Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is it Time to Rethink the 8-Hour Workday?

Is it Time to Rethink the 8-Hour Workday?

How many hours a day do you work? Chances are that, as a business owner, you put in more than the average worker. Your team might put in the requisite eight hours, but you might find yourself putting in more. After all, working more hours means more productivity, right? Well… wrong. A recent study shows that eight hours of work, while revolutionary 200 years ago, is still too long to expect good work from your employees.

To understand this shift, let’s look to the origin of the eight-hour workday. The Industrial Revolution gave birth to a shorter, more productive workday. It all started with a Welsh activist named Robert Owen, who in 1817 argued for “Eight hours labor, eight hours recreation, eight hours rest.” It seemed like a radical idea at the time. Workdays often exceeded 12 hours, and lasted for as long as 16 hours or longer. However, the Ford Motor Company in the early 20th century revolutionized the workplace with the implementation of the eight-hour workday, while also doubling wages.

As you might imagine, the increased productivity that this resulted in was immense, and significantly improved both work ethic and working conditions. Just think about how today’s workplace can learn from this development. A study, which analyzed 2,000 full-time office workers, indicates that your employees might only be productive for as few as three hours a day. This might be shocking to hear, but when you consider how many distractions are in the office, you shouldn't be surprised. Here are some of the distractions that the study found were most prominent:

  • Reading news websites: 1 hour 5 min
  • Checking social media: 44 min
  • Discussing non-work-related things with coworkers: 40 min
  • Searching for new jobs: 26 min
  • Taking smoke breaks: 23 min
  • Making calls to partners/friends: 18 min
  • Making hot drinks: 17 min
  • Texting or instant messaging: 14 min
  • Eating snacks: 8 min
  • Making food in office: 7 min

Of course, some of these distractions could easily be removed through use of a content filtering system on your network. This can block access to time-wasting or inappropriate websites like Facebook, Twitter, BuzzFeed, those that host pornography, and many others, with the primary goal of retaining productivity and ensuring that your employees don’t visit potentially dangerous websites.

Would the world benefit from cutting the workday once again to achieve a higher level of productivity and worker satisfaction? Who knows; but the least you can do is implement a content filtering solution to keep your team focused. To learn more, reach out to us at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 22 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Microsoft Productivity Quick Tips Passwords Saving Money Communication Cybersecurity AI Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Network Current Events Tech Term Internet of Things Remote Holiday Automation Artificial Intelligence Facebook Information Miscellaneous Training Compliance Covid-19 Gadgets Cloud Computing Server Managed Service Provider Outsourced IT Remote Work IT Support Employee/Employer Relationship Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Blockchain Bandwidth Virtualization Managed Services Two-factor Authentication Mobile Office Vendor Data Security Apps Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Apple Networking App Employer-Employee Relationship BYOD Computing Physical Security Hacker Conferencing Information Technology Avoiding Downtime Marketing Access Control Office 365 HIPAA Managed IT Services Applications How To BDR Computers Virtual Private Network Risk Management Healthcare Website Health Office Tips Analytics Augmented Reality Retail Storage Password Bring Your Own Device Router Big Data 2FA Help Desk Operating System Managed IT Service Remote Workers Display Printer Telephone Paperless Office Infrastructure Cooperation Free Resource Project Management Windows 7 Firewall Document Management Microsoft 365 Solutions The Internet of Things Scam Data loss Social Going Green Patch Management Windows 11 Save Money Remote Monitoring Monitoring Vulnerability End of Support Vendor Management Customer Service Cybercrime Excel Professional Services Presentation VPN YouTube Meetings Saving Time Virtual Machines Cryptocurrency Wireless Technology Computer Repair Downloads iPhone Virtual Desktop Licensing Data storage LiFi Vulnerabilities Word Entertainment Data Privacy Outlook Machine Learning Money Images 101 Humor Telephone System Multi-Factor Authentication Mobility Cost Management Safety Maintenance Antivirus Sports Mouse Employees Integration Administration User Tip Modem Mobile Security Processor Robot Holidays Customer Relationship Management Settings Data Storage Smart Technology Supply Chain Printing Wireless Content Filtering Video Conferencing Hacking IT Management Managed Services Provider Distributed Denial of Service Workplace Gig Economy Network Congestion Screen Reader Knowledge Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Google Drive User Error User Regulations Compliance Identity Evernote Paperless Co-managed IT Point of Sale Bookmark 5G Smart Tech Memes Experience Download Net Neutrality Alerts SQL Server Technology Care IP Address Google Docs Unified Communications Bitcoin Network Management Running Cable Tech Support Financial Data History Business Communications Break Fix Scams Google Wallet Browsers Smartwatch Monitors Connectivity IT Upload Procurement Azure Hybrid Work Recovery Hard Drives Windows 8 Laptop Websites Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Dark Web Cables Domains Drones CES IoT Communitications Electronic Medical Records Trends Supply Chain Management SharePoint Refrigeration Halloween Customer Resource management FinTech Regulations Google Calendar Term Google Apps Microsoft Excel IT Maintenance Public Speaking Lenovo Data Analysis Writing Star Wars IT Assessment Virtual Reality Gamification Flexibility Staff Value Business Intelligence Lithium-ion battery Hacks Server Management Entrepreneur Scary Stories Private Cloud Organization Social Networking Legislation Shortcuts Ransmoware Superfish Identity Theft Fileless Malware Digital Security Cameras Fun Smart Devices Twitter Content Remote Working Wearable Technology Memory Vendors Deep Learning Undo Error Health IT Motherboard Data Breach Comparison Google Play Be Proactive Permissions Workforce Education Directions Videos Social Engineering Assessment Electronic Health Records Remote Computing Wasting Time Threats Mobile Computing Trend Micro Specifications Security Cameras Workplace Strategies Fraud Meta Tablet Microchip Search Internet Exlporer Software as a Service Alert Username Managing Costs Amazon Application Best Practice Managed IT Buisness File Sharing Dark Data eCommerce Black Friday SSID Virtual Assistant Outsource IT IBM Legal IT solutions How To Database Surveillance Notifications IT Technicians Virtual Machine Environment Media Business Growth Travel Proxy Server Reviews Cookies Cyber Monday Medical IT Tactics Development Hotspot Transportation Small Businesses Techology Google Maps Cortana Alt Codes Mirgation Hypervisor Displays PowerPoint Competition Downtime Unified Threat Management Shopping Nanotechnology Optimization Addiction Language Employer/Employee Relationships Outsourcing Unified Threat Management Hosted Solution Typing Management PCI DSS Chatbots Navigation

Blog Archive