Alltech IT Solutions Blog

Tip of the Week: Video Conferencing, Done Better

Tip of the Week: Video Conferencing, Done Better

Video conferencing has become a staple in the workplace, especially as social distancing encourages teams to remain at home and collaborate remotely. Considering this, it only seemed prudent to dedicate this week’s tip to how to use video conferencing more effectively.

Setup Properly

When you need to work from home and join a video conference, you and your surroundings should get a little attention before the meeting begins.

First, you need to find a quiet area where you won’t be disturbed. While the video of Prof. Robert Kelly’s BBC World News interview being interrupted by his kids is adorably hilarious, it might not be as endearing to your coworkers if Rover jumps up and knocks over your workstation.

Make sure the area behind you (that will be visible to your fellow participants) is neat and tidy, and that your lighting makes you look okay. Once you’re properly settled, you’re ready to start your meeting… but wait!

Even though you’re working from home, you still need to maintain some level of business decorum. Tidy yourself up as though you were still participating in an in-house meeting and behave accordingly. Show up on time and dress appropriately for your workplace culture.

Plan Ahead

Furthermore, it pays off to take the time beforehand to set the stage for the meeting itself. Rather than allowing tangents and errant thoughts to dominate the meeting and eat up the available time you have, put together an agenda. By sharing the agenda with the other participants, you are preparing the group to hit the ground running.

The same goes for any documents or files that will be referenced in the meeting. Make sure that access to them is shared to the group beforehand so there isn’t an interruption later, like one person not being able to open them.

That being said, you should go into your meeting expecting some level of off-topic courtesy. People are going to ask about each other, especially after working together for any length of time. Instead of quashing this time, prepare for it and get down to business after pleasantries have been exchanged.

Collaborate Courteously

Once the meeting gets underway, it is important to remember that the rules are a little different than they would be during an in-person one.

For instance, a live meeting wouldn’t require you to have a microphone during the exchange. When it isn’t your turn to talk, make sure you are muted appropriately. Your coworkers don’t need to hear what is happening in your house at the time, and certainly don’t need to hear you if you step away to use the bathroom.

Your coworkers also deserve your complete attention, so even though they are not in the room with you, make sure that you remain focused. Working on other things or checking email throughout the meeting is another no-no.

By keeping these basic guidelines in mind, you are much better prepared to participate in an effective and productive remote meeting. Alltech IT Solutions can make sure you have the technology to do so. To learn more about what you’ll need, give us a call at 954-628-3770.

How Cloud Solutions Fit into Businesses Today
Cyberattacks Circulating Around World Health Organ...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, May 28 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Business Technology Remote Monitoring and Management Data Security Word Emoji Battery Processors Tech Terms Politics Upgrade e-waste Workplace Tips Hacking Communications Networking Managed Service Vendor Management Budget Online Shopping Cloud Computing Downloads E-Commerce OneNote Security Alerts Hard Drive Healthcare Dongle HP News iPhone Cloud Backup and Disaster Recovery Office 365 Analytics Recovery Voice over IP Paste Certification Remote Workers Passwords Collaboration Medical IT Remote Travel Social Network Virus Scams Wireless Charging Millennials Inventory Technology Tips Email Management Phishing Holidays HIPAA Social Media Two-factor Authentication Authorization Gadget Solid State Drive Voice over Internet Protocol Work/Life Balance Profitability Distribution Virtual Private Network Bitcoin Hosted Solution Printer Dark Web Sports Staff User Tips Wireless Wireless Internet SaaS Congratulations Mobility Telephone Systems The Internet of Things Computer Care Co-Managed IT Gmail Best Practices Spam Telephone System User Tip Small Business Office Tips Wi-Fi Mobile Devices Bring Your Own Device Mobile Security Windows 7 Cables Printers IaaS Mobile Device Internet Explorer Automation Net Neutrality Alert Windows XP Saving Money Telecommute Chrome Browser Microsoft Office 365 Productivity DDoS Remote Computing Files Memes Business Management Proactive IT Live Streaming Government Automobile Blockchain Botnet Smart Technology Artificial Intelligence RAM Access Movies Virtual Assistant Laptop Digital Outsourced IT Privacy Ransomware Chrome OS Microsoft Patch Management Data Management Credit Cards Operating System Help Desk Access Control Managed IT Services Office Facebook Tip of the week Save Money Business Computing Shortcut Scam Hiring/Firing Thank You Remote Monitoring Insurance Avoiding Downtime Regulation User Security VoIP VoIp Benchmarks Backup Network Attached Storage Paperless Office Technology Gadgets Payment Licensing Project Management Authentication Miscellaneous Customer Relationship Management Managed IT Services Profiles Error Touchscreen Time Management Employee-Employer Relationship Efficiency Innovation Payment Cards Training Hybrid Cloud Managed Services Provider Data Protection Virtual Reality Network File Management Apps Tactics Firewall Printer Server IT Support Network Security Synergy Human Resources Eliminating Downtime IT Services Hosted Desktop disposal Employer Employee Relationship Mobile Microsoft Office Law Enforcement Internet of Things Router Settings Gaming Console Applications Worker Tip of the Week Document Management Video Games Biometrics Telephony Spyware HaaS Business Continuity Scalability File Sharing Plug-In Webcam Tech Term eCommerce Emergency Humor Environment Printing Information Technology WiFi Threats A.I. Financial Covid-19 Employer-Employee Relationship Unified Threat Management Staffing Android Sales Cabling VPN Google Drive Windows 10 Website App Multi-Factor Security Managing Stress Google Spam Blocking Marketing Physical Security Retail Productivity Employees Vulnerabilities Cybersecurity Leadership Remote Control Content Filtering Search Troubleshooting eWaste Big Data Fleet Management IT Management Conferencing Phone System Users Recycling G Suite Display Money Instagram Maintenance Business Intelligence Managed IT Mobile Office Windows 10 Malware Knowledge Ink WannaCry Risk Management Windows Server 2008 R2 Outlook Shadow IT Unified Communications Edge Cleaning instant Messaging Taskbar Server Management Quick Tips GDPR Going Green Email Comparison Spotify Database Mobile Device Management Compliance IT budget Personal Information Streaming Media Hosted Solutions Samsung Customer Service Video Threat Antivirus Scheduling Managed IT Service Software Workers Safety Data loss Tablet Data Smartphones PowerPoint IT Cybercrime Analysis Smartphone Computer Managed Service Provider Password Telecommuting Electronic Health Records Tech Support Bandwidth Yahoo Websites SSD Data Recovery CrashOverride Vendor Update Information How To Computers Entertainment Excel Wearables Cortana Amazon Encryption National Security Cryptocurrency Cost Management Hard Disk Drive Autocorrect Virtualization Hackers Reporting Business Dark Data Data Breach Paper Data Backup Television Holiday WhatsApp Processor Google Maps Health Copy BYOD Windows Disaster Recovery Twitter Current Events Vulnerability Internet IT Support Machine Learning Hardware Freedom of Information Storage Hacker Specifications Education Remote Support Lead Generation Connectivity Trends Security Cameras Hard Drives Company Culture BDR Updates Apple Batteries Microsoft Teams Server Value Communication Multi-Factor Authentication