Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

3 Ways To Buck the Trend of Unproductive Meetings

b2ap3_thumbnail_meeting_about_meeting_400.jpgRunning a business means going to meetings. There’s really no way around it. And while you can’t run a business without meetings, you can run your meetings as efficiently as possible so that they’re not a complete waste of time. Unfortunately, according to a recent study by Blue Jeans Network, the worldwide trends for meetings show that they can hinder productivity more than help it.

The study is an annual report released by Blue Jeans Network, a cloud-based video conferencing company. They analyzed the data from more than five million video meetings in 177 countries, of which more than a third had an in-person component. When compared to similar studies done from previous years, patterns were spotted that showed people are wasting more time in meetings than they should. Here are a few of the more noteworthy findings.

Most Meetings Are Taking Place at the Most Unproductive Time
In separate studies, it’s been proven that different parts of the work day are better for meetings. For example, morning meetings are ideal because that’s when people are most alert, and the worst time for a meeting is in the middle of the afternoon because that’s when office workers tend to feel the most dull-brained. According to the study, the most popular meeting time is mid-afternoon, sometime around 3 p.m.

Solution: Schedule your meetings during the mornings, preferably right after the coffee kicks in.

It’s Normal For Meetings to Start Late
One of the most annoying aspects of meetings is waiting for people to show up. While waiting for Johnny-come-lately to make an appearance, everyone is forced to participate in small talk--and get paid for it. This kills productivity. According to the study, a whopping 81 percent of meetings start late, up 30 percent from the previous year. Inc. describes how tardiness is dangerous because it’s a self-perpetuating problem:

If you arrive five minutes late to a meeting and it hasn't started yet, you'll figure you haven't missed anything, so you'll likely do the same next time, or maybe show up even later. Meanwhile, the punctual people who've sat around waiting for you will figure they have better uses for their time, and next time they'll come five minutes late as well, or maybe even later.

Solution: Be strict about your meeting times and have consequences for late comers.

Bad Weather Equates to More Meetings
The study shows that Winter, with all of its blusteriness and bitter cold, sees twice as many meetings as other times of the year--when it’s presumably warmer and nicer outside. It’s also the case that, the worse the weather is, the more likely that a meeting will take place. The study shows that “meetings were up by as much as 26 percent during the recent Texas flooding, and an impressive 35 percent during the Boston blizzards last winter.”

Solution: Consistency is key to not wasting too much time during meetings, and to not have unnecessary meetings. By having regularly-scheduled meetings, you will decrease the number of unnecessary meetings that take place, simply because someone feels a strange connection to the weather patterns.

Meetings are kind of a necessary evil, but if you plan them right, you can make them more productive and less, well, evil. In addition to being on time and intentional about how often you meet, you can take advantage of technologies like video conferencing and cloud-based scheduling software that will keep your meetings as productive as possible. To schedule a meeting with Total Tech Care about this, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services VoIP Disaster Recovery Android communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Chrome Gadgets Virtualization Social Media Saving Money Holiday Tech Term Automation Managed Service Microsoft Office Managed IT Services Facebook Artificial Intelligence Computers Cybercrime Operating System Internet of Things Wi-Fi BYOD Health Mobile Device Management Networking IT Support Hacking Telephone Systems Alert Remote Information Technology Covid-19 Information Spam Managed Service Provider Office 365 Recovery Employer-Employee Relationship Bandwidth Router Social Engineering BDR Mobility App History Mobile Computing Password Data Breach Money Application Human Resources Encryption Applications Remote Monitoring Big Data Law Enforcement Private Cloud Office Tips Data Storage Patch Management Training Managed IT VPN Apps Blockchain Paperless Office Remote Computing Mobile Office How To Government Flexibility Wireless Vulnerability Marketing Windows 7 WiFi Bring Your Own Device Word Data Management Work/Life Balance Gmail IT solutions Entertainment Website Budget Settings Servers Two-factor Authentication Google Drive Data Security Mouse HaaS Infrastructure Voice over Internet Protocol Avoiding Downtime Risk Management Data Protection Hacker Save Time Conferencing The Internet of Things Lithium-ion battery Scam Cleaning USB Vendor Firewall Vendor Management End of Support Managed Services Software as a Service Telephone System Display Staff Physical Security Education Virtual Reality Machine Learning Apple Safety Connectivity Remote Work HIPAA Sports Social Employee/Employer Relationship Redundancy RMM Keyboard User Error Meetings Robot Remote Worker Excel Digital Signage Hiring/Firing Document Management Virus Biometrics Cryptocurrency Solid State Drive Wireless Technology Downtime Virtual Desktop How to Unified Threat Management Computer Accessories Procurement Data storage Comparison DDoS Workplace Strategy Net Neutrality Automobile Business Intelligence SharePoint Help Desk CES Printing Audit Worker Printer Computing Infrastructure IT Management Bluetooth Business Technology Content Management Going Green Botnet Customer Service Access Control Environment Managed Services Provider IT Plan Virtual Assistant Authentication Fax Server Database Battery Shadow IT Unsupported Software IT Consultant Remote Workers Legal SaaS Charger Processor Internet Exlporer Update Humor Compliance OneNote Computer Care Hard Drive Current Events PDF Network Congestion Google Docs eWaste Telephony Identity Theft Samsung Proactive IT Computing Best Practice Value YouTube Black Market Wearable Technology Spam Blocking Augmented Reality Electronic Medical Records Fraud Retail Hard Drives Instant Messaging Trending Running Cable Dark mode Mobile Trend Micro Windows 10s Search Smart Tech Default App Addiction iPhone Amazon SMS Cast Memory Procedure Tip of the week User Saving Time webinar PowerPoint Emergency Windows Media Player Recycling dark theme Professional Services Shopping Public Cloud Wiring Google Search Employer Employee Relationship Practices IT Infrastructure Assessment Cache Files Amazon Web Services AI FinTech Windows Server 2008 Managing Stress Safe Mode Bing Criminal Chromecast Tools Social Network GDPR Science Hosted Computing Investment Television Cameras Wireless Internet Colocation Online Shopping Uninterrupted Power Supply Employees Employee/Employer Relationships File Sharing Monitor Specifications Distributed Denial of Service Windows 365 Customer Relationship Management Camera ISP Inventory Analyitcs ROI Public Computer Wire Evernote Video Conferencing Sales Regulations Programming Bitcoin Shortcuts Transportation Travel Reputation Millennials Point of Sale Streaming Media Personal Computer Fan Printers Cryptomining Rootkit Content Printer Server Smart Office Wireless Charging Tech Support Supply Chain Management Antivirus Monitoring Batteries Workers Benefits Techology Laptop Customers Workforce Windows 8.1 Digitize FENG Virtual Private Network Windows 8 Windows Server 2008 R2 IBM Audiobook Cables IT service Customer relationships Flash Smart Technology Touchpad Nanotechnology Telecommuting Email Best Practices IT Assessment Project Management Tablet Manufacturing Supercomputer Politics Advertising Cortana Domains Software Tips Computer Tips Sync Managed IT Service Emails Security Cameras Digital Signature IaaS Virtual CIO Notifications Maintenance OneDrive Warranty Biometric Security Bloatware HVAC Google Apps Peripheral Digital Security Cameras Using Data Netflix Two Factor Authentication Analysis Devices Relocation Copiers Root Cause Analysis Consultant Administrator Tablets 5G Entrepreneur Knowledge Analytics Enterprise Content Management Music Quick Tip HBO Ergonomics Skype MSP Smartwatch Video Games Accountants Worker Commute Thought Leadership Credit Cards Shortcut Development Data loss Best Available Microchip OLED Outlook WIndows 7 Cost Management Virtual Machine Leadership Experience Password Management Troubleshooting Password Manager PCI DSS Multi-Factor Security 2FA Start Menu Social Networking Fiber Optics Employee Scalability Loyalty Business Owner Twitter Messaging Screen Mirroring Search Engine Cabling Policy Frequently Asked Questions Hypervisor NIST Books Business Mangement NarrowBand

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code