Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Tech Professional's Guide to Communicating in a Global Workplace: Adapting Across Cultural and Gender Boundaries

Buy
Information technologists are increasingly being made part of global teams, and are confronting the challenges of communicating across a variety of linguistic and cultural boundaries. This book helps you know what to say, what not to say, and even where to sit in meetings and in social situations.

The Tech Professional's Guide to Communicating in a Global Workplace shows you how to effectively communicate across a variety of different cultures within and across organizations. You will become aware of cultural differences from one country or region to another, between various groups at the local level, and across groups such as developers to DBAs, IT staff to business people, women to men, people approaching retirement to people coming into the organization fresh out of college, and more. 


The author provides her personal experiences and shares anecdotes as well as lessons learned, key takeaways, and references for further reading. Whether it is face to face, over the phone, via email or instant messenger, or in a presentation, meeting, or report, the ability to communicate effectively is critical.


What You'll Learn
  • Concisely communicate with the right audience in the right way
  • Write emails that are understood and get the results you want
  • Improve personal reputation as an effective communicator
  • Communicate across cultural boundaries without offending
  • Present the desired impression in business situations
  • Grow professionally by adjusting your communication style


Who This Book Is For

Programmers and system administrators, including database administrators





 
(HTML tags aren't allowed.)

Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Complete Guide to Test Automation: Techniques, Practices, and Patterns for Building and Maintaining Effective Software Projects
Rely on this robust and thorough guide to build and maintain successful test automation. As the software industry shifts from traditional waterfall paradigms into more agile ones, test automation becomes a highly important tool that allows your development teams to deliver software at an ever-increasing pace without compromising...
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark
Next-Generation Big Data: A Practical Guide to Apache Kudu, Impala, and Spark

Utilize this practical and easy-to-follow guide to modernize traditional enterprise data warehouse and business intelligence environments with next-generation big data technologies.

Next-Generation Big Data takes a holistic approach, covering the most important aspects of modern enterprise big data. The book...

Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Database Benchmarking and Stress Testing: An Evidence-Based Approach to Decisions on Architecture and Technology
Provide evidence-based answers that can be measured and relied upon by your business. Database administrators will be able to make sound architectural decisions in a fast-changing landscape of virtualized servers and container-based solutions based on the empirical method presented in this book for answering “what if”...

Deep Learning with Azure: Building and Deploying Artificial Intelligence Solutions on the Microsoft AI Platform
Deep Learning with Azure: Building and Deploying Artificial Intelligence Solutions on the Microsoft AI Platform
Get up-to-speed with Microsoft's AI Platform. Learn to innovate and accelerate with open and powerful tools and services that bring artificial intelligence to every data scientist and developer.

Artificial Intelligence (AI) is the new normal. Innovations in deep learning algorithms and hardware...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras
Mastering TensorFlow 1.x: Advanced machine learning and deep learning concepts using TensorFlow 1.x and Keras

Build, scale, and deploy deep neural network models using the star libraries in Python

Key Features

  • Delve into advanced machine learning and deep learning use cases using Tensorflow and Keras
  • Build, deploy, and scale end-to-end deep neural network models in a production...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy