Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Don’t Make the Solutions More Complicated Than the Problem

Don’t Make the Solutions More Complicated Than the Problem

The act of “yak shaving,” also known as “bikeshedding,” is a specific kind of procrastination that can hold you back from getting the most out of your workday. This week’s tip is dedicated to explaining what this nonsensical phrase means and why it’s beneficial to keep your employees on track.

What Does Yak Shaving Have to Do with My Business?
Yak shaving is just another way to define semi-defensible procrastination. It uses the following scenario to make its point: you need to complete a proposal, but you might be tired from a long day of work, making concentration difficult at best. You start to look into the best kind of coffee to get into a productive mindset, and your research yields potent results. The best coffee beans in the world come from a remote island, and they can only be harvested by a yak. So, now you need a yak. You take a trip to the Himalayas to acquire said yak, but the yak can’t take the temperate climate of the island with the coffee beans. In order to bring the yak to the island, you’ll have to shave its long fur off. Once that’s been done, you can take that yak to the island, harvest your coffee beans, and brew that perfect cup of coffee for flawless productivity to finish your proposal.

Basically, it takes a normal problem and uses a ridiculous and overly elaborate method to resolve the issue, but this in itself creates complication to get away from doing the less desired task. Everyone has been in this position before, where a particular task is so unappealing that they would do anything to get away from it, but the fact remains that the task needs to be done, whether you want to do it or not.

How to Identify (and Overcome) Your Hairy Yaks
The first thing to do if you think an issue like this arises is to notice how you tend to react to them. Consider all of the tasks you need to complete; how many of them actually have to be done to reach your ultimate goal? There’s no doubt that looking for excuses will lead to procrastination rather than productivity.

Imagine all the time spent earlier looking into the yak and the island with the coffee. What if you invested all of that time and energy into completing the task? Instead of wasting time, you could have already completed the task, rendering the need for the yak obsolete. Granted, the problem-solving skills you’ll acquire might seem valuable, and they are to an extent, so it’s not a complete waste--just not a great choice in the first place.

Think of the Task as an Investment
Time is money, and time-consuming tasks can be a waste if they aren’t being handled as well as possible. Think about it like this; you’ve already invested a considerable amount of time and effort into one solution, so why not simply go all the way with it and finish it, if the alternative is to waste even more time?

Overall, you need to remember that successfully completing a goal should outweigh the frustration of having to do it. The results are what matters primarily, but if you have only been working on something for a couple of moments, don’t be afraid to change it up.

The technology you use will play a considerable role in the way you complete a task. To learn more about how you can use it to benefit your business, reach out to Central Technology Solutions at 1-844-237-4300.

When Do You Know When It’s Time For an Upgrade?
Unified Software Brings Multiple Benefits


