Get Started Today!  321-259-5500

croom new

Don’t Make the Solutions More Complicated Than the Problem

Don’t Make the Solutions More Complicated Than the Problem

The act of “yak shaving,” also known as “bikeshedding,” is a specific kind of procrastination that can hold you back from getting the most out of your workday. This week’s tip is dedicated to explaining what this nonsensical phrase means and why it’s beneficial to keep your employees on track.

What Does Yak Shaving Have to Do with My Business?
Yak shaving is just another way to define semi-defensible procrastination. It uses the following scenario to make its point: you need to complete a proposal, but you might be tired from a long day of work, making concentration difficult at best. You start to look into the best kind of coffee to get into a productive mindset, and your research yields potent results. The best coffee beans in the world come from a remote island, and they can only be harvested by a yak. So, now you need a yak. You take a trip to the Himalayas to acquire said yak, but the yak can’t take the temperate climate of the island with the coffee beans. In order to bring the yak to the island, you’ll have to shave its long fur off. Once that’s been done, you can take that yak to the island, harvest your coffee beans, and brew that perfect cup of coffee for flawless productivity to finish your proposal.

Basically, it takes a normal problem and uses a ridiculous and overly elaborate method to resolve the issue, but this in itself creates complication to get away from doing the less desired task. Everyone has been in this position before, where a particular task is so unappealing that they would do anything to get away from it, but the fact remains that the task needs to be done, whether you want to do it or not.

How to Identify (and Overcome) Your Hairy Yaks
The first thing to do if you think an issue like this arises is to notice how you tend to react to them. Consider all of the tasks you need to complete; how many of them actually have to be done to reach your ultimate goal? There’s no doubt that looking for excuses will lead to procrastination rather than productivity.

Imagine all the time spent earlier looking into the yak and the island with the coffee. What if you invested all of that time and energy into completing the task? Instead of wasting time, you could have already completed the task, rendering the need for the yak obsolete. Granted, the problem-solving skills you’ll acquire might seem valuable, and they are to an extent, so it’s not a complete waste--just not a great choice in the first place.

Think of the Task as an Investment
Time is money, and time-consuming tasks can be a waste if they aren’t being handled as well as possible. Think about it like this; you’ve already invested a considerable amount of time and effort into one solution, so why not simply go all the way with it and finish it, if the alternative is to waste even more time?

Overall, you need to remember that successfully completing a goal should outweigh the frustration of having to do it. The results are what matters primarily, but if you have only been working on something for a couple of moments, don’t be afraid to change it up.

The technology you use will play a considerable role in the way you complete a task. To learn more about how you can use it to benefit your business, reach out to TotalCareIT™ at 321-259-5500.

