Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Don’t Make the Solutions More Complicated Than the Problem

Don’t Make the Solutions More Complicated Than the Problem

The act of “yak shaving,” also known as “bikeshedding,” is a specific kind of procrastination that can hold you back from getting the most out of your workday. This week’s tip is dedicated to explaining what this nonsensical phrase means and why it’s beneficial to keep your employees on track.

What Does Yak Shaving Have to Do with My Business?
Yak shaving is just another way to define semi-defensible procrastination. It uses the following scenario to make its point: you need to complete a proposal, but you might be tired from a long day of work, making concentration difficult at best. You start to look into the best kind of coffee to get into a productive mindset, and your research yields potent results. The best coffee beans in the world come from a remote island, and they can only be harvested by a yak. So, now you need a yak. You take a trip to the Himalayas to acquire said yak, but the yak can’t take the temperate climate of the island with the coffee beans. In order to bring the yak to the island, you’ll have to shave its long fur off. Once that’s been done, you can take that yak to the island, harvest your coffee beans, and brew that perfect cup of coffee for flawless productivity to finish your proposal.

Basically, it takes a normal problem and uses a ridiculous and overly elaborate method to resolve the issue, but this in itself creates complication to get away from doing the less desired task. Everyone has been in this position before, where a particular task is so unappealing that they would do anything to get away from it, but the fact remains that the task needs to be done, whether you want to do it or not.

How to Identify (and Overcome) Your Hairy Yaks
The first thing to do if you think an issue like this arises is to notice how you tend to react to them. Consider all of the tasks you need to complete; how many of them actually have to be done to reach your ultimate goal? There’s no doubt that looking for excuses will lead to procrastination rather than productivity.

Imagine all the time spent earlier looking into the yak and the island with the coffee. What if you invested all of that time and energy into completing the task? Instead of wasting time, you could have already completed the task, rendering the need for the yak obsolete. Granted, the problem-solving skills you’ll acquire might seem valuable, and they are to an extent, so it’s not a complete waste--just not a great choice in the first place.

Think of the Task as an Investment
Time is money, and time-consuming tasks can be a waste if they aren’t being handled as well as possible. Think about it like this; you’ve already invested a considerable amount of time and effort into one solution, so why not simply go all the way with it and finish it, if the alternative is to waste even more time?

Overall, you need to remember that successfully completing a goal should outweigh the frustration of having to do it. The results are what matters primarily, but if you have only been working on something for a couple of moments, don’t be afraid to change it up.

The technology you use will play a considerable role in the way you complete a task. To learn more about how you can use it to benefit your business, reach out to Central Technology Solutions at 1-844-237-4300.

