window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Being Busy Doesn’t Mean You’re Being Productive

Being Busy Doesn’t Mean You’re Being Productive

Productivity is a key facet to our success. However, many offices seem to have an environment that focuses more on keeping busy than it does being productive. While they often intersect, these two statuses are very different. Here’s why.

A Rose by Any Other Name
Frankly, it’s pretty easy to observe that “busy” and “productive” are anything but synonymous. We all know those people who seem to be constantly running around, working on this or that. Are these people busy? Certainly. Are they actually accomplishing anything? Maybe, maybe not.

Look at it this way - you can be ‘busy’ doing anything. However, in order to be ‘productive,’ you need to actually produce something. It doesn’t matter if it’s a completed sales proposal, an email explaining away the confusion around a particularly convoluted subject, or… anything else, really, as long as it helps to advance the business’ goals.

The Inherent Issue in Comparing the Two
Unfortunately, much of our context for determining between busyness and productivity comes from the least objective source there is - our own perception.

Look at it this way: let’s say that you gave a research assignment to two employees, with a deadline of an hour. If you left, only to return and see one employee watching YouTube videos, and the other one typing away, who would you see as being the productive one? In the moment, you would probably say that it was the employee who was still typing, and not the one watching videos on the Internet. However, what if I told you that the employee watching videos was actually watching videos related to the task you had assigned, and the other was working on what would likely be their fourth unpublished novel? Or that the employee watching the videos had long since completed the assignment, and was taking a well-deserved break, while the employee who was still typing was only doing so because they had goofed off for much of the time you were away?

This illustrates two considerations: how much different productivity really is than pure busyness, as well as how similar they have the potential to be. In order to keep from fooling yourself into thinking you’re being productive when you’re really just looking busy, try asking yourself a few questions as you commence.

For example, you can take a look at how you spend your time, and compare it to what your responsibilities really are at their core.

For instance, let’s say that Bill’s job was to ensure that the company remained secure. If Bill was able to complete all of his day’s tasks in the morning, but then spent the rest of his day reading things online, what would that be considered? Well, that depends. If Bill was reading the latest Bowling Enthusiasts Weekly articles at his desk for the rest of the afternoon, that’s hardly productive. However, if Bill was researching improved cybersecurity practices to enact in the company... that’s a pretty productive way to spend the time.

A Few ‘Keeping Busy’ Red Flags
Of course, none of the following activities have to be time-wasters, they just happen to be in most situations, or require a very specific job responsibility to be considered productive. For instance, many job responsibilities don’t actually require the Internet to be used, so any time spent on it is arguably a waste. The same can be said of social media, and especially email.

Of course, there are also many exceptions to this rule. In essence, you have to use your best judgement, evaluating if a given activity is actually the best use of your time or not.

Don’t forget, TaylorWorks has plenty of solutions to help you boost your productivity. Reach out to us at 407-478-6600 to learn more!

