis in your company.
For many years communicating with the IT department was not a priority. Most businesses used computers for word processing and simple spreadsheets. Networks were stations on the televisions and there was very little to no dependence on a computer system. The hardware was costly and the support was virtually non-existent (www.microsoft.com-small business solutions, 1998).
Today, hardware is affordable and support is abundant. With these major changes businesses are upgrading and installing complete network systems with multi-site databases and very complex Intranets. Along with the systems comes the support. The options are to have an outside firm support the system or an onsite/internal IT Department.
Either option a company chooses will require constant communication with the people in these areas and these people are a different breed of communicators.
The typical IT person is computer literate and usually very intelligent. They have incredible deductive reasoning and superior computational abilities. Most of them are very introverted and have little or no social graces, not to mention any ability to communicate.
Communication among their peers is usually something like a script from a very poorly written science fiction book or technical manual. Nevertheless they can communicate with each other.
Can they communicate with the average person in the real world?
Picture yourself managing a group of forty data processing people, all on a network feeding critical information to affiliates across the globe. At 3:00 p.m. one half of your network goes down and twenty of your people are not able to work. Your group is still producing, but at a reduced speed.
You pick up the phone and contact the company’s IT manager. Your situation is critical but not an emergency (at this point). You get him on the line and you get one of...
... middle of paper ...
...ferent is that Mark actually has compassion for the other person (the one that is communicating with him) while Joe is in a world all his own. Joe actually believes that other people should come to his level to communicate rather than Joe trying to find the most efficient level of communication.
When communicating with the typical IT person, you may want to try a few of these suggestions.
1. Remember that they are not very social and communicating is very uncomfortable for them; so do not try to engage them on the social playing field. Keep all communication relevant and to the point.
2. Do not diagnose the problem for them (unless you know it already in which case you would not need to call them in the first place). If you think you might know it, ask questions that will guide them to the answer you think that it might be.
3. NEVER get them started on the differences between the original Star Trek and Star Trek, The Next Generation!
References:
Administrative and Management Information Systems
http://www.microsoft.com-small business solutions, 1998
A Good advantage of having point-to-point contact between functional groups at different companies is being
F. Talk greatly about 1 or 2 things, for example a movie or toy they want.
In his 2003 article ‘IT Doesn’t Matter’, Nicholas Carr charts the evolution of Information Technology from the invention of the microprocessor in 1968 to present day omnipresence of IT solutions. His bone of contention with IT is not concerned with its widespread presence, but the magnified costs involved in the upkeep of IT infrastructure. He wants to bulldoze the myth that increased IT spending will culminate in higher returns and better profits. Acknowledging that though “Information technology has become the backbone of commerce” (Carr, 2003), he notes that its omnipresence works against its strategic advantage.
This theory has been subject to many articles and studies in the communication and social departments. Indeed, studying this theory can help us understanding human relations in interpersonal communication. Each of us has been one day confronted to uncertainty, whereas in initial encounters, or moving to a new a new place, or beginning a new work.
Stem cell research is the study of growth, use, and termination of human embryos. There are two main types of stem cells; the most common is embryotic cells and the other is an adult stem cell. The need and popularity of stem cell research is growing due to the advancements of technology and the growth and influx of sickness and disease. Stem cells are looked upon as an almost miracle treatment and have the potential to grow into a whole new type of cell research.
When most people think of an IT technicians the first thing that comes to mind is, they fix computers, but there are lots of challenges that occur throughout the day that people may not be aware of or think about often. IT technicians face a number of challenges on a day to day basis, other than just fixing computers, IT technicians deal with end users lack of computer knowledge and poorly tested system updates that sometimes cause system outages.
...mpany up and running through any kind of interruptions such as power failures, IT system crashes, natural or man-made disasters, supply chain/vendor problems and more.
As computers became more reliable they also became more business orientated, although they were still very large and expensive. Because of the expenditure, the productiveness of the system had to be magnified as to ensure cost effectiveness. Job scheduling and the hiring of computer operators, ensured that the computer was used effectively and crucial time was not wasted.
Conclustion: This is an excellent solution because it saves the staff times and eventually saves the company money . In addtion, it allows the company to uphold quality standard. The main challenge is choosing a member of the administrative team who is familiar with company goals and technical support issues.
Kharpal, A 2013, Cyber-crime is ‘greatest threat’ to companies survival: EY, CNBC, accessed 12 November 2013, http://www.cnbc.com/id/101155856
A busy executive with a data integrity mind set has to control information coming in, through its processing phases and ending in the customers hands as a usable product. Free from any modification and as accurate as it can possibly be, If they get the information at all. (DOS in mind). Information security executive needs to ensure that the organization has procedures for account management, backup, incident handling, standardized and authorized software and hardware, disaster recovery, and a Continuity of Operations Plan, or COOP. Moreover, identifying whom is responsible for what plays an important role as well.
Conversely, (O’Brien and Marakas, 2008) suggests that, with the above mentioned benefits of integrating information technology in an organization, there are some demerits. For example, the price for implementation of information technology is often high; especially the cost of hardware not lea...
The relationship between technology and communication in today's organizations is significant. Technology can even change the way organizations are structured when a new system is introduced. Moreover, in many organizations, new IT systems have complicated the way people communicate by adding complexity to the organization structure. This could be the case for financial systems such as SAP, which are designed to meet requirements of one exclusive part of the organization.
Li, F 2007, What is E-business ?: how the Internet transforms organizations, Blackwell Publishing, Oxford.
Information technology is the application of computers and telecommunication equipment to store, retrieve, transmit, and manipulate data. This includes distributing and manufacturing information. This use of technology can be applied in the workforce, the educational system, and social life. Centuries ago, people did not have the means of technology that we have now. Alexander Graham Bell received the patent for his invention of the telephone in 1876. The first fully functioning computer was developed from 1936- 1938 by Konrad Zuse in his parent’s living room. The Internet has been developing since the 1950’s. Things are still being added to the Internet, the databases are surging with information. We live in a world where we are surrounded