Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Unnecessary Meetings are a More Serious Problem Than You’d Think

Unnecessary Meetings are a More Serious Problem Than You’d Think

Anyone who has spent a considerable amount of time in a professional occupation knows that meetings come with the territory. After all, running a business requires a lot of coordination, communication, and teamwork, and meetings are opportunities for employees to gather and discuss important business-related ideas. However, the amount of time wasted and misused on unnecessary meetings is a topic of concern.

A recent report from Asana, the Anatomy of Work global index, details just how much time businesses spend on meetings and other minutiae, which the report titles “work about work.” If you think about it, this phrase makes a lot of sense. Meetings are often about work, but there is no work actually being done in them. The report in question asked 9,615 knowledge workers from the United States, UK, Australia, France, Germany, and Japan what issues crop up which prevent them from getting work done.

These workers reported that, on average, they spent 58% of their workdays on “work about work”, 33% of their days on skilled work, and 9% of their days on strategic work.

We’d like you to ask yourself, “Is this why I hired my employees? So they can spend the majority of their time in meetings, not getting work done?”

It’s a hard reality to grasp, especially because organization is key to a lot of business’ success. Asana defines “work about work” as any activities other than the skilled work you were hired to do. For example, if you have a sales analyst who is stuck in endless logistics meetings rather than talking to prospective customers, or a programmer who hasn’t touched code in three days because they are stuck in planning meetings, there’s “work about work” involved.

To break these numbers down a bit more, consider the following statistics:

  • Executives spend 3.6 hours per week on average in unnecessary meetings.
  • Knowledge workers spend 2.8 hours per week on average in unnecessary meetings.
  • Executives are 30% more likely to miss a deadline than the average worker due to phone or video meetings.
  • 32% of workers claim that video calls take up more time than they did one year ago.
  • 22% of workers claim that audio calls take up more time than they did one year ago.

So, how would you like to reclaim all of that lost time?

Obviously meetings aren’t going to go away—that’s just part of running a business, unfortunately—but you can strategically use technology solutions to streamline them and make them less of a drain on your resources. To help your team collaborate and communicate more effectively so that work about work doesn’t consume their workdays, we recommend you contact Voyage Technology to discuss how technology solutions can make meetings go more smoothly and efficiently. To learn more, call us today at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 27 April 2024

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Business Computing Best Practices Productivity Data Software Hackers Business Innovation Network Security Cloud IT Support Hardware Internet User Tips Malware Email Phishing Efficiency Workplace Tips Computer Privacy Google Collaboration Hosted Solutions IT Services Users Cybersecurity Quick Tips Ransomware Data Backup Microsoft Small Business Communication Mobile Device Smartphones Business Management Mobile Devices communications Android Workplace Strategy Saving Money Smartphone VoIP Managed IT Services Managed Service Microsoft Office Data Recovery Browser Social Media Passwords Upgrade Network Backup Disaster Recovery Tech Term Internet of Things Automation Artificial Intelligence Cloud Computing Covid-19 Remote Remote Work Server Managed Service Provider Facebook Miscellaneous Windows Encryption Gadgets Spam Outsourced IT Information Holiday Employee/Employer Relationship Windows 10 Government Business Continuity Data Management Current Events Blockchain Wi-Fi Productivity Business Technology Windows 10 Virtualization Data Security Apps Two-factor Authentication Bandwidth Compliance App Employer-Employee Relationship Vendor Office Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking How To BDR Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Mobile Office Conferencing WiFi Big Data AI Operating System BYOD HIPAA Router Virtual Private Network Risk Management Training Computers Health Help Desk Analytics Website Office Tips Marketing Augmented Reality Retail Storage Healthcare Password Bring Your Own Device Managed IT Services The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Customer Service Display Printer Paperless Office Windows 11 Infrastructure Monitoring Excel IT Support Tip of the week Document Management Remote Workers Firewall Telephone Scam Data loss Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency Hacking User Tip Modem Processor Presentation Computer Repair Mobile Security Virtual Desktop Holidays Data storage LiFi Wireless Technology 2FA Data Storage Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Virtual Machines Professional Services Money Saving Time Humor Word Managed IT Service Maintenance Downloads Antivirus Sports iPhone Mouse Licensing Safety Administration Vulnerabilities Entertainment Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Application Google Maps Smart Devices Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working IBM Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Typing Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Competition Knowledge Physical Security Fraud Meta Google Drive User Error Microchip Username Managing Costs Amazon 5G Black Friday SSID Point of Sale eCommerce Google Docs Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment User Media Cookies Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Tactics Development Hotspot Transportation Small Businesses Windows 8 IP Address Laptop Websites Mirgation Hypervisor Displays Nanotechnology Optimization PowerPoint Drones Shopping SharePoint Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Halloween Chatbots Recovery Screen Reader Hard Drives Writing Distributed Denial of Service Workplace Lenovo Gig Economy Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Identity Theft Smart Tech Memes Refrigeration Fun Co-managed IT Superfish Bookmark Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Business Communications Financial Data Lithium-ion battery Error History Education Connectivity IT Social Engineering Break Fix Scams Entrepreneur Browsers Smartwatch Upload Procurement Remote Computing Azure Hybrid Work Multi-Factor Security Tech Human Resources Mobile Computing Social Network Telework Cyber security Tablet IoT Communitications Undo Search Dark Web Cables CES

Blog Archive