Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Don’t Make the Solutions More Complicated Than the Problem

Don’t Make the Solutions More Complicated Than the Problem

The act of “yak shaving,” also known as “bikeshedding,” is a specific kind of procrastination that can hold you back from getting the most out of your workday. This week’s tip is dedicated to explaining what this nonsensical phrase means and why it’s beneficial to keep your employees on track.

What Does Yak Shaving Have to Do with My Business?
Yak shaving is just another way to define semi-defensible procrastination. It uses the following scenario to make its point: you need to complete a proposal, but you might be tired from a long day of work, making concentration difficult at best. You start to look into the best kind of coffee to get into a productive mindset, and your research yields potent results. The best coffee beans in the world come from a remote island, and they can only be harvested by a yak. So, now you need a yak. You take a trip to the Himalayas to acquire said yak, but the yak can’t take the temperate climate of the island with the coffee beans. In order to bring the yak to the island, you’ll have to shave its long fur off. Once that’s been done, you can take that yak to the island, harvest your coffee beans, and brew that perfect cup of coffee for flawless productivity to finish your proposal.

Basically, it takes a normal problem and uses a ridiculous and overly elaborate method to resolve the issue, but this in itself creates complication to get away from doing the less desired task. Everyone has been in this position before, where a particular task is so unappealing that they would do anything to get away from it, but the fact remains that the task needs to be done, whether you want to do it or not.

How to Identify (and Overcome) Your Hairy Yaks
The first thing to do if you think an issue like this arises is to notice how you tend to react to them. Consider all of the tasks you need to complete; how many of them actually have to be done to reach your ultimate goal? There’s no doubt that looking for excuses will lead to procrastination rather than productivity.

Imagine all the time spent earlier looking into the yak and the island with the coffee. What if you invested all of that time and energy into completing the task? Instead of wasting time, you could have already completed the task, rendering the need for the yak obsolete. Granted, the problem-solving skills you’ll acquire might seem valuable, and they are to an extent, so it’s not a complete waste--just not a great choice in the first place.

Think of the Task as an Investment
Time is money, and time-consuming tasks can be a waste if they aren’t being handled as well as possible. Think about it like this; you’ve already invested a considerable amount of time and effort into one solution, so why not simply go all the way with it and finish it, if the alternative is to waste even more time?

Overall, you need to remember that successfully completing a goal should outweigh the frustration of having to do it. The results are what matters primarily, but if you have only been working on something for a couple of moments, don’t be afraid to change it up.

The technology you use will play a considerable role in the way you complete a task. To learn more about how you can use it to benefit your business, reach out to Central Technology Solutions at 1-844-237-4300.