What is Encryption, and Why Do We Need It?
Is Your Effort Getting Things Done?
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email Productivity IT Services Data Network Security Productivity Computer Backup Mobile Devices Software Hardware Microsoft Ransomware Google Workplace Tips User Tips Efficiency Managed Service Provider Windows 10 Tech Term Smartphone Android Innovation Business Continuity Server Cloud Computing Disaster Recovery Small Business Communication Encryption Upgrade IT Support IT Support Data Management Social Media Business Management Smartphones Data Backup Browser Network App Phishing Managed IT Services BYOD Office 365 Facebook Outsourced IT Windows 10 Windows Artificial Intelligence Data Recovery Paperless Office Passwords Employer-Employee Relationship Collaboration Office Gmail Big Data Internet of Things Apps Hosted Solution Mobile Device Management VoIP Vendor Management Managed IT Services Government WiFi Save Money Holiday Remote Monitoring Microsoft Office Office Tips Virtualization Spam Robot Cybersecurity communications Firewall Wireless Technology Vulnerability Recovery Wireless Risk Management Saving Money Wi-Fi Miscellaneous Two-factor Authentication Chrome Alert Word Budget Automation Scam Avoiding Downtime IT solutions Document Management Managed Service Analytics IT Management Content Filtering How To Website Bandwidth Hacker Customer Service Infrastructure Business Technology Mobile Device Quick Tips Tip of the week Antivirus Social VPN Money Work/Life Balance Password Settings The Internet of Things Computing Blockchain Machine Learning Compliance Unified Threat Management Downtime Data storage Virtual Reality Tablet Remote Computing Information Apple Customer Relationship Management SaaS BDR Healthcare Politics Applications Twitter File Sharing IT service Going Green Education Maintenance Hard Drives Bring Your Own Device Storage Legal Tech Support Cybercrime Automobile How To Server Management Net Neutrality Safety Presentation Samsung Network Management IBM Augmented Reality Gadgets Lithium-ion battery Router Patch Management Cortana Regulations Data loss Access Control HIPAA Virtual Desktop Hacking Networking Cost Management YouTube End of Support Business Owner Private Cloud Computer Care Outlook Users Unified Communications Competition Identity Theft User Data Security Health Business Intelligence Mobile Security Solid State Drive Training Running Cable Virtual Private Network LiFi Upgrades Websites G Suite eWaste User Error Best Practice Point of Sale Computers Cooperation Sports Operating System Electronic Medical Records Search Physical Security Printing Chromebook Telephone Systems Botnet Taxes Heating/Cooling Administration Management Google Drive Mouse Monitors Google Calendar Chatbots Dark Data Emoji Analyitcs Screen Reader Read Only Address Deep Learning Unsupported Software IT Consultant Cables Theft Help Desk Digital Payment iPhone Motherboard E-Commerce Shortcut Hiring/Firing Law Enforcement Cameras WannaCry Company Culture Human Error Printer Wearable Technology Buisness Hacks Google Docs Remote Workers Professional Services Smart Technology Co-managed IT Save Time Hard Disk Drive Internet Exlporer Authentication Computing Infrastructure Laptop Alt Codes Shared resources Backups Personal Information Tracking Financial Legislation Identity Information Technology Administrator Marketing Smart Tech Printers Permissions Database Mobile Data Relocation Cleaning Firefox Troubleshooting Wires Features FCC Gadget CCTV Managing Stress Permission Trending Touchscreen Wasting Time Statistics Distributed Denial of Service Writing Notifications Meetings Hard Drive Authorization Alerts Halloween Typing OneDrive Computer Repair Security Cameras Comparison Google Wallet Black Market Cabling Connectivity Bookmarks Fraud Application Identities Fun Voice over Internet Protocol Modem Title II Digital Entrepreneur Enterprise Content Management Test SharePoint CIO Current Events Monitoring Bluetooth Managed IT Service Retail Crowdsourcing Webcam Cache Employees Licensing Scary Stories Cryptocurrency Manufacturing ROI Specifications Social Networking Drones Network Congestion IoT Favorites Mobile Computing Windows 7 Humor Update Google Maps Cookies Electronic Health Records Online Knowledge Law Spyware Vulnerabilities RMM Downloads IT Technicians Supercomputer Consulting Break Fix IP Address Social Engineering Recycling Remote Monitoring and Management Techology Undo Bitcoin Hard Disk Drives OneNote Notes Black Friday Display Processors Travel Disaster Star Wars Instant Messaging Lenovo Hotspot Staffing VoIP Mirgation Public Speaking Error Nanotechnology Files Mail Merge Microsoft Excel Experience 5G 3D Printing Environment Development Tech Terms Multi-Factor Security IT Budget Servers Managed Services Provider Dark Web Mobile Office Web Server Corporate Profile Zero-Day Threat Unified Threat Management Staff Windows 8 Solid State Drives Managed IT Employee-Employer Relationship PowerPoint Cyber Monday Motion Sickness Uninterrupted Power Supply Assessment Finance Superfish Language Refrigeration Business Growth Teamwork GPS Time Management Wireless Internet USB Emergency Flexibility Regulation Domains Students CrashOverride

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login