Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk--and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn't started yet, you'll figure you haven't missed anything, so you'll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who've sat around waiting for you will figure they have better uses for their time, and next time they'll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year--when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with Total Tech Care about this, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Business Continuity Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Phishing Windows Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Virtualization Tech Term Saving Money Holiday Social Media Gadgets Chrome Automation Managed IT Services Microsoft Office Managed Service Computers Facebook Operating System Cybercrime Artificial Intelligence BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Health Wi-Fi Spam Office 365 Remote Telephone Systems Information Technology Managed Service Provider Covid-19 Information Alert Bandwidth Router BDR Social Engineering Mobility Recovery Employer-Employee Relationship Money Mobile Computing Remote Monitoring Encryption Applications Application Data Breach App History Law Enforcement Big Data Human Resources Password Apps Mobile Office Data Storage Patch Management Office Tips Government Training Blockchain Paperless Office VPN Private Cloud Managed IT How To Remote Computing Marketing Mouse WiFi HaaS IT solutions Entertainment Vulnerability Website Budget Windows 7 Word Google Drive Servers Wireless Avoiding Downtime Gmail Data Security Settings Bring Your Own Device Two-factor Authentication Infrastructure Data Management Flexibility Work/Life Balance Voice over Internet Protocol Social User Error End of Support Conferencing Meetings Education Physical Security Data Protection Safety Scam USB HIPAA Sports Redundancy Risk Management Keyboard Hacker Vendor Management The Internet of Things Lithium-ion battery Vendor Managed Services Telephone System Staff Software as a Service Display Machine Learning Save Time Remote Work Firewall Connectivity Employee/Employer Relationship Virtual Reality RMM Apple Cleaning Hiring/Firing Network Congestion eWaste Augmented Reality Fraud Battery Remote Worker Printer Shadow IT Digital Signage Bluetooth Legal Cryptocurrency Wearable Technology Business Intelligence Internet Exlporer Hard Drives Retail Instant Messaging Audit Procurement Worker Workplace Strategy Robot IT Management PDF Excel Comparison Net Neutrality IT Consultant Botnet Biometrics CES Help Desk Virtual Desktop IT Plan Printing Proactive IT Humor Business Technology Content Management Best Practice DDoS Unsupported Software Access Control YouTube Black Market Managed Services Provider SharePoint Virtual Assistant Charger Authentication Database Compliance Document Management OneNote Remote Workers Computer Care Customer Service Solid State Drive Current Events Wireless Technology How to Environment Downtime Processor Telephony Samsung Update Fax Server Data storage Hard Drive Automobile Virus Value Google Docs Identity Theft SaaS Unified Threat Management Spam Blocking Electronic Medical Records Computer Accessories Computing Infrastructure Computing Going Green Mobile Password Management PCI DSS Bloatware Windows 10s Reputation Password Manager Virtual Machine Streaming Media Content 2FA Cameras Cast Fiber Optics Tech Support Multi-Factor Security Employee webinar Laptop Cabling Emergency Search Engine Tip of the week Techology Twitter Messaging Tablets Professional Services NIST Policy Entrepreneur Public Cloud Customers Business Mangement Hypervisor Employer Employee Relationship Audiobook Dark mode Smart Tech Trend Micro Assessment Trending Touchpad Amazon Default App Shortcut Windows Server 2008 Addiction SMS Tools Procedure Cost Management Recycling Saving Time Politics Wiring dark theme Printer Server Social Networking Advertising Practices Shopping Television Google Search Amazon Web Services IT Infrastructure Cache AI Safe Mode FinTech Criminal Notifications Bing Running Cable GDPR Hosted Computing Social Network Public Computer Memory Online Shopping Investment Transportation Regulations Wireless Internet File Sharing Employees Computer Fan Relocation Employee/Employer Relationships Rootkit Camera Windows 365 Inventory Specifications ISP Workers Evernote ROI Benefits Video Games Wire Video Conferencing Worker Commute Sales FENG Bitcoin Travel Shortcuts Experience Printers Point of Sale Personal Science IBM Millennials Cryptomining Wireless Charging Smart Technology Flash Scalability Smart Office Supply Chain Management Consultant Business Owner Monitoring Batteries Distributed Denial of Service Virtual Private Network Windows 8.1 Analytics Customer Relationship Management Software Tips Digitize Supercomputer NarrowBand Workforce Analyitcs Emails Cables Windows Server 2008 R2 Sync Search Best Available Customer relationships Programming iPhone WIndows 7 Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Netflix Cortana Two Factor Authentication Antivirus Computer Tips Root Cause Analysis Files Digital Signature Managed IT Service Security Cameras Chromecast Biometric Security Music Warranty Virtual CIO HBO OneDrive Windows 8 Knowledge Skype HVAC Peripheral Google Apps IT service Digital Security Cameras Data loss Colocation Analysis Using Data Uninterrupted Power Supply Leadership 5G Troubleshooting User Administrator PowerPoint Outlook Devices Copiers Windows Media Player Tablet Start Menu Enterprise Content Management Quick Tip Monitor Domains MSP Ergonomics Screen Mirroring Accountants Loyalty Smartwatch Credit Cards OLED Books Managing Stress IaaS Microchip Maintenance Frequently Asked Questions Thought Leadership Development

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code