XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Being Busy Doesn’t Mean You’re Being Productive

Being Busy Doesn’t Mean You’re Being Productive

Productivity is a key facet to our success. However, many offices seem to have an environment that focuses more on keeping busy than it does being productive. While they often intersect, these two statuses are very different. Here’s why.

A Rose by Any Other Name
Frankly, it’s pretty easy to observe that “busy” and “productive” are anything but synonymous. We all know those people who seem to be constantly running around, working on this or that. Are these people busy? Certainly. Are they actually accomplishing anything? Maybe, maybe not.

Look at it this way - you can be ‘busy’ doing anything. However, in order to be ‘productive,’ you need to actually produce something. It doesn’t matter if it’s a completed sales proposal, an email explaining away the confusion around a particularly convoluted subject, or… anything else, really, as long as it helps to advance the business’ goals.

The Inherent Issue in Comparing the Two
Unfortunately, much of our context for determining between busyness and productivity comes from the least objective source there is - our own perception.

Look at it this way: let’s say that you gave a research assignment to two employees, with a deadline of an hour. If you left, only to return and see one employee watching YouTube videos, and the other one typing away, who would you see as being the productive one? In the moment, you would probably say that it was the employee who was still typing, and not the one watching videos on the Internet. However, what if I told you that the employee watching videos was actually watching videos related to the task you had assigned, and the other was working on what would likely be their fourth unpublished novel? Or that the employee watching the videos had long since completed the assignment, and was taking a well-deserved break, while the employee who was still typing was only doing so because they had goofed off for much of the time you were away?

This illustrates two considerations: how much different productivity really is than pure busyness, as well as how similar they have the potential to be. In order to keep from fooling yourself into thinking you’re being productive when you’re really just looking busy, try asking yourself a few questions as you commence.

For example, you can take a look at how you spend your time, and compare it to what your responsibilities really are at their core.

For instance, let’s say that Bill’s job was to ensure that the company remained secure. If Bill was able to complete all of his day’s tasks in the morning, but then spent the rest of his day reading things online, what would that be considered? Well, that depends. If Bill was reading the latest Bowling Enthusiasts Weekly articles at his desk for the rest of the afternoon, that’s hardly productive. However, if Bill was researching improved cybersecurity practices to enact in the company... that’s a pretty productive way to spend the time.

A Few ‘Keeping Busy’ Red Flags
Of course, none of the following activities have to be time-wasters, they just happen to be in most situations, or require a very specific job responsibility to be considered productive. For instance, many job responsibilities don’t actually require the Internet to be used, so any time spent on it is arguably a waste. The same can be said of social media, and especially email.

Of course, there are also many exceptions to this rule. In essence, you have to use your best judgement, evaluating if a given activity is actually the best use of your time or not.

Don’t forget, XFER has plenty of solutions to help you boost your productivity. Reach out to us at 734-927-6666 / 800-438-9337 to learn more!

