Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Tech Hacks to Reclaim an Hour of Your Day

5 Tech Hacks to Reclaim an Hour of Your Day

We can probably all agree that there’s a big difference between “staying busy” and “looking busy,” and that the first option is generally the better one in the workplace. The big difference is how productive you actually are.

Let’s go over some simple-to-implement ways you can help your team boost their productivity without even thinking about it.

Why Doesn’t “Busy” Always Mean “Productive?”

We’ve all been there—schedules or to-do lists longer than the most deranged coffee order. Sometimes, it seems that the busier one is, the better off they are.

However, being consistently busy can foster many less-than-productive habits, defeating the purpose of taking on so many tasks in the first place. It doesn’t matter how much pressure you’re producing under if what you’re making isn’t of a requisite quality, or if your output doesn’t actually increase.

Fortunately, the opposite is also true: by adopting productive habits and tools into our daily tasks, more can be accomplished without the pressure that being “busy” inherently brings. It’s the practical application of work smarter, not harder.

5 Simple Tricks to Boost Actual Productivity

It’s a lot easier than you’d think to shift from “busy” work to “productive” work. For instance:

Learn Your Keyboard Shortcuts

Did you know that the modern QWERTY keyboard, designed back in 1870, was initially designed to slow typists down

The mechanical typewriter tended to jam up if its keys were pressed too quickly. The first version of the QWERTY layout (or QWE.TY, at the time) was initially developed by inventor Christopher Laytham Sholes, printer Samuel W. Soule (replaced by financier James Densmore after Soule’s departure), and mechanic Carlos S. Glidden to solve this very issue. Upon its purchase by arms manufacturer E. Remington and Sons in 1873, the layout was tweaked to become the QWERTY keyboard we know and use today.

This revision was primarily for marketing purposes, as it allowed users to type "TYPEWRITER" using only the top row of keys.

Knowing this history, it seems somewhat ironic that we now implement special key combinations to speed up various tasks, from formatting the text we type (Ctrl+I was used a few times when composing this very article, including just then, wherever you see italics) to interacting with different programs, like reopening a prematurely-closed browser tab via Ctrl+Shift+T.

There are far, far too many to list here in their entirety, so we recommend identifying which will be most helpful for your most frequent workplace tasks.

Apply Rules to Your Inbox

Email, whether you use Outlook or Gmail, can be a real time sink to keep organized, unless you implement rules that automatically sort different messages on your behalf. In Gmail, this is as simple as clicking the Gear icon to open your Quick Settings, selecting See all settings, and navigating to Filters and Blocked Addresses to create all the filters you need.

In Outlook, you can create these kinds of rules by right-clicking an existing message, hovering over the Rules option, and selecting Create rule when the option pops up

By creating some thoughtful and strategic filters and rules, you can easily clean up your inbox to make it much more user-friendly..

Use a Password Manager

Passwords are hard to remember, by design, and if you’re abiding by accepted password best practices as you should be, you’ll have a frankly ludicrous number to memorize. This is precisely where a password manager shows its value.

A password manager is essentially an encrypted vault that securely stores all your existing passwords for you, protected behind a single master password—the only one you need to remember. Let’s be clear: this is the only secure method of writing down your passwords, and even then, you need to be selective about the password manager you use. The one built into your web browser won’t suffice.

Schedule Time for Deep Focus

Modern operating systems are designed to help users stay focused on their tasks, especially when they intend to dive into their work fully for a set period. Built-in features will silence notifications for this duration, minimizing the chance of an errant alert pulling their attention away from their task.

Similarly, many collaboration tools allow users to set a status so that their coworkers can see how receptive they are to messages at a given time. It’s a great way to manage expectations about when a response may be expected, or even whether a message is necessary at the moment.

Embrace the Cloud’s Capabilities

One of the most effective ways to kill productivity is to have your team members all working separately on the same project. Instead of maintaining multiple users’ versions and renaming these files to things like “Expected-Inventory-Changes-v2-v6-FINAL-use-this-one-FINAL-FINAL-Susan-version-THIS-ONE,” cloud platforms allow all your users to work collaboratively on a single document, complete with saved past versions and records of who changed what and when.

We Can Help You Introduce These Habits, and More!

While these tricks are certainly handy, they will only provide their real value if they become your standard operations. This means you also need a technology infrastructure built to support these processes.

Voyage Technology can help with all of the above, from maintaining the hardware and software your business relies on to supporting your team with all of their technology questions and needs. Just imagine how much time having someone to turn to for help can save!

Or, if you’d rather experience these time savings and productivity boosts for yourself, give us a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet IT Support Malware Privacy Google Email Computer Workplace Tips Phishing IT Services Hosted Solutions Collaboration Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Cybersecurity Microsoft Communication Passwords Data Backup Saving Money Backup Smartphone Android Managed Service Business Management VoIP Smartphones Upgrade Mobile Devices communications Disaster Recovery Browser Data Recovery Social Media Microsoft Office Windows Managed IT Services Productivity Current Events Tech Term Network AI Remote Internet of Things Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 Holiday Managed Service Provider Miscellaneous Remote Work Server Outsourced IT Information Compliance Encryption Spam Training Employee/Employer Relationship Windows 10 Office Data Management Business Continuity Government Business Technology IT Support Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Gmail Managed Services Voice over Internet Protocol Budget Apple Networking App Employer-Employee Relationship BYOD Marketing Access Control Office 365 Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Avoiding Downtime Website Health Help Desk Office Tips Analytics Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services Big Data Operating System Computers Router Virtual Private Network Risk Management Paperless Office Windows 11 Infrastructure Monitoring 2FA Excel Firewall Document Management Remote Workers Telephone The Internet of Things Scam Data loss Social Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Vulnerability End of Support Vendor Management Solutions Customer Service Cybercrime Physical Security Display Printer Virtual Desktop Holidays Data storage LiFi Data Storage Word Smart Technology Supply Chain Outlook Video Conferencing Machine Learning Managed Services Provider Money Saving Time Virtual Machines Professional Services Humor Managed IT Service Maintenance Safety Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Data Privacy Images 101 Telephone System Multi-Factor Authentication Robot Mobility Customer Relationship Management Cost Management Settings Printing Wireless Content Filtering Hacking IT Management Presentation VPN Employees YouTube Meetings Integration Cryptocurrency Wireless Technology User Tip Modem Computer Repair Mobile Security Processor Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Hotspot Transportation Small Businesses Recovery Tactics Development Hard Drives Windows 8 Laptop Websites Mirgation Hypervisor Displays Domains Drones Shopping Nanotechnology Optimization PowerPoint Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Addiction Refrigeration Management PCI DSS Halloween Chatbots Navigation Public Speaking Lenovo Gig Economy Screen Reader Writing Distributed Denial of Service Workplace Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Lithium-ion battery Hacks Server Management Regulations Compliance Entrepreneur Scary Stories Private Cloud Identity Evernote Paperless Fun Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Twitter Alerts SQL Server Technology Care Undo Financial Data Error History Business Communications Social Engineering Break Fix Scams Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Search Dark Web Cables CES Tablet IoT Communitications Application Best Practice Trends Supply Chain Management Alert Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term Google Apps How To Microsoft Excel IT Maintenance IBM Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Organization Travel Social Networking Legislation Shortcuts Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Vendors Competition Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time Threats Trend Micro Network Congestion Specifications Security Cameras Workplace Strategies Knowledge Fraud Meta Google Drive User Error Microchip User Internet Exlporer Software as a Service Username Managing Costs Amazon Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Outsource IT IP Address Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment Media

Blog Archive