Tip of the Week: 4 Tech Questions, Answered
Private Cloud Challenges


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, February 18 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Best Practices Cloud Business Computing Privacy Data Backup Hosted Solutions Managed IT Services Hackers Malware Mobile Devices VoIP Data Recovery Google Email Data Outsourced IT User Tips Internet of Things Tech Term Innovation Communications Internet Microsoft Cloud Computing Backup IT Services Hardware Productivity Business Continuity Saving Money Business Software BDR Cybersecurity Efficiency Artificial Intelligence Smartphones Communication Ransomware Small Business Cybercrime Android Smartphone IT Support Router Disaster Recovery Managed IT Services Business Management Applications Windows 10 Chrome Workplace Tips Network Gadgets IT Support Browser Mobile Device Phishing Law Enforcement Managed IT Computer How To Collaboration Word Windows Spam Blockchain Avoiding Downtime Access Control Mobile Device Management Business Intelligence Two-factor Authentication Save Money Virtualization Computers Data Security Server Money Data Protection BYOD Office 365 Holiday Information Mobility Encryption Document Management Social Engineering Upgrade Identity Theft Social Media Managed Service Compliance Servers Vulnerability App Remote Monitoring Settings Wi-Fi Analysis Training Firewall Facebook Passwords Private Cloud IT Management Redundancy Apps Productivity Automation Voice over Internet Protocol Alert Connectivity Telephone Systems Software as a Service Bandwidth Proactive IT Machine Learning Miscellaneous Content Management Keyboard Data Storage Networking Unified Threat Management Health Work/Life Balance Workers Business Technology Update Save Time Paperless Office Credit Cards Employer-Employee Relationship Google Drive Smart Tech Botnet Virtual Assistant OneNote Flexibility Human Resources Fraud Solid State Drive Password Information Technology Data loss Scam Mobile Computing VPN Telephone System Infrastructure Data Breach Google Docs Healthcare Spam Blocking Hacker Microsoft Office Budget IT Plan CES Sports Big Data Windows 7 File Sharing Value Operating System Business Owner Website Comparison Education Bring Your Own Device Unsupported Software Telephony Remote Worker Smart Office Leadership Regulations Help Desk Inventory Windows 10s Government Gmail Addiction Frequently Asked Questions Specifications Administrator PDF IoT Password Management Netflix Root Cause Analysis Google Search Office Tips Wireless Software Tips Trending Virtual Private Network Strategy YouTube Skype Evernote Technology Tips Security Cameras Theft Thought Leadership Wiring HaaS Windows 10 Shortcuts SaaS Recycling Cache Current Events Excel Millennials Risk Management Microchip NIST Cleaning Meetings Patch Management Proactive Physical Security Lifestyle Project Management Start Menu Wireless Charging Employee/Employer Relationship Google Apps Streaming Media Data Warehousing WiFi GDPR Students webinar Flash eCommerce Authentication Audit eWaste Wireless Internet Knowledge Augmented Reality Tip of the week Workforce Hard Drives Insurance Cryptocurrency Computer Care Travel Virtual Reality Remote Monitoring and Maintenance Wireless Technology Warranty Emails Mobile Black Market Content Filtering Smartwatch Content Filter Hacking E-Commerce Computing Infrastructure Staff Conferencing Amazon Instant Messaging Social Fiber-Optic Nanotechnology Line of Business Criminal Wire Network Congestion The Internet of Things Windows Server 2008 Telecommuting HIPAA Search Engine Practices Safe Mode Samsung Marketing Screen Mirroring Worker Commute Downtime HBO Legal Entertainment Printer Public Cloud Accountants HVAC Charger Professional Services Battery Employee Password Manager Storage Camera Digital Signature Electronic Health Records Sync Amazon Web Services USB Cortana Vendor Cables Computer Fan MSP Electronic Medical Records IT Consultant Remote Work Remote Computing Bing Hosted Computing Cast Outlook Managed Service Provider Mouse Enterprise Content Management Users Tools Digital Signage Business Mangement Multi-Factor Security Data Management End of Support Online Shopping Recovery Display Unified Communications Devices FENG Smart Technology Scalability Hiring/Firing Loyalty Mobile Office Domains Emergency Fun Internet exploMicrosoft Rootkit Shadow IT Hosted Solution Quick Tips Employer Employee Relationship Experience Public Speaking Files Net Neutrality Presentation Content Advertising Company Culture Office Colocation Computer Accessories Music Lithium-ion battery History ISP Two Factor Authentication Politics Utility Computing 5G Audiobook Search Managing Stress Vendor Management Tech Support Relocation CrashOverride Bluetooth IBM Wearable Technology Assessment Safety Techology Video Games Transportation Webinar Books Regulation Humor Automobile Internet Exlporer Customer Relationship Management How to Television Competition User Error IP Address Benefits Best Practice Hybrid Cloud IT solutions Twitter Printers Worker Customer Service Troubleshooting Public Computer

Mobile? Grab this Article!

QR-Code dieser Seite