When Do You Know When It’s Time For an Upgrade?
Unified Software Brings Multiple Benefits
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, May 25 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Hosted Solutions Privacy IT Services Malware Productivity Hackers Network Security Internet Data Productivity Outsourced IT Data Backup Managed IT Services Software Business Innovation IT Support Mobile Devices Ransomware Microsoft Data Recovery Computer Tech Term Hardware Google Efficiency Backup IT Support Small Business Cloud Computing Internet of Things Business Continuity Communication Managed Service Provider Smartphone Upgrade Android Remote Monitoring Paperless Office User Tips Business Management Disaster Recovery Encryption Social Media Data Management Windows 10 Phishing Smartphones VoIP Collaboration Artificial Intelligence Browser Workplace Tips Managed IT Windows 10 Windows Managed IT Services Facebook BYOD Server Cybersecurity Risk Management Save Money Mobile Device communications Saving Money Office 365 Passwords Holiday App Mobile Device Management Network Firewall Employer-Employee Relationship Chrome Bandwidth BDR Bring Your Own Device Automation Recovery Virtualization Business Technology Apps Vendor Management Applications Gmail Password Wi-Fi Analytics Government Document Management Compliance Unified Threat Management Robot Big Data SaaS Quick Tips Scam Telephone Systems Project Management Antivirus Managed Service Microsoft Office Infrastructure Information Money Vulnerability Hosted Solution Data storage Going Green Website File Sharing Help Desk Wireless Content Filtering Healthcare IT Management Tip of the week Work/Life Balance Apple Regulations VPN Unified Communications Office IT Service Social Computers Customer Relationship Management Blockchain Storage Training Data loss Computing Data Security Tablet Printing Files Customer Service Remote Computing Virtual Reality Two-factor Authentication Settings Router Miscellaneous Politics Digital Payment Net Neutrality End of Support Health Websites Identity Theft Remote Workers Mobile Computing Hacker Licensing Users Patch Management Spam Monitors Networking Internet Exlporer Electronic Medical Records HIPAA YouTube Wireless Technology Legal Alert IoT WiFi Access Control Cooperation Virtual Private Network Downtime Network Management Mobile Security Administration Machine Learning Mobility Assessment Employees How To Samsung How To Company Culture LiFi Budget Server Management Education Information Technology Chromebook RMM Flexibility IT solutions Avoiding Downtime Operating System Uninterrupted Power Supply Mouse Outlook Proactive Sports Private Cloud Software as a Service Google Drive Upgrades The Internet of Things Word Tech Support Redundancy Twitter Maintenance Management Business Growth Smart Technology Remote Monitoring and Management Gadgets Cost Management E-Commerce Display Technology Tips Chatbots Options Wires Human Error Hard Drives Google Docs 3D Printing Point of Sale Shortcut Notes Humor Multi-Factor Security Wearable Technology Firefox Shared resources Vulnerabilities Authentication Processors Microsoft Excel Modem Connectivity Printer Alerts Voice over Internet Protocol Enterprise Resource Planning Bookmarks Drones Sync Distributed Denial of Service Annual Convention Heating/Cooling IT Consulting WPA3 Financial Office Tips Backups Telephony WannaCry PowerPoint Hard Drive Features Deep Learning Update Public Cloud Comparison Identity Time Management 5G Permission Solid State Drive Unsupported Software Virus Law Enforcement Current Events Botnet Google Calendar OneDrive Geography Authorization Travel Cookies Hacking Windows 7 Mobile Favorites Alt Codes Social Engineering USB Mobile Device Managment Software Tips Managed IT Service San Diego Servers Data Breach Fleet Tracking Procurement Professional Services Cache Electronic Health Records Automobile Computer Care Specifications Wireless Internet Test Cryptocurrency Mobile Data Gadget Legislation IT Technicians Manufacturing High-Speed Internet Permissions Nanotechnology Disaster Trending Security Cameras Star Wars Monitoring SharePoint Staff Mail Merge Transportation Conferencing Typing Safety Break Fix Social Networking Technology Laws Asset Tracking Hacks Dark Data Personal Information GPS VoIP Sponsor Virtual Assistant Recycling Cyberattacks Best Practice Black Friday Roanoke — Central Technology Solutions Touchscreen Techology MSP Virtual Desktop Bitcoin Unified Threat Management Hotspot Utility Computing Consulting Supercomputer Mirgation Consultation Lenovo Hard Disk Drives Development Zero-Day Threat Notifications Crowdsourcing Meetings Fraud Screen Reader Remote Worker Tracking Downloads Augmented Reality Address Managing Stress Instant Messaging Black Market G Suite History Dark Web Motherboard Statistics OneNote Digital Obstacle Wasting Time eWaste Read Only Writing Emoji Google Maps Cyber Monday technology services provider Disaster Resistance Tech Terms Windows 8 Save Time Taxes User Error Language Managed Services Provider Network Congestion IT Budget Migration Superfish Solid State Drives Cables Backup and Disaster Recovery Identities Smart Tech Search ROI Operations Teamwork Enterprise Content Management Finance Cabling Data Warehousing Bluetooth Employee-Employer Relationship Marketing Computer Repair Computing Infrastructure Spyware Course Database Buisness Google Wallet Retail Cortana Technology Assurance Group ’s 18 Proactive IT Theft Physical Security Error Hard Disk Drive Cybercrime Web Server Emergency CrashOverride Regulation Cameras Motion Sickness Administrator CCTV Relocation Students Webcam Printers IT Consultant