Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is it Time to Rethink the 8-Hour Workday?

Is it Time to Rethink the 8-Hour Workday?

How many hours a day do you work? Chances are that, as a business owner, you put in more than the average worker. Your team might put in the requisite eight hours, but you might find yourself putting in more. After all, working more hours means more productivity, right? Well… wrong. A recent study shows that eight hours of work, while revolutionary 200 years ago, is still too long to expect good work from your employees.

To understand this shift, let’s look to the origin of the eight-hour workday. The Industrial Revolution gave birth to a shorter, more productive workday. It all started with a Welsh activist named Robert Owen, who in 1817 argued for “Eight hours labor, eight hours recreation, eight hours rest.” It seemed like a radical idea at the time. Workdays often exceeded 12 hours, and lasted for as long as 16 hours or longer. However, the Ford Motor Company in the early 20th century revolutionized the workplace with the implementation of the eight-hour workday, while also doubling wages.

As you might imagine, the increased productivity that this resulted in was immense, and significantly improved both work ethic and working conditions. Just think about how today’s workplace can learn from this development. A study, which analyzed 2,000 full-time office workers, indicates that your employees might only be productive for as few as three hours a day. This might be shocking to hear, but when you consider how many distractions are in the office, you shouldn't be surprised. Here are some of the distractions that the study found were most prominent:

  • Reading news websites: 1 hour 5 min
  • Checking social media: 44 min
  • Discussing non-work-related things with coworkers: 40 min
  • Searching for new jobs: 26 min
  • Taking smoke breaks: 23 min
  • Making calls to partners/friends: 18 min
  • Making hot drinks: 17 min
  • Texting or instant messaging: 14 min
  • Eating snacks: 8 min
  • Making food in office: 7 min

Of course, some of these distractions could easily be removed through use of a content filtering system on your network. This can block access to time-wasting or inappropriate websites like Facebook, Twitter, BuzzFeed, those that host pornography, and many others, with the primary goal of retaining productivity and ensuring that your employees don’t visit potentially dangerous websites.

Would the world benefit from cutting the workday once again to achieve a higher level of productivity and worker satisfaction? Who knows; but the least you can do is implement a content filtering solution to keep your team focused. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 14 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Communication Cybersecurity Saving Money Smartphone Managed Service Data Backup Android Upgrade Business Management VoIP Smartphones Data Recovery AI Disaster Recovery Mobile Devices communications Windows Browser Social Media Managed IT Services Microsoft Office Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Automation Artificial Intelligence Information Holiday Training Gadgets Cloud Computing Covid-19 Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship Encryption Spam IT Support Windows 10 Office Business Continuity Government Data Management Virtualization Business Technology Wi-Fi Blockchain Windows 10 Bandwidth Vendor Apps Two-factor Authentication Mobile Office Data Security Apple App Employer-Employee Relationship Tip of the week Managed Services Voice over Internet Protocol Networking Mobile Device Management Chrome Gmail BYOD Budget Applications WiFi Access Control Conferencing Computing Hacker Information Technology Avoiding Downtime How To Marketing BDR Office 365 HIPAA Router Storage Password Virtual Private Network Bring Your Own Device Big Data Health 2FA Help Desk Operating System Retail Computers Healthcare Risk Management Managed IT Services Website Analytics Office Tips Augmented Reality Physical Security The Internet of Things Display Printer Paperless Office Windows 11 Social Infrastructure Monitoring Going Green Excel Document Management Customer Service Cybercrime Remote Workers Telephone Scam Data loss Cooperation Free Resource Project Management Windows 7 Patch Management Save Money Microsoft 365 Firewall Remote Monitoring Vulnerability End of Support Vendor Management Solutions Employees VPN Meetings Safety Sports Integration Mouse User Tip Modem Processor Computer Repair Mobile Security Administration Holidays Data Storage Supply Chain Smart Technology Video Conferencing Managed Services Provider Machine Learning Customer Relationship Management Settings Saving Time Virtual Machines Professional Services Printing Wireless Content Filtering Managed IT Service Hacking Presentation YouTube Maintenance Downloads Antivirus iPhone Cryptocurrency Wireless Technology Licensing Entertainment Vulnerabilities Virtual Desktop Data Privacy Data storage LiFi Images 101 Word Multi-Factor Authentication Outlook Robot Mobility Telephone System Cost Management Money Humor IT Management Trend Micro Workplace Strategies Network Congestion Specifications Security Cameras Deep Learning User Error Microchip Software as a Service Internet Exlporer Meta Fraud Undo Managing Costs Amazon Education Username eCommerce Point of Sale Black Friday SSID Surveillance Database Outsource IT Virtual Assistant Mobile Computing Virtual Machine Environment Tech Support IT Technicians Media Search Network Management Reviews Proxy Server Cookies Monitors Cyber Monday Medical IT Application Best Practice Buisness Development Tactics Small Businesses Hotspot Transportation Hypervisor Displays Websites Mirgation IBM Legal IT solutions Shopping Optimization Nanotechnology PowerPoint Business Growth SharePoint Addiction Outsourcing Electronic Medical Records Language Employer/Employee Relationships Chatbots Navigation Cortana PCI DSS Management Gig Economy Lenovo Screen Reader Workplace Writing Distributed Denial of Service Alt Codes Competition Downtime Internet Service Provider Service Level Agreement Hiring/Firing Virtual Reality Computing Infrastructure Teamwork Private Cloud Identity Paperless Evernote Hosted Solution Regulations Compliance Server Management Superfish Bookmark Memes Identity Theft Smart Tech Co-managed IT Typing Net Neutrality Download Technology Care Twitter Alerts SQL Server History Error Google Drive Business Communications User Knowledge Financial Data Smartwatch Browsers IT Connectivity Scams Social Engineering Break Fix 5G Procurement Upload Hybrid Work Remote Computing Azure Cyber security IP Address Google Docs Human Resources Multi-Factor Security Tech Unified Communications Experience Telework Social Network Running Cable CES Communitications Tablet IoT Cables Dark Web Bitcoin Google Wallet Supply Chain Management Trends Alert File Sharing Regulations Google Apps Dark Data Google Calendar Term Recovery FinTech Managed IT Customer Resource management Laptop Data Analysis IT Assessment Star Wars IT Maintenance How To Microsoft Excel Hard Drives Windows 8 Domains Drones Flexibility Gamification Business Intelligence Notifications Staff Value Travel Social Networking Shortcuts Legislation Organization Halloween Digital Security Cameras Techology Fileless Malware Smart Devices Google Maps Ransmoware Refrigeration Public Speaking Remote Working Content Vendors Wearable Technology Memory Health IT Data Breach Unified Threat Management Motherboard Lithium-ion battery Be Proactive Comparison Google Play Entrepreneur Scary Stories Videos Unified Threat Management Directions Electronic Health Records Assessment Workforce Permissions Hacks Wasting Time Threats Fun

Blog Archive