When Do You Know When It’s Time For an Upgrade?
Unified Software Brings Multiple Benefits
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Malware Privacy Hosted Solutions Hackers IT Services Internet Data Productivity Network Security Productivity Software Managed IT Services Outsourced IT Data Backup Business IT Support Innovation Mobile Devices Tech Term Computer Ransomware Data Recovery Hardware Microsoft Cloud Computing Google Backup Small Business Business Continuity Internet of Things Managed Service Provider Efficiency Smartphone Android Upgrade Remote Monitoring Business Management Paperless Office Smartphones User Tips Disaster Recovery Encryption VoIP Social Media Data Management IT Support Windows 10 Managed IT Browser Communication Artificial Intelligence Workplace Tips Phishing Windows Collaboration Facebook Save Money Cybersecurity BYOD Risk Management Windows 10 App communications Mobile Device Management Server Saving Money Mobile Device Holiday Document Management Unified Threat Management Automation Recovery Employer-Employee Relationship Network Firewall Wi-Fi BDR Bandwidth Compliance Robot Bring Your Own Device Office 365 Apps Applications Managed IT Services Passwords Gmail Vendor Management Government Quick Tips Scam Password Healthcare Project Management Antivirus Analytics Virtualization Big Data Infrastructure Chrome Managed Service Vulnerability Business Technology Information Hosted Solution Website Money Data storage Telephone Systems SaaS Going Green IT Management Content Filtering Microsoft Office Tip of the week Wireless Storage Router Two-factor Authentication Politics Remote Computing Work/Life Balance VPN Customer Relationship Management Unified Communications Help Desk Data Security Customer Service Data loss Apple Social Blockchain Training Virtual Reality Miscellaneous File Sharing Tablet Computing Regulations Files Office IT Service Printing Computers Sports Outlook The Internet of Things Mouse Software as a Service Tech Support Google Drive Smart Technology How To Digital Payment Samsung Remote Monitoring and Management Maintenance Management Websites Identity Theft Net Neutrality Patch Management Settings Flexibility Licensing Remote Workers Business Growth Chromebook Avoiding Downtime Virtual Private Network Users Network Management Spam Mobile Computing Internet Exlporer Assessment WiFi IoT YouTube Hacker HIPAA Upgrades Server Management Downtime Access Control How To Machine Learning Mobility Twitter Mobile Security Wireless Technology Legal Employees Administration Uninterrupted Power Supply Education LiFi Company Culture End of Support Health IT solutions Word Budget Redundancy Information Technology Monitors Private Cloud Alert Electronic Medical Records Operating System USB Cables Backup and Disaster Recovery Smart Tech Cabling Managed Services Provider Shortcut Migration Social Engineering Finance Firefox Marketing Windows 8 Save Time Data Warehousing Mobile Data Employee-Employer Relationship Wasting Time Operations Enterprise Content Management Technology Assurance Group ’s 18 Theft Heating/Cooling IT Consulting Buisness ROI Computing Infrastructure Point of Sale Gadgets Identities Safety Wires Human Error Time Management Networking Dark Data Personal Information Cost Management E-Commerce WannaCry Technology Tips Chatbots Vulnerabilities Authentication Microsoft Excel Modem Sync Connectivity Hacking Google Wallet Database Multi-Factor Security Wearable Technology Telephony Hard Drives Google Docs Distributed Denial of Service Annual Convention Public Cloud Notifications WPA3 Financial Servers Data Breach Notes Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Identity Botnet Black Market Permission Humor Travel Hard Drive Features Comparison Geography Authorization Backups Cookies Mobile Device Managment Software Tips Disaster Trending Drones Voice over Internet Protocol Google Calendar Writing Emoji Solid State Drive Managed IT Service San Diego Automobile Computer Care Fleet Tracking Procurement Technology Laws Deep Learning PowerPoint Cooperation Gadget Network Congestion Mobile Favorites Mail Merge Specifications Test Touchscreen Techology Current Events Computer Repair Cache Electronic Health Records VoIP Sponsor High-Speed Internet Consultation Lenovo Permissions Nanotechnology Physical Security Star Wars Monitoring Alt Codes Windows 7 Legislation IT Technicians Retail GPS Cortana Address Cryptocurrency Break Fix Social Networking 3D Printing Asset Tracking Statistics Professional Services SharePoint Staff Display Conferencing Black Friday Roanoke — Central Technology Solutions Supercomputer Processors MSP RMM Disaster Resistance Security Cameras Unified Threat Management Hotspot Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Virtual Desktop Development Zero-Day Threat Superfish Hacks Fraud Screen Reader Office Tips G Suite History Utility Computing Consulting Search Typing Mirgation Tracking Bitcoin Dark Web Motherboard Unsupported Software Google Maps Virus OneNote Bluetooth Best Practice Virtual Assistant Downloads Augmented Reality Taxes Update Managing Stress Instant Messaging Cyber Monday technology services provider IT Budget Proactive Tech Terms Proactive IT Remote Worker User Error Language eWaste Read Only Spyware Course Hard Disk Drive IT Consultant Error Printers Cybercrime Emergency Web Server CrashOverride Cameras Regulation Motion Sickness Administrator CCTV Relocation Webcam