Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Practical Ways to Make Your Smartphone Distraction-Free

b2ap3_thumbnail_no_distraction_celly_400.jpgMobile devices like smartphones and tablets are marketed as powerful productivity tools. However, some workers may find their device’s time-wasting apps to be more of a distraction than an aid to productivity. What’s a distracted smartphone owner to do?

According to a study by mConceirge, 90 percent of Americans actually use their smartphones for work purposes. This is why many businesses are adopting a Bring Your Own Device strategy so that personal devices can be used safely at work and for work. Unfortunately, not every worker has the willpower to forsake a mobile device’s time-wasting apps. For Jake Knapp, blogger and design partner at Google Venture, the struggle is real.

After spending time fighting a losing battle against the distracting power of his smartphone, Knapp began to look for a way out. He told of his experience on the sharing website Medium:

My iPhone made me twitchy. I could feel it in my pocket, calling me, like the Ring called Bilbo Baggins. It distracted me from my kids. It distracted me from my wife. It distracted me anytime, anywhere. I just didn’t have the willpower to ignore email and Twitter and Instagram and the whole world wide web. Infinity in my pocket was too much.

To remedy this problem, Knapp came up with a simple solution; dumb down his smartphone. According to his logic, if he got rid of the most distracting apps and only kept what’s absolutely essential, his phone would no longer have a hold over him. Here are four helpful tips that Knapp came up with in order to make his smartphone less distracting.

  • Disable Safari (or your phone’s Internet browser). For Knapp (and most of us), the Internet is one of the biggest sources of distraction because it’s, as he puts it, “a limitless universe of, y’know, everything.” Most smartphones don’t give the option to delete its Internet browser. However, you can disable it.
  • Delete the email app. Email on your desktop is distracting enough; having your inbox in your pocket is another level of distraction entirely. It’s the nature of email to not be the most urgent form of communication. For example, if someone truly needs an instant response from you, they would call you. Therefore, we think you can get by just fine by only checking your email on your PC.
  • Delete “infinity” apps. Knapp categorizes infinity apps as the apps that one can spend an “infinite” amount of time using. For example, all things social media and even games have a tendency to grab a hold of our attention and never let go. By deleting the worst time-wasting apps on your phone, you will find yourself spending less time glued to your tiny screen.
  • Only keep the apps that you need. Taking a minimalist approach to your smartphone is the best way to keep the distraction levels to a bare minimum. Accomplish this by only keeping apps that have practical value, like your GPS app, text messaging, calculator, etc. If there’s an app on your device that’s designed to waste time in any way, shape, or form, delete it for a happier, healthier, and more focused you.

