Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Remote Work Has Been Around for Longer than You’d Think

Remote Work Has Been Around for Longer than You’d Think

A lot of people aren’t aware that working from home is not a recent innovation. It can arguably be traced back over a million and a half years, when our ancestors would work relatively close to their dwelling places. Throughout our history, work has shifted away and back again to the remote methodology. Let’s look back through the years to see the progression of how people worked, based on the technology that was available.

Working from Home Was Largely the Norm

In the years leading up to the Industrial Revolution, especially in the medieval period and the Renaissance, working from home was how people worked. European peasantry lived in structures called “longhouses” with their livestock and workplaces contained inside with them. In fact, it wasn’t until 1760 and the Industrial Revolution that working someplace else was a common option.

Even then, factory managers often operated out of small buildings adjacent to the factory that were built to reflect many of the comforts of home.

The Shift to Office Work

The office as we know it today didn’t come around until the early 1900s, as technologies like electricity, telephony, and typing became available, with Ford Motor Companies adopting the now-traditional 9-to-5 workday in 1926.

By the 1960s, clerical work had taken over much of the job market, and with it, an intense obsession with productivity. Managers of the time kept detailed notes of how long it should take to carry out activities that today aren’t even considered. In case you were wondering, turning in your swivel chair should take you 0.009 minutes, as a guide from 1960 dictates. The cubicle, the epitome of removing distractions in the workplace, was first designed in 1968.

Technology Helped Encourage Remote Practices

However, in the 1970s, a variety of factors were introduced that made the prospect of remote work more appealing. For instance, rising concerns over the environment brought up the concept of remote work, and technology was developed that enabled remote productivity.

Once the Internet was introduced in 1983, remote work was considered a legitimate option again. With Wi-Fi’s development in 1991 and various professional and governmental innovations over the next few decades, we now have the means to support remote operations for so many—and thank goodness we do.

Central Technology Solutions is here to help you leverage the various tools that your business can use to support its operations on a remote basis. To learn more about these tools and how you can best use them today, reach out to us at 1-844-237-4300.

Tip of the Week: Laptop Battery Best Practices
2-Factor, 2-Furious - How 2FA is Our Last Hope
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, July 05 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.centraltechnologysolutions.com/

