Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk--and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn't started yet, you'll figure you haven't missed anything, so you'll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who've sat around waiting for you will figure they have better uses for their time, and next time they'll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year--when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with Total Tech Care about this, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 29 March 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications IT Support Smartphones Business Continuity Communication Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Business Management Users Windows Managed IT Services Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Windows 10 Passwords Chrome Virtualization Gadgets Saving Money Holiday Social Media Tech Term Managed IT Services Automation Managed Service Microsoft Office Computers Artificial Intelligence Facebook Operating System Cybercrime Internet of Things Wi-Fi BYOD Mobile Device Management Networking IT Support Health Hacking Remote Spam Alert Office 365 Telephone Systems Covid-19 Information Technology Information Managed Service Provider BDR Bandwidth Recovery Employer-Employee Relationship Router Social Engineering Mobility Law Enforcement Remote Monitoring Data Breach Mobile Computing Password Money Application App History Encryption Applications Big Data Human Resources Remote Computing Private Cloud Mobile Office Managed IT Apps Blockchain Office Tips Training Paperless Office How To VPN Government Data Storage Patch Management Vulnerability Windows 7 Word Mouse HaaS Flexibility Marketing WiFi Servers Bring Your Own Device IT solutions Data Management Entertainment Work/Life Balance Website Budget Data Security Wireless Gmail Google Drive Settings Infrastructure Voice over Internet Protocol Two-factor Authentication Avoiding Downtime Apple Scam Social Data Protection User Error Save Time Meetings Vendor Management Vendor Managed Services Cleaning Display Risk Management USB Hacker End of Support The Internet of Things Staff Software as a Service Employee/Employer Relationship Telephone System Education Physical Security Lithium-ion battery RMM Machine Learning Safety Connectivity Remote Work HIPAA Sports Redundancy Firewall Keyboard Virtual Reality Conferencing Fraud Procurement Business Intelligence Virus Remote Worker Workplace Strategy Net Neutrality Network Congestion eWaste Document Management Audit Unified Threat Management Worker Help Desk Solid State Drive IT Management Cryptocurrency Wireless Technology Computer Accessories Downtime Printing How to Botnet IT Plan Data storage Comparison Wearable Technology Automobile Managed Services Provider Hard Drives Printer CES Retail Unsupported Software Bluetooth Instant Messaging Database Robot Computing Infrastructure Excel Charger Going Green Content Management Remote Workers Business Technology Biometrics Access Control Compliance Virtual Desktop OneNote Computer Care Processor Current Events Virtual Assistant Battery IT Consultant Telephony Authentication Hard Drive DDoS Shadow IT Samsung Legal SharePoint Humor Internet Exlporer Value Computing Update Spam Blocking Electronic Medical Records Customer Service PDF Environment Google Docs Hiring/Firing Identity Theft Fax Server Proactive IT Digital Signage Best Practice SaaS YouTube Augmented Reality Black Market Business Owner Tools Search Engine Twitter AI IT Infrastructure Television Business Mangement Bing IaaS Maintenance NIST FinTech NarrowBand Bloatware PowerPoint Smart Tech Social Network Windows Media Player Trending Search User iPhone Addiction Amazon Investment Public Computer Recycling Employee/Employer Relationships Employees Tablets Managing Stress Regulations Wiring Windows 365 Entrepreneur Practices Transportation ISP Files Computer Fan Cache Video Conferencing Rootkit Amazon Web Services ROI Cameras Criminal Bitcoin Shortcuts Shortcut Safe Mode Sales Chromecast GDPR Point of Sale Cost Management Workers Hosted Computing Personal Benefits Cryptomining Social Networking Colocation FENG Wireless Internet Supply Chain Management Uninterrupted Power Supply Online Shopping IBM Batteries File Sharing Monitoring Flash Camera Windows 8.1 Monitor Inventory Digitize Smart Technology Specifications Running Cable Wire Evernote Windows Server 2008 R2 Memory Printer Server Supercomputer Travel Software Tips Customer relationships Sync Printers Email Best Practices Reputation Emails IT Assessment Streaming Media Millennials Manufacturing Content Smart Office Tech Support Wireless Charging Computer Tips Laptop Managed IT Service Security Cameras Techology Virtual Private Network Virtual CIO Customers Netflix OneDrive Two Factor Authentication Workforce Biometric Security Audiobook Root Cause Analysis Peripheral Science Cables Digital Security Cameras Touchpad Knowledge Using Data Music HBO Skype Project Management Nanotechnology Copiers Telecommuting 5G Distributed Denial of Service Politics Customer Relationship Management Advertising Data loss Quick Tip Cortana Outlook Ergonomics Analyitcs Leadership Digital Signature Troubleshooting Smartwatch Start Menu Warranty Programming Development Notifications OLED Loyalty Google Apps Virtual Machine Consultant Screen Mirroring HVAC PCI DSS Frequently Asked Questions 2FA Analytics Analysis Fiber Optics Books Employee Antivirus Mobile Administrator Relocation Windows 10s Devices Messaging Cabling Hypervisor Best Available Cast Enterprise Content Management Policy Windows 8 Tip of the week MSP Dark mode webinar Accountants Trend Micro Emergency IT service Video Games WIndows 7 Worker Commute Professional Services Microchip Public Cloud Thought Leadership SMS Employer Employee Relationship Credit Cards Default App Assessment Password Manager Saving Time Experience Password Management Procedure Tablet Windows Server 2008 dark theme Shopping Multi-Factor Security Google Search Domains Scalability

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code