Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk--and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn't started yet, you'll figure you haven't missed anything, so you'll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who've sat around waiting for you will figure they have better uses for their time, and next time they'll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year--when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with Total Tech Care about this, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones IT Support Business Continuity Communication Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Windows Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Cloud Computing Data Recovery Windows 10 Passwords Saving Money Holiday Gadgets Social Media Tech Term Chrome Virtualization Automation Managed Service Microsoft Office Managed IT Services Facebook Artificial Intelligence Cybercrime Operating System Computers Mobile Device Management Networking Wi-Fi IT Support Health Hacking BYOD Internet of Things Covid-19 Information Information Technology Alert Managed Service Provider Spam Remote Office 365 Telephone Systems Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router BDR Data Breach Password Human Resources Money Big Data Encryption Applications Remote Monitoring Mobile Computing Law Enforcement App History Application Training Managed IT VPN Apps Remote Computing How To Mobile Office Data Storage Patch Management Government Blockchain Paperless Office Office Tips Private Cloud Servers Gmail Bring Your Own Device Infrastructure Settings Data Management Voice over Internet Protocol Work/Life Balance Data Security Two-factor Authentication Mouse HaaS Google Drive Flexibility Marketing WiFi Vulnerability IT solutions Avoiding Downtime Entertainment Website Windows 7 Word Budget Wireless Machine Learning The Internet of Things Lithium-ion battery Save Time Connectivity Remote Work Vendor Management Employee/Employer Relationship RMM Cleaning Firewall Virtual Reality End of Support Apple Education Physical Security Data Protection Social Safety HIPAA User Error Sports Redundancy Meetings Keyboard Conferencing Scam Vendor Risk Management Hacker USB Managed Services Software as a Service Telephone System Display Staff DDoS Wireless Technology Botnet Solid State Drive Processor How to Downtime IT Plan IT Consultant Update SharePoint Hard Drive Data storage Unsupported Software Humor Google Docs Automobile Identity Theft Customer Service Charger Environment Computing Compliance Computing Infrastructure Going Green Fax Server OneNote Computer Care Current Events Augmented Reality Telephony SaaS Fraud Samsung Battery Remote Worker Digital Signage Shadow IT Value Legal Cryptocurrency Network Congestion Spam Blocking Electronic Medical Records Virus eWaste Internet Exlporer Procurement Unified Threat Management Comparison Workplace Strategy Hiring/Firing Computer Accessories Net Neutrality PDF Help Desk CES Proactive IT Printing Wearable Technology Retail Hard Drives Business Technology Content Management Best Practice Instant Messaging YouTube Robot Excel Printer Access Control Managed Services Provider Black Market Business Intelligence Bluetooth Biometrics Virtual Assistant Authentication Virtual Desktop Audit Worker Database IT Management Remote Workers Document Management Nanotechnology Telecommuting Email Best Practices Computer Fan Science IT Assessment Rootkit Project Management Manufacturing Cortana Computer Tips Workers Managed IT Service Benefits Security Cameras Files Digital Signature Distributed Denial of Service Chromecast Customer Relationship Management Virtual CIO FENG OneDrive Warranty Biometric Security HVAC Google Apps Analyitcs Peripheral IBM Programming Digital Security Cameras Using Data Smart Technology Colocation Analysis Uninterrupted Power Supply Flash Devices Copiers Administrator 5G Enterprise Content Management Monitor Software Tips Quick Tip Supercomputer Ergonomics Emails Consultant MSP Smartwatch Accountants Antivirus Sync Thought Leadership Credit Cards Windows 8 Development Analytics Microchip OLED Virtual Machine Password Management Reputation Password Manager IT service Streaming Media PCI DSS Multi-Factor Security 2FA Netflix Best Available Fiber Optics Two Factor Authentication Content Employee Tech Support Twitter Laptop Root Cause Analysis WIndows 7 Tablet Messaging Search Engine Cabling Techology Hypervisor Music NIST Customers Business Mangement Domains HBO Policy Knowledge Trending Dark mode Trend Micro Audiobook Smart Tech Skype Addiction IaaS Touchpad Amazon Maintenance Data loss SMS Default App Saving Time Troubleshooting Recycling Outlook Bloatware Procedure Leadership dark theme Shopping Politics Wiring Google Search Advertising Practices Start Menu Windows Media Player Cache Amazon Web Services Screen Mirroring User Tablets AI Loyalty PowerPoint IT Infrastructure Books Safe Mode Bing Criminal Notifications Frequently Asked Questions Entrepreneur FinTech Mobile Windows 10s Social Network GDPR Hosted Computing Wireless Internet Online Shopping Shortcut Cast Managing Stress Investment Employees webinar Employee/Employer Relationships Emergency File Sharing Relocation Tip of the week Cost Management Professional Services Specifications Social Networking Windows 365 Public Cloud Employer Employee Relationship Cameras Camera ISP Inventory ROI Video Games Wire Evernote Video Conferencing Assessment Sales Bitcoin Worker Commute Shortcuts Windows Server 2008 Travel Running Cable Tools Millennials Point of Sale Personal Experience Printers Cryptomining Scalability Smart Office Wireless Charging Memory Supply Chain Management Television Monitoring Batteries Business Owner NarrowBand Workforce Windows 8.1 Digitize Printer Server Virtual Private Network Windows Server 2008 R2 Search Cables Public Computer Customer relationships Transportation iPhone Regulations

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code