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Productivity Cloud Data Privacy Hosted Solutions Network Security IT Services Data Backup Email Malware Internet Hackers Software Business Efficiency IT Support Outsourced IT Innovation Microsoft Data Recovery Mobile Devices Productivity Computer Hardware Managed IT Services Google Upgrade Business Continuity IT Support Small Business Cloud Computing Ransomware Backup Cybersecurity Tech Term Collaboration User Tips Communication Phishing Managed IT Services Managed Service Provider Smartphone Business Management Workplace Tips Windows 10 Disaster Recovery Smartphones Mobile Device VoIP Internet of Things Android Data Management Remote Monitoring Social Media Paperless Office Managed Service communications Facebook Browser Encryption Managed IT Quick Tips Artificial Intelligence Network Server Windows 10 Save Money Office 365 Windows Miscellaneous Saving Money BDR Virtualization Holiday Business Technology Compliance BYOD Risk Management Passwords Help Desk Wi-Fi App Windows 7 Government Document Management Users Health Microsoft Office Vendor Management Automation Remote Work Password Training Healthcare Apps Mobile Device Management Firewall Data Security Robot Big Data Unified Threat Management Chrome Laptops Bring Your Own Device Office Going Green Applications Bandwidth Recovery Employer-Employee Relationship Analytics Gmail Avoiding Downtime Data loss Vulnerability Apple Processor Blockchain Information Telephone Systems SaaS Money Regulations Data storage Computing Computers IT Management Storage Redundancy Information Technology Hosted Solution Website Tip of the week Wireless Scam Project Management Antivirus Two-factor Authentication Mobility File Sharing Content Filtering Infrastructure Virtual Private Network Meetings OneDrive Files Virtual Reality Social Gadgets Hard Drive Covid-19 IoT Access Control Politics Unified Communications IT Service Work/Life Balance Company Culture RMM Budget Downtime Printing Operating System Software as a Service Proactive Router Flexibility VPN Remote Computing Machine Learning Employee-Employer Relationship Maintenance Settings Customer Service Customer Relationship Management Tablet Remote Workers Sports Data Breach Upgrades Co-Managed IT Mobile Computing Network Management Internet Exlporer HIPAA Assessment Hacker Twitter How To Private Cloud Server Management Professional Services Managed Services Cooperation Solid State Drive Current Events Tech Support Display Mobile Security Wireless Technology Legal End of Support Consultation Electronic Health Records Uninterrupted Power Supply Employees Digital Payment Monitoring Spam Mobile Office Websites Identity Theft WiFi Monitors Remote Worker YouTube Electronic Medical Records Licensing Recycling Word Alert Search Bitcoin Dark Web Utility Computing Consulting Augmented Reality Administration Samsung Data Storage Social Network Outlook Education The Internet of Things Mouse LiFi How To Managed Services Provider Smart Technology IT solutions Chromebook File Management Google Drive Patch Management Remote Monitoring and Management Time Management Networking Net Neutrality Management Business Growth Payment Cards Vulnerabilities Authentication 5G IT Distributed Denial of Service Annual Convention Supercomputer Connectivity Writing Emoji Servers PowerPoint Value of Managed Services Printer Alerts Hard Drives Crowdsourcing Google Docs Comparison Identity Humor Tracking WPA3 Financial Marketing Network Congestion Windows Server G Suite History Enterprise Resource Planning Bookmarks Google Calendar Backups Taxes Permission Computer Repair Video Conferencing Cookies Drones Google Maps Features Buisness Disaster Trending Telephone Geography Authorization Physical Security Mail Merge Wireless Internet Business Telephone Managed IT Service San Diego Deep Learning IT Budget Retail Cortana Technology Laws 3D Printing VoIP Sponsor Manufacturing Optimization Specifications Fleet Tracking Procurement Touchscreen Techology Security Cameras User Management Cabling Mobile Favorites Mobile VoIP Legislation IT Technicians Test Lenovo Biometric Permissions Nanotechnology Alt Codes Cache Processors Peripheral Transportation Point of Sale High-Speed Internet Office Tips Address Employer/Employee Relationships IT Assessment Break Fix Social Networking Star Wars Statistics Virtual Assistant Vendor SharePoint Staff Cryptocurrency Unsupported Software Digital Virus Obstacle Hard Disk Drives Virtual Machines Black Friday Roanoke — Central Technology Solutions Asset Tracking Update Disaster Resistance Batteries Unified Threat Management Hotspot Cybercrime Conferencing PCI DSS Cyber security Mirgation Hacks Telephony MSP Superfish Projects Gamification Fraud Screen Reader Typing Sync Cyberattacks Law Enforcement Development Zero-Day Threat Proactive Maintenance Digitize Motherboard Best Practice Public Cloud Social Engineering USB Bluetooth Outsource IT Wasting Time Smart Devices Downloads Mobile Data Spyware Course Solid State Drives Credit Cards Cyber Monday technology services provider Botnet OneNote Proactive IT ROI User Error Language Travel Managing Stress Instant Messaging Shortcut Teamwork Migration Tech Terms Return on Investment Smart Tech Mobile Device Managment Software Tips eWaste Read Only Operations Windows 8 Gadget Save Time Cables Backup and Disaster Recovery Virtual Desktop Dark Data Personal Information Firefox Database Management Shadow IT Data Warehousing Automobile Computer Care Safety Laptop Database Sensors Finance Options Holidays Technology Assurance Group ’s 18 Heating/Cooling IT Consulting Notes Computing Infrastructure Identities Enterprise Content Management WannaCry Notifications Shared resources Windows Server 2008 Technology Tips Chatbots GPS Theft Active Directory Multi-Factor Security Wearable Technology Wires Human Error GDPR Outsourcing Microsoft Excel Modem Google Wallet Cost Management E-Commerce Black Market Hacking Remote Working Voice over Internet Protocol CrashOverride Relocation Webcam IT Consultant Regulation Error Students Web Server Hard Disk Drive Cameras Motion Sickness CRM Printers CCTV Emergency Administrator