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, November 22 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Productivity Hosted Solutions Email Network Security Data IT Services Data Backup Privacy Malware Internet Hackers Software Outsourced IT Productivity Microsoft Innovation Managed IT Services Computer Data Recovery Business Hardware IT Support IT Support Efficiency Ransomware Mobile Devices Tech Term Google User Tips Small Business Cloud Computing Upgrade Business Continuity Backup Phishing Windows 10 Collaboration Internet of Things Communication Managed IT Services Managed Service Provider Cybersecurity VoIP Smartphone Workplace Tips Business Management Android Paperless Office Remote Monitoring Disaster Recovery Smartphones Windows 10 Data Management Windows communications Managed IT Encryption Artificial Intelligence Managed Service Social Media Save Money Mobile Device Office 365 Browser Server BYOD Passwords Facebook Saving Money Help Desk Risk Management BDR Apps Miscellaneous Holiday App Government Quick Tips Document Management Password Automation Mobile Device Management Business Technology Wi-Fi Robot Compliance Bring Your Own Device Gmail Going Green Laptops Applications Vendor Management Unified Threat Management Healthcare Microsoft Office Big Data Network Recovery Employer-Employee Relationship Analytics Virtualization Chrome Firewall Avoiding Downtime Bandwidth Training Website Processor Windows 7 File Sharing Money Content Filtering SaaS Data storage Telephone Systems IT Management Redundancy Tip of the week Scam Wireless Project Management Antivirus Infrastructure Data loss Vulnerability Blockchain Information Apple Hosted Solution Access Control Social Machine Learning Mobility Virtual Reality Tablet Computing RMM Regulations Files Office IT Service Information Technology Printing Computers Gadgets Operating System Storage Router Two-factor Authentication Politics Work/Life Balance VPN Remote Computing Users Unified Communications Customer Relationship Management Settings Data Security Downtime Customer Service Hacker Server Management Cooperation Administration How To LiFi Mobile Security Education Solid State Drive OneDrive Upgrades Current Events Employees Consultation Wireless Technology Monitoring Legal Uninterrupted Power Supply Twitter Professional Services IT solutions Company Culture Display Recycling End of Support Health Utility Computing Word Search Dark Web Budget Sports Private Cloud Proactive Monitors Bitcoin Electronic Medical Records The Internet of Things Alert Software as a Service Tech Support Employee-Employer Relationship Mouse Outlook Smart Technology Digital Payment Remote Monitoring and Management Maintenance Management Networking Net Neutrality Google Drive Patch Management How To Samsung Websites Identity Theft Licensing Remote Workers Spam Flexibility YouTube Business Growth File Management Chromebook WiFi Virtual Private Network Network Management Internet Exlporer Hard Drive Mobile Computing Assessment IoT HIPAA 5G Managed IT Service San Diego Automobile Computer Care Fleet Tracking Drones Procurement Technology Laws PowerPoint Writing Value of Managed Services Emoji Gadget Mobile Favorites Backups Mail Merge Deep Learning Test Touchscreen Techology Network Congestion Windows Server Cache Electronic Health Records VoIP Sponsor Specifications High-Speed Internet Lenovo Computer Repair Permissions Virtual Desktop Nanotechnology Star Wars Telephone Legislation IT Technicians GPS Wireless Internet Physical Security Break Fix Social Networking Alt Codes Asset Tracking Statistics Retail Managed Services Cortana SharePoint Staff Conferencing Address Black Friday Roanoke — Central Technology Solutions Supercomputer MSP Disaster Resistance Security Cameras User Management Unified Threat Management Hotspot Crowdsourcing Meetings Cryptocurrency Cyberattacks Digital Obstacle Manufacturing 3D Printing Development Zero-Day Threat Superfish Fraud Screen Reader G Suite History Consulting Transportation Mobile VoIP Processors Mirgation Tracking Office Tips Employer/Employee Relationships Motherboard Google Maps Typing OneNote Bluetooth Virtual Assistant Vendor Downloads Augmented Reality Taxes Managing Stress Hacks Instant Messaging Cyber Monday technology services provider IT Budget Best Practice Tech Terms Proactive IT Remote Worker Batteries Update User Error Marketing Language eWaste Read Only Spyware Course Hard Disk Drives Unsupported Software Virus Cables Backup and Disaster Recovery Projects Smart Tech Cabling Managed Services Provider Shortcut Cyber security Buisness Migration Firefox Proactive Maintenance Data Warehousing Wasting Time Social Engineering Smart Devices USB Operations Enterprise Content Management Finance Mobile Data Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting ROI Remote Work Computing Infrastructure Point of Sale Windows 8 Save Time Solid State Drives Wires Human Error Time Management Return on Investment Cybercrime Cost Management Identities E-Commerce WannaCry Teamwork Technology Tips Chatbots Dark Data Database Management Personal Information Microsoft Excel Modem Sync Connectivity Hacking Database Safety Sensors Multi-Factor Security Wearable Technology Telephony Vulnerabilities Authentication Options Distributed Denial of Service Annual Convention Public Cloud WPA3 Google Wallet Financial Servers Data Breach Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Botnet Permission Active Directory Travel Hard Drives Features Google Docs Shared resources Notifications Comparison Identity Authorization Humor GDPR Cookies Mobile Device Managment Software Tips Disaster Trending Voice over Internet Protocol Payment Cards Black Market Google Calendar Geography Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam Hard Disk Drive Students IT Consultant Error Printers Emergency Web Server CrashOverride