Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Three Ways to Improve Remote Meetings

Tip of the Week: Three Ways to Improve Remote Meetings

Remote work has certainly shown its utility over the past months, but despite this there are still many businesses who struggle to effectively run remote meetings. As remote meetings aren’t likely to phase out anytime soon, we felt it would be helpful to offer some tips to help make these meetings a little smoother for all involved.

Give Your Team Members Some Responsibilities

An in-person meeting and a meeting through a conferencing solution can admittedly have two very different feelings to the participants. The kind of participation that comes somewhat naturally in an in-person meeting can suddenly feel entirely foreign, the visual context cues that would normally drive the conversation stripped away using technology. As a result, awkward pauses and missed line items abound. This can easily lead to people increasingly talking out of turn, while others will remain silent. One way to help mitigate this is by distributing an agenda with assigned segments beforehand. That way, each team member will be responsible for some facet of the meeting, with the bonus of being able to prepare ahead of time to increase the meeting’s benefit.

This isn’t the only way you can keep your team members involved, either. You could also assign tasks for people to take notes or to keep track of the time remaining in the meeting. As a result, the whole team stays engaged in the meeting, and therefore will be more apt to contribute to the discussion.

Don’t Overfill Your Meetings

Have you ever sat in one of those meetings where the group was so big you felt as though you couldn’t get a word in edgewise, and that even if you did, only half the group would pick up on the point you made? An overly large remote meeting can work the same way. Lagging technology and people fighting for the chance to speak can make conversations difficult, and the increased background noise could easily drown out any productive conversation.

Therefore, smaller remote meetings are invariably better, as a more natural conversation can quickly take over and there is a reduced chance of distracting background noise. As a bonus, the smaller meeting size means that each person has a chance to contribute proportionally more to the meeting, increasing their engagement with it.

Don’t Allow People to Mute Themselves

Having people mute themselves during a remote meeting is like having a mime join a choir—there’s very little that they are going to contribute.

In addition to preventing people from contributing (potentially sacrificing valuable ideas), muting could also allow people to dissociate from the meeting completely. If they’re muted, one of your participants could be listening to a podcast, for all you know. If anything, allow brief muting to help hide noisy interruptions, like a sneeze or an unaware family member, but that’s it.

What have you done to keep your meetings running smoothly? Share your strategies with us by putting them in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 03 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity IT Support Smartphones Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Passwords Windows 10 Saving Money Social Media Holiday Tech Term Chrome Gadgets Virtualization Managed Service Automation Managed IT Services Microsoft Office Computers Facebook Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Networking IT Support Health Internet of Things Hacking Wi-Fi Telephone Systems Information Information Technology Covid-19 Managed Service Provider Spam Alert Remote Office 365 Bandwidth Employer-Employee Relationship Recovery Router BDR Social Engineering Mobility Money Data Breach Mobile Computing App History Encryption Application Applications Human Resources Law Enforcement Big Data Remote Monitoring Password Apps Office Tips Training VPN How To Government Remote Computing Private Cloud Mobile Office Data Storage Patch Management Managed IT Blockchain Paperless Office WiFi Servers IT solutions Entertainment Wireless Website Budget Infrastructure Gmail Voice over Internet Protocol Google Drive Data Security Settings Two-factor Authentication Avoiding Downtime Mouse HaaS Vulnerability Windows 7 Flexibility Bring Your Own Device Data Management Word Work/Life Balance Marketing Risk Management Hacker Machine Learning Vendor Vendor Management Connectivity Remote Work End of Support Managed Services Display The Internet of Things Lithium-ion battery Physical Security Education USB Safety HIPAA Sports Employee/Employer Relationship Redundancy RMM Keyboard Firewall Virtual Reality Data Protection Apple Social User Error Save Time Conferencing Meetings Scam Cleaning Telephone System Staff Software as a Service Biometrics Botnet Virtual Desktop IT Plan Managed Services Provider Update Printer Database Battery Bluetooth Unsupported Software Shadow IT DDoS Remote Workers Legal Google Docs Charger SharePoint Identity Theft Internet Exlporer Processor Compliance OneNote Computer Care IT Consultant Customer Service PDF Current Events Hard Drive Augmented Reality Environment Telephony Humor Samsung Fraud Fax Server Proactive IT Remote Worker Computing Best Practice Value YouTube SaaS Cryptocurrency Electronic Medical Records Black Market Spam Blocking Hiring/Firing Network Congestion Digital Signage Comparison eWaste Document Management CES Solid State Drive Wireless Technology How to Downtime Business Technology Procurement Content Management Virus Workplace Strategy Access Control Net Neutrality Data storage Automobile Business Intelligence Unified Threat Management Wearable Technology Virtual Assistant Retail Help Desk Hard Drives Computer Accessories Audit Worker Printing Authentication Instant Messaging Excel Computing Infrastructure IT Management Robot Going Green Reputation Computer Fan Point of Sale Streaming Media Rootkit Project Management Personal Nanotechnology Cryptomining Telecommuting Content Cortana Tech Support Supply Chain Management Benefits Batteries Digital Signature Techology Laptop Workers Monitoring Customers FENG Windows 8.1 Warranty Digitize Audiobook Google Apps Science IBM HVAC Windows Server 2008 R2 Smart Technology Analysis Flash Touchpad Printer Server Customer relationships Email Best Practices Administrator IT Assessment Devices Manufacturing Customer Relationship Management Politics Advertising Software Tips Supercomputer Distributed Denial of Service Enterprise Content Management MSP Managed IT Service Accountants Security Cameras Analyitcs Sync Emails Computer Tips Virtual CIO Notifications Microchip OneDrive Thought Leadership Biometric Security Programming Credit Cards Password Manager Peripheral Password Management Digital Security Cameras Two Factor Authentication Using Data Multi-Factor Security Netflix Relocation Root Cause Analysis Search Engine Copiers Antivirus Twitter 5G Business Mangement Windows 8 HBO Knowledge Quick Tip Music NIST Ergonomics IT service Smart Tech Smartwatch Video Games Skype Trending Data loss Development Addiction OLED Worker Commute Amazon Virtual Machine Experience Recycling Tablet Outlook Consultant Leadership PCI DSS Troubleshooting 2FA Wiring Fiber Optics Domains Practices Employee Scalability Start Menu Analytics Screen Mirroring Loyalty Messaging Cache Cabling Business Owner Amazon Web Services Hypervisor Maintenance Criminal Frequently Asked Questions Best Available NarrowBand Policy IaaS Books Safe Mode Dark mode GDPR Trend Micro Hosted Computing Bloatware Search Mobile WIndows 7 Windows 10s iPhone Cast SMS Wireless Internet Default App Online Shopping File Sharing Saving Time Tablets Tip of the week webinar Procedure Emergency dark theme Employer Employee Relationship Camera Shopping Inventory Google Search Entrepreneur Professional Services Specifications Public Cloud Evernote Files Assessment AI Wire IT Infrastructure Shortcut Bing Windows Server 2008 Travel Chromecast FinTech PowerPoint Windows Media Player Printers Social Network Cost Management Tools Millennials User Wireless Charging Colocation Uninterrupted Power Supply Television Smart Office Investment Social Networking Employee/Employer Relationships Employees Monitor Windows 365 Virtual Private Network ISP Workforce Managing Stress Cables Public Computer Video Conferencing Running Cable ROI Transportation Bitcoin Shortcuts Memory Regulations Cameras Sales

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code