Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Ways Millennials Can Reverse-Mentor Your Staff

b2ap3_thumbnail_learn_from_millenials_400.jpgMillennials may be looked down upon in the average workplace for a number of reasons that are entirely subjective, whether it be that they’re “spoiled rotten” or “just plain rude.” But in today’s workplace based around technology, millennials have a huge advantage, and have even given long-time CIOs a run for their money when it comes to technology management.

Venki Rao, the CIO of General Electric’s digital energy division, has seen this first-hand. He discovered this fact four years ago at GE’s IT Leadership Program, where he realized that millennials had a lot to offer the older generation of workers. In terms of new technologies, mobile apps, and social media, millennials have the upper hand. The reason for this is simply that millennials have literally grown up with technology in their hands, and they have grown to understand it in a way that Gen X’ers and baby boomers would be jealous of.

Rao (not a millennial) realized this distinction in the millennial generation, and came to the conclusion that millennials should work together with the older generation to collaborate and innovate in their respective industries. He experimented with letting interns reverse-mentor himself, and soon afterward, he put a program in place which let his other 18 senior staff members take part in the same kind of training. He argues that this practice allows executives to learn what makes millennials tick, and that’s important for the future--when millennials will make up most of the workforce and will have to be managed by knowledgeable executives.

Other companies, such as the well-known network component manufacturer Cisco, have also experimented with this idea, and found that Rao’s ideas were, in fact, true. Cisco's 55-year-old vice president Lance Perry has spent time with a group of millennial mentors to learn more about social media and blogging, and found it substantially beneficial to both parties involved. It even led to increased productivity in the workplace.

If a reverse-mentoring program sounds like something you would be interested in integrating into your business, you can try these following tips:

  • Identify where your executives could use the most help. If you know what parts of technology have your senior staff itching to learn more, you can better concentrate on that.
  • Make sure your millennial mentor candidates are able to work with the senior staff. In other words, make sure that your candidates are of a quality breed. If your business employs interns, you might be able to get them in on the experience.
  • Prove to your senior staff that millennials have skills that can benefit them. If they see with their own eyes what your millennial employees are capable of, they will be more likely to sign onto your program.
  • Create a formal structure for your mentoring program. This should include having a set number of goals and curriculum which should be discussed.
  • Acquire feedback. With more information about what works and what doesn’t for the mentor program, you can configure it to work more efficiently in the future.

What reverse-mentoring comes down to is good communication between two parties, which can be greatly enhanced by using the right technologies. This will also give millennials a sense of ownership, which in general, is a factor in how engaged they are at the workplace.

Do you think that millennials in your office can teach you a thing or two about technology? Or, as a millennial yourself, do you feel like your workplace can better attract and manage the workers of your generation? Share your thoughts with us in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Smartphone Data Backup Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Internet of Things Remote Information Artificial Intelligence Facebook Miscellaneous Holiday Automation Compliance Cloud Computing Covid-19 Gadgets Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Business Technology Managed Services Mobile Office Data Security Vendor Apps Two-factor Authentication Chrome Budget Voice over Internet Protocol Mobile Device Management Apple Networking Gmail App WiFi BYOD Employer-Employee Relationship Tip of the week Avoiding Downtime Conferencing Marketing Managed IT Services How To BDR HIPAA Computing Physical Security Applications Information Technology Access Control Office 365 Hacker Augmented Reality Website Retail Storage Healthcare Password Bring Your Own Device 2FA Big Data Operating System Router Risk Management Virtual Private Network Health Computers Help Desk Analytics Office Tips Document Management Remote Workers Managed IT Service Telephone Scam Data loss Windows 11 Firewall Cooperation Free Resource Project Management Windows 7 Excel The Internet of Things Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Social Vendor Management Solutions Cybercrime Display Printer Paperless Office Customer Service Infrastructure Monitoring Money Saving Time Virtual Machines Professional Services Humor Maintenance Sports Downloads Word Antivirus Mouse iPhone Licensing Entertainment Administration Vulnerabilities Supply Chain Images 101 Safety Multi-Factor Authentication Robot Mobility Telephone System Cost Management Settings Wireless Printing Content Filtering IT Management YouTube Meetings VPN Employees Integration Cryptocurrency Modem Customer Relationship Management User Tip Processor Computer Repair Mobile Security Data Privacy Virtual Desktop Holidays Hacking Data storage LiFi Presentation Data Storage Smart Technology Outlook Video Conferencing Wireless Technology Machine Learning Managed Services Provider Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service IP Address Workforce Threats Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Scary Stories Private Cloud Identity Evernote Workplace Strategies Hacks Server Management Regulations Compliance Superfish Bookmark Identity Theft Smart Tech Memes Fun Meta Recovery Amazon Hard Drives Deep Learning Download Net Neutrality Twitter Alerts SQL Server Error History Domains Financial Data Browsers Smartwatch Education Connectivity IT Social Engineering Break Fix Outsource IT Environment Refrigeration Media Upload Procurement Remote Computing Azure Cyber security Multi-Factor Security Tech Public Speaking Mobile Computing Social Network Telework CES Tablet IoT Communitications Search Dark Web Lithium-ion battery Small Businesses Displays Entrepreneur Best Practice Trends Supply Chain Management Alert Buisness File Sharing Regulations Dark Data Google Calendar Term Managed IT Customer Resource management FinTech Legal Data Analysis IT solutions Star Wars IT Assessment How To Microsoft Excel Outsourcing Undo Business Growth Gamification Flexibility Notifications Staff Value Travel Social Networking Legislation Workplace Organization Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Cortana Hiring/Firing Paperless Alt Codes Content Remote Working Wearable Technology Memory Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Co-managed IT Health IT Application Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Permissions Technology Care Business Communications Typing Wasting Time Trend Micro Network Congestion Specifications Security Cameras IBM Scams Google Drive User Error Microchip Internet Exlporer Software as a Service Knowledge Fraud Hybrid Work Human Resources Username Managing Costs Point of Sale eCommerce 5G Black Friday SSID Cables Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Competition Google Apps Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Cookies Monitors Cyber Monday Medical IT IT Maintenance Google Wallet Proxy Server Reviews Business Intelligence Tactics Development Hotspot Transportation Shortcuts Windows 8 Laptop Websites Mirgation Hypervisor Nanotechnology Optimization PowerPoint Ransmoware User Drones Shopping Vendors SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Navigation Be Proactive Management PCI DSS Halloween Chatbots

Blog Archive