From apprenticeships and qualifications to professional development and employability skills. Supporting learners, partners, and centres with tools to deliver, assess, and grow.
Join a professional community committed to excellence in management and leadership. Access exclusive resources, and recognition pathways including Chartered Manager.
Connect, celebrate, and lead with CMI’s vibrant community. From events and awards to networks and campaigns, get involved and help shape the future of management.
Stay informed with expert insights, thought leadership, and the latest in management. From in-depth features to practical guidance, explore the ideas shaping today’s workplace.
Learn about CMI’s mission, values, and impact. From our Royal Charter to governance, careers, and sustainability commitments, discover who we are and what drives us.
07 February 2013 -
EXAMPLE 1
Geek: “Our devices are having handshake problems related to the recognition of communications protocol.”
English: “Sorry – you can’t use your iPhone to access your work files today.”
EXAMPLE 2
Geek: “Our cloud-based data has become corrupted and we are going to miss the recovery time objective and recovery point objective laid out in the information technology service continuity (ITSC) plan.”
English: “We have lost your board presentation and won’t be able to get it back until tomorrow.”
EXAMPLE 3
Geek: “Multiple copies of packets are being sent to the SPAN port, decreasing effective bandwidth capability.”
English: “If you send an email then it might take longer to arrive than normal.”
EXAMPLE 4
Geek: “A Trojan horse has installed itself on a host computer within our network as an anonymiser proxy.”
English: “Our computer system has been hacked, providing a major security threat.”
EXAMPLE 5
Geek: “Combining a clustering with a virtualisation approach can help us integrate our mainframe and distributed infrastructure.” English: “We can reduce hardware and staff costs associated with running our computer systems.”
EXAMPLE 6
Geek: “Efficiencies can be gained by upgrading secure data management for mission-critical online transaction processing applications, query-intensive data warehouses, content management and Web2.0 applications.”
English: “If we spend some money to improve our hardware and software, the company can save money in the long run.”
› The persistence of presenteeism and other nuanced nonsense
› A new age of vulnerability: why inclusive leadership matters more than ever
› Ask yourself: "How do I make my employees feel?"
› Finance and the Diversity Dividend
For more information or to request interviews, contact CMI's Press Team on 020 7421 2705 or email press.office@managers.org.uk
› The 5 Greatest Examples of Change Management in Business History
› Four companies that failed spectacularly, and the lessons of their premature demise
› 6 companies that get employee engagement – and what they do right
› 4 Signs That Racism May Be An Issue In Your Workplace
› How to build an Effective Team: focus on just 3 things