You wear many hats when you work for a nonprofit. I’m sure this is not breaking news for you. As an IT professional, the one hat that I wear every day is my “communications” hat.
The following tips are bite-sized truffles of hard-earned wisdom intended to help the IT professional communicate with staff members more clearly about technology projects.
1. Be an active listener
Have you ever been thinking of what you are going to say while you are looking directly at the person who is talking and giving you information you asked for? We have all done this. Seriously, active listening is a difficult skill that requires full concentration and practice.
The best definition of active listening I have found is, “the act of mindfully hearing and attempting to comprehend the meaning of words spoken by another in a conversation or speech.” This means that you look at the person who is speaking in the eyes (not in a creepy way) and focus your mind on the words they are speaking.
Active listening works best when you, the listener, review and restate what was said: a recap. Something like, “Okay, let me see if I understand correctly. So you need a membership report of all Californian constituents over the age of 45 by next Wednesday? Is that correct?” Active listening saves time, reduces stress, increases your colleagues’ confidence in you, and decreases the margin of error. It also takes a lot of practice, so start today!
Microsoft has released its command-line shell and scripting language PowerShell Core for Linux operating system as a Snap package, making it easier fo
1. Quora – A site for mostly professional questions about science, economics, movies or anything else. Currently owned by
list contains some of the most influential computing books ever written, most of which are suitable for beginners and experts alike, with a very few o
Besides Timehop, another data breach was discovered last week that affects users of one of the largest web hosting companies in Germany, DomainFa
Digitally signed malware has become much more common in recent years to mask malicious intentions. Security researchers have discovered a new ma