Tip of the Week: 4 Tech Questions, Answered
Private Cloud Challenges


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Business Computing Software Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Malware Network Security Gadgets Email Quick Tips Efficiency Network Innovation IT Support Business Management IT Services Business Social Media Business Continuity Smartphones Miscellaneous Server Upgrade Communication Virtualization User Tips Windows Communications Disaster Recovery Data Backup Computer Managed IT Services Microsoft Office Data Recovery Users Smartphone Passwords Browser Mobile Device Management Android Holiday WiFi Internet of Things Save Money Marketing Alert Outsourced IT Tech Term Ransomware BDR Artificial Intelligence Mobile Computing Cloud Computing Cybercrime Vendor Management Operating System Windows 10 Remote Monitoring Router Chrome Productivity Avoiding Downtime Bring Your Own Device Apple Computers Cybersecurity BYOD Information Technology Automation Spam Telephone Systems Current Events VPN Health Big Data Remote Computing Best Practice History IT Solutions Managed IT Services The Internet of Things Collaboration Going Green Firewall Social Engineering Proactive IT Employer-Employee Relationship Phone System Trending Wireless Technology Application IT Consultant Printer Facebook Hacking Windows 10 Office IT Support Mobility Budget Lithium-ion Battery Excel App Mobile Device Bandwidth Money Unified Threat Management Business Managament Networking Phishing Fax Server Business Intelligence Private Cloud iPhone Maintenance Training Windows 8 Two-factor Authentication Office 365 Encryption Applications Mouse Content Filtering Recovery How To PowerPoint Tutorials Virus Gmail Information Antivirus Redundancy Data Protection Settings Law Enforcement Customer Relationship Management Analytics Hard Drives Blockchain Word File Sharing Data Security Google Drive User Error Save Time Value Apps Sports Humor Access Control Managed IT Outlook Website Streaming Media Risk Management Compliance Wi-Fi Machine Learning Administrator Flexibility Analysis Entertainment Software as a Service Saving Time Data Management Managed Service Retail Human Resources Vulnerability Social Connectivity Downtime Inbound Marketing Tech Support Memory Network Congestion Hacker Scam Identity Theft Conferencing Administration Voice over Internet Protocol Tablet Social Networking Search Digital Payment IT Management Twitter Computer Repair Document Management Servers Office Tips Fraud PDF Spam Blocking CES Education IT Plan HaaS End of Support IBM Statistics Safety Piracy Government Leadership YouTube Webinar Skype Content Management Programming Meetings Unsupported Software Help Desk Instant Messaging Infrastructure Computer Accessories Augmented Reality Intranet DDoS Environment Running Cable Paperless Office OneNote Business Technology Solid State Drive Update Wearable Technology Data Storage Net Neutrality Biometrics Black Market Comparison IT service Keyboard Telephony Wireless Physical Security Virtual Assistant Work/Life Balance Data Breach Windows 7 Best Available Cleaning Password Google Docs Display Public Cloud Botnet Bluetooth Touchscreen SaaS Workers People Healthcare Telephone System Samsung USB Credit Cards Robot Data storage Online Currency Video Surveillance Data loss Recycling eWaste Smart Tech Point of Sale Internet Exlporer Cryptocurrency Restore Data Hiring/Firing Frequently Asked Questions Webcam Content Filter Camera Patch Management Windows Media Player Virtual Desktop IT Security Monitor Digital Signage Workforce Authentication MSP 360 Emails Professional Services Cost Management Google Apps Print Server Vendor Screen Mirroring Lifestyle Remote Support Insurance Upgrades Flash Analyitcs Fiber-Optic nternet Crowdfunding Smart Office Electronic Medical Records PC Care Safe Mode Business Owner Backup and Disaster Recovery Tip of the week Amazon Storage Windows 10s Customer Service Reputation Cast Google Search Consultant Telecommuting Company Culture Internet exploMicrosoft Scheduling Nanotechnology Remote Worker Tools Law Firm IT 3D HVAC Security Cameras Charger Practices HIPAA Sync Cables NarrowBand eBay Search Engine Hiring/Firing Accountants Alerts Windows Server 2008 Amazon Web Services LinkedIn Uninterrupted Power Supply Addiction Virtual Private Network Cameras Customers Computer Care ISP Licensing Software Tips Remote Work Advertising Wiring Hosted Solution Password Manager Enterprise Content Management Employee/Employer Relationship WIndows 7 Windows 8.1 Update Distributed Denial of Service Files Hosted Computing Proactive Virtual Reality Unified Communications Chromecast Text Messaging Students Bing Work Station Online Shopping Gaming Console Cache Project Management Audit Printer Server Shortcut Staff File Versioning User Notifications Devices GDPR Netflix Worker Commute Business Mangement Debate Macro Password Management Smartwatch Data Warehousing Managing Stress Specifications Domains Colocation Inventory Remote Monitoring and Maintenance Start Menu Bloatware Theft Laptop Co-managed IT Shortcuts Root Cause Analysis SharePoint IoT Supercomputer Regulations Science Evernote Shadow IT Wireless Internet Warranty Computer Fan Digital Signature NIST Multiple Versions HBO Hybrid Cloud Thought Leadership E-Commerce Travel Criminal Employee Millennials IaaS Computing Infrastructure Line of Business Mobile Entrepreneur Cortana Touchpad Electronic Health Records eCommerce Relocation Knowledge Tablets Wireless Charging Legal Wire Microchip FENG Multi-Factor Security Strategy Assessment Rootkit Politics Utility Computing Television Printers Transportation Troubleshooting Webinar Battery Thank You Video Games Automobile Public Computer Cryptomining Benefits IT solutions Congratulations Scalability Employer Employee Relationship CrashOverride Smart Technology Loyalty Books Experience How to Content Techology Two Factor Authentication Emergency Music Worker Regulation Audiobook

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *