Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Ways Millennials Can Reverse-Mentor Your Staff

b2ap3_thumbnail_learn_from_millenials_400.jpgMillennials may be looked down upon in the average workplace for a number of reasons that are entirely subjective, whether it be that they’re “spoiled rotten” or “just plain rude.” But in today’s workplace based around technology, millennials have a huge advantage, and have even given long-time CIOs a run for their money when it comes to technology management.

Venki Rao, the CIO of General Electric’s digital energy division, has seen this first-hand. He discovered this fact four years ago at GE’s IT Leadership Program, where he realized that millennials had a lot to offer the older generation of workers. In terms of new technologies, mobile apps, and social media, millennials have the upper hand. The reason for this is simply that millennials have literally grown up with technology in their hands, and they have grown to understand it in a way that Gen X’ers and baby boomers would be jealous of.

Rao (not a millennial) realized this distinction in the millennial generation, and came to the conclusion that millennials should work together with the older generation to collaborate and innovate in their respective industries. He experimented with letting interns reverse-mentor himself, and soon afterward, he put a program in place which let his other 18 senior staff members take part in the same kind of training. He argues that this practice allows executives to learn what makes millennials tick, and that’s important for the future--when millennials will make up most of the workforce and will have to be managed by knowledgeable executives.

Other companies, such as the well-known network component manufacturer Cisco, have also experimented with this idea, and found that Rao’s ideas were, in fact, true. Cisco's 55-year-old vice president Lance Perry has spent time with a group of millennial mentors to learn more about social media and blogging, and found it substantially beneficial to both parties involved. It even led to increased productivity in the workplace.

If a reverse-mentoring program sounds like something you would be interested in integrating into your business, you can try these following tips:

  • Identify where your executives could use the most help. If you know what parts of technology have your senior staff itching to learn more, you can better concentrate on that.
  • Make sure your millennial mentor candidates are able to work with the senior staff. In other words, make sure that your candidates are of a quality breed. If your business employs interns, you might be able to get them in on the experience.
  • Prove to your senior staff that millennials have skills that can benefit them. If they see with their own eyes what your millennial employees are capable of, they will be more likely to sign onto your program.
  • Create a formal structure for your mentoring program. This should include having a set number of goals and curriculum which should be discussed.
  • Acquire feedback. With more information about what works and what doesn’t for the mentor program, you can configure it to work more efficiently in the future.

What reverse-mentoring comes down to is good communication between two parties, which can be greatly enhanced by using the right technologies. This will also give millennials a sense of ownership, which in general, is a factor in how engaged they are at the workplace.

Do you think that millennials in your office can teach you a thing or two about technology? Or, as a millennial yourself, do you feel like your workplace can better attract and manage the workers of your generation? Share your thoughts with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 05 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Productivity Passwords Quick Tips Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade Data Recovery VoIP AI Business Management Smartphones Mobile Devices Disaster Recovery communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Facebook Automation Artificial Intelligence Covid-19 Cloud Computing Holiday Training Miscellaneous Gadgets Server Managed Service Provider Remote Work Outsourced IT Compliance Encryption Employee/Employer Relationship IT Support Spam Office Windows 10 Business Continuity Government Data Management Blockchain Wi-Fi Windows 10 Business Technology Virtualization Bandwidth Data Security Mobile Office Vendor Two-factor Authentication Apps Networking Apple App BYOD Mobile Device Management Gmail Tip of the week Managed Services Voice over Internet Protocol Chrome Employer-Employee Relationship Budget How To Hacker BDR Avoiding Downtime Marketing HIPAA Applications Computing Information Technology Access Control WiFi Office 365 Conferencing Storage Password Bring Your Own Device Managed IT Services Computers Website Router Operating System Virtual Private Network Risk Management 2FA Help Desk Health Big Data Analytics Office Tips Augmented Reality Retail Healthcare Scam Data loss Cooperation Free Resource Customer Service Project Management Windows 7 Microsoft 365 Patch Management Save Money Solutions Remote Monitoring Going Green Vulnerability End of Support Vendor Management Physical Security Cybercrime Firewall Display Printer Windows 11 Monitoring Paperless Office Infrastructure The Internet of Things Excel Social Document Management Remote Workers Telephone Vulnerabilities Sports Entertainment Mouse Data Privacy Hacking Presentation Images 101 Administration Telephone System Multi-Factor Authentication Mobility Wireless Technology Cost Management Robot Employees Settings Integration Wireless Word IT Management Printing VPN Meetings Content Filtering User Tip Modem Mobile Security YouTube Processor Holidays Cryptocurrency Computer Repair Data Storage Safety Smart Technology Supply Chain Virtual Desktop Video Conferencing Data storage Managed Services Provider LiFi Saving Time Virtual Machines Professional Services Machine Learning Outlook Managed IT Service Money Humor Downloads iPhone Maintenance Licensing Customer Relationship Management Antivirus Social Network Telework Cyber security Deep Learning Social Engineering Multi-Factor Security Tech Human Resources Dark Web Cables Competition CES IoT Communitications Remote Computing Trends Supply Chain Management Education Customer Resource management FinTech Tablet Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Star Wars IT Assessment Mobile Computing Alert Gamification Flexibility File Sharing Staff Value Business Intelligence Dark Data Search User Managed IT Organization Social Networking Best Practice How To Legislation Shortcuts Ransmoware Buisness Fileless Malware Digital Security Cameras Smart Devices Notifications Content Remote Working Legal Travel Wearable Technology Memory Vendors IT solutions IP Address Techology Health IT Google Maps Motherboard Data Breach Business Growth Comparison Google Play Be Proactive Permissions Workforce Directions Videos Assessment Electronic Health Records Unified Threat Management Wasting Time Threats Cortana Recovery Hard Drives Unified Threat Management Trend Micro Alt Codes Specifications Security Cameras Workplace Strategies Fraud Meta Downtime Domains Microchip Internet Exlporer Software as a Service Username Managing Costs Amazon Hosted Solution Network Congestion Refrigeration User Error eCommerce Typing Black Friday SSID Virtual Assistant Outsource IT Public Speaking Database Surveillance Google Drive Point of Sale IT Technicians Virtual Machine Environment Lithium-ion battery Media Knowledge Entrepreneur Proxy Server Reviews Cookies Cyber Monday Medical IT Tech Support Hotspot Transportation Small Businesses 5G Network Management Tactics Development Google Docs Mirgation Hypervisor Displays Unified Communications Monitors Experience Running Cable Undo Shopping Nanotechnology Optimization Bitcoin PowerPoint Google Wallet Websites Language Employer/Employee Relationships Outsourcing Addiction Management PCI DSS Chatbots Navigation Laptop SharePoint Gig Economy Screen Reader Windows 8 Electronic Medical Records Distributed Denial of Service Workplace Drones Computing Infrastructure Teamwork Hiring/Firing Service Level Agreement Internet Service Provider Lenovo Regulations Compliance Identity Writing Evernote Paperless Application Halloween Bookmark Smart Tech Memes Virtual Reality Co-managed IT Download Net Neutrality Private Cloud Alerts SQL Server Technology Care IBM Server Management Superfish Financial Data Identity Theft History Business Communications Break Fix Scams Scary Stories Browsers Smartwatch Connectivity IT Hacks Twitter Upload Procurement Error Azure Hybrid Work Fun

Blog Archive