Can you identify with Knapp’s smartphone addiction problem? What are some ways that you minimize your smartphone’s hold over your life. Share your thoughts in the comments.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 19 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Phishing Email Efficiency Privacy Google Workplace Tips Computer Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Communication Small Business Mobile Device Smartphones Mobile Devices communications Android Saving Money Business Management Workplace Strategy Smartphone VoIP Managed IT Services Microsoft Office Data Recovery Managed Service Browser Social Media Passwords Upgrade Backup Disaster Recovery Network Tech Term Internet of Things Automation Artificial Intelligence Covid-19 Cloud Computing Remote Server Managed Service Provider Remote Work Windows Facebook Miscellaneous Outsourced IT Gadgets Encryption Spam Employee/Employer Relationship Holiday Windows 10 Information Business Continuity Data Management Government Wi-Fi Productivity Business Technology Windows 10 Blockchain Two-factor Authentication Bandwidth Compliance Virtualization Data Security Current Events Apps Office Managed Services Voice over Internet Protocol Mobile Device Management Chrome Budget Gmail Networking Apple App Vendor Employer-Employee Relationship Applications Computing Information Technology Hacker Access Control Avoiding Downtime Mobile Office Office 365 Conferencing How To BDR Operating System Virtual Private Network Computers Training Risk Management Health Help Desk Website Marketing Analytics Office Tips Healthcare Augmented Reality Retail Storage Password Bring Your Own Device Managed IT Services WiFi AI Big Data HIPAA Router BYOD Windows 11 Cybercrime Customer Service Display Printer Excel Monitoring Paperless Office Infrastructure Tip of the week Remote Workers Document Management IT Support Telephone Firewall Free Resource Scam Data loss Project Management Windows 7 Cooperation The Internet of Things Microsoft 365 Solutions Social Patch Management Save Money Remote Monitoring Going Green Vulnerability End of Support Vendor Management Content Filtering VPN Meetings User Tip Modem Mobile Security YouTube Processor Holidays 2FA Hacking Supply Chain Cryptocurrency Computer Repair Data Storage Presentation Video Conferencing Wireless Technology Managed Services Provider Smart Technology Professional Services Virtual Desktop Virtual Machines Data storage LiFi Saving Time Machine Learning Outlook Managed IT Service Word iPhone Money Humor Downloads Maintenance Data Privacy Vulnerabilities Antivirus Licensing Sports Entertainment Mouse Images 101 Safety Multi-Factor Authentication Mobility Administration Telephone System Cost Management Robot Employees Integration Settings IT Management Printing Customer Relationship Management Wireless Username Virtual Assistant Hosted Solution Network Congestion Surveillance Typing Physical Security Small Businesses Competition Virtual Machine User Error Black Friday Reviews Displays Database Medical IT Knowledge Transportation IT Technicians Google Drive Point of Sale Development Outsourcing Proxy Server Hypervisor Cookies Cyber Monday Network Management Hotspot Tech Support Shopping Optimization User 5G Tactics PowerPoint Workplace Experience Employer/Employee Relationships Mirgation Google Docs Unified Communications Monitors Bitcoin PCI DSS Hiring/Firing Running Cable Nanotechnology Navigation Addiction Language Google Wallet Websites Gig Economy IP Address Paperless Internet Service Provider Co-managed IT Management Teamwork Chatbots Distributed Denial of Service Windows 8 Electronic Medical Records Regulations Compliance Technology Care Laptop SharePoint Screen Reader Evernote Service Level Agreement Computing Infrastructure Drones Memes Business Communications Recovery Writing Net Neutrality Scams Hard Drives SQL Server Lenovo Identity Virtual Reality Financial Data Hybrid Work Domains Halloween Bookmark History Smart Tech Download Server Management Alerts Private Cloud Smartwatch IT Human Resources Procurement Cables Refrigeration Azure Superfish Identity Theft Break Fix Hacks Twitter Telework Public Speaking Scary Stories Browsers Cyber security Connectivity Tech Fun Upload Error CES Lithium-ion battery Communitications Google Apps Deep Learning Social Engineering Supply Chain Management IT Maintenance Social Network Entrepreneur Multi-Factor Security Dark Web Remote Computing FinTech Business Intelligence IoT Term Trends Education IT Assessment Shortcuts Flexibility Ransmoware Undo Customer Resource management Value Regulations Tablet Google Calendar Microsoft Excel Mobile Computing Alert Organization Vendors Data Analysis Star Wars Search Gamification Managed IT Staff File Sharing Digital Security Cameras Dark Data Smart Devices Be Proactive Best Practice How To Remote Working Workforce Memory Social Networking Legislation Notifications Threats Buisness Fileless Malware Data Breach Google Play Application Content Wearable Technology Legal Travel Videos IT solutions Electronic Health Records Workplace Strategies Business Growth Meta Health IT Wasting Time Techology Motherboard Google Maps Comparison Permissions Amazon IBM Directions Trend Micro Assessment Security Cameras Cortana Unified Threat Management Software as a Service Alt Codes Outsource IT Managing Costs Unified Threat Management Specifications Fraud Environment Downtime Microchip eCommerce Media Internet Exlporer SSID

Blog Archive