Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Does 10,000 Hours of Practice Automatically Make Someone an Expert?

Does 10,000 Hours of Practice Automatically Make Someone an Expert?

You’re already a business owner, but let’s say that you want to pick up some new skills. You want to be known as an expert in a new field, and you’re pretty dedicated to doing so. Perhaps you’re familiar with the 10,000 hours rule, which attempts to explain how someone becomes a master of a particular craft. Well, we hate to burst your bubble, but this rule might not be as simple as it sounds.

What the 10,000 Hour Rule Is

The 10,000 hour rule claims that in order to learn a craft and develop world-class skill, one has to have at least 10,000 hours of experience working with the skill. The original report, published in 1993, found that the most accomplished students at a music academy in Berlin had put in an average of 10,000 hours of practice by the time they turned 20 years old. It seems simple enough, right? You put in plenty of practice and you can possess a world-class skill.

Why it Might Be Wrong
In his new book, Anders Ericsson (who worked on the original report), along with his co-author Robert Pool, attempt to further understand and isolate the science behind the 10,000 hour rule. They came to a number of conclusions concerning the nature of the initial study:

  • There’s nothing special about 10,000 hours: The number 10,000 was chosen specifically because it was a nice, rounded number. Plus, regardless of how skilled they were, the musicians tested were nowhere near their peak, or “world class,” by the time they reached 20 years old. It’s been proven that pianists tend to reach their peak at around 30 years old, so the 10,000 rule isn't quite true.
  • 10,000 was only the average: By proxy, if you put in 10,000 hours of effort, you’ll only be meeting the average skill level of those who are working toward the same goal. Thus, you can’t be considered “world class” at all. Other studies have shown that it can take as many as ten years to reach a goal.
  • Practice isn’t enough: It was found that investing time and practice into a task doesn’t necessarily make you better at it; rather, it’s the quality of the practice that yields results. This “deliberate practice” pushes the practitioner beyond their comfort zone and forces them to up their game.

The Lesson: Practice Makes Perfect, Not Necessarily Time
There are a few lessons that can be learned from the 10,000 hour rule, but none of them actually have anything to do with 10,000 hours of practice specifically. They can still, nonetheless, be very helpful when learning a new skill and applying it to your life.

  • Train the right way: You can dramatically improve your own skills if you’re diligent about it, but only if you approach it in a productive way. For example, a writer who’s trying to develop their skills can’t improve if they write while the television is turned on.
  • Practice, practice, practice: Regardless if you spend 500 hours or 10,000 hours honing a craft, you’ll be improving your skills. After all, practice is the only real way to improve, and regardless of how much time you invest into it, you’ll see results.
  • There’re no limitations: Regardless of where you stand professionally, there’s always room for self-improvement. You can always reach for loftier goals, and once you start working on a skill, keep working at it. You’ll likely see your hard work pay off.

We think it’s safe to say that you can’t become an expert in a craft overnight, and that even successful business owners have skills that they can dramatically improve by focusing on the right things.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 23 November 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Google Business Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Quick Tips Cybersecurity Users Business Management Managed IT Services Upgrade Phishing Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Chrome Virtualization Saving Money Holiday Social Media Gadgets Tech Term Microsoft Office Automation Managed IT Services Managed Service Computers Facebook Cybercrime Artificial Intelligence Operating System Hacking BYOD Mobile Device Management Internet of Things Networking IT Support Health Wi-Fi Spam Remote Office 365 Telephone Systems Information Technology Covid-19 Information Alert Managed Service Provider Mobility Router BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Money Remote Monitoring Encryption Applications Data Breach Mobile Computing App History Application Law Enforcement Human Resources Big Data Password Apps Data Storage Mobile Office Patch Management Office Tips Government Blockchain Training Paperless Office VPN Private Cloud How To Managed IT Remote Computing Mouse HaaS Vulnerability Windows 7 Flexibility Word Marketing Google Drive WiFi Servers IT solutions Entertainment Website Wireless Budget Avoiding Downtime Data Security Gmail Settings Infrastructure Voice over Internet Protocol Bring Your Own Device Two-factor Authentication Data Management Work/Life Balance Social Conferencing User Error End of Support Data Protection Education Meetings Physical Security Scam Safety HIPAA Sports Redundancy Risk Management Hacker Keyboard Vendor Management Vendor USB The Internet of Things Managed Services Lithium-ion battery Telephone System Staff Software as a Service Display Machine Learning Remote Work Connectivity Save Time Firewall Employee/Employer Relationship RMM Virtual Reality Apple Cleaning Network Congestion Fraud eWaste Digital Signage Remote Worker Battery Virus Cryptocurrency Shadow IT Unified Threat Management Legal Business Intelligence Computer Accessories Wearable Technology Procurement Audit Internet Exlporer Worker Retail Comparison Net Neutrality Hard Drives Workplace Strategy IT Management Instant Messaging Excel Botnet CES PDF Robot Help Desk Printing IT Plan Biometrics Printer Business Technology Content Management Virtual Desktop Proactive IT Bluetooth Access Control Unsupported Software Managed Services Provider Best Practice Virtual Assistant DDoS YouTube Charger Database Black Market Authentication SharePoint Compliance IT Consultant Remote Workers OneNote Computer Care Current Events Document Management Telephony Processor Wireless Technology Samsung Humor Solid State Drive Customer Service Update How to Downtime Environment Hard Drive Value Fax Server Google Docs Identity Theft Data storage Automobile Spam Blocking Electronic Medical Records SaaS Computing Computing Infrastructure Hiring/Firing Going Green Augmented Reality Twitter Messaging Tip of the week Cabling Reputation webinar Bloatware Streaming Media Emergency Search Engine NIST Policy Content Professional Services Business Mangement Hypervisor Public Cloud Tech Support Employer Employee Relationship Trending Laptop Assessment Tablets Dark mode Smart Tech Trend Micro Techology Addiction SMS Windows Server 2008 Amazon Default App Customers Entrepreneur PowerPoint Procedure Windows Media Player Audiobook Tools Recycling Saving Time User Google Search Touchpad Television Wiring dark theme Practices Shopping Shortcut Cache AI Amazon Web Services IT Infrastructure Cost Management Safe Mode FinTech Politics Criminal Advertising Social Networking Bing Managing Stress Public Computer GDPR Hosted Computing Social Network Wireless Internet Regulations Online Shopping Investment Notifications Transportation Cameras File Sharing Employees Running Cable Employee/Employer Relationships Computer Fan Rootkit Specifications ISP Memory Camera Windows 365 Inventory Wire Video Conferencing Evernote ROI Relocation Workers Benefits Sales Bitcoin FENG Travel Shortcuts Millennials Cryptomining IBM Printers Point of Sale Personal Video Games Smart Office Supply Chain Management Worker Commute Flash Wireless Charging Smart Technology Printer Server Science Monitoring Experience Batteries Workforce Supercomputer Virtual Private Network Windows 8.1 Digitize Scalability Software Tips Business Owner Sync Cables Windows Server 2008 R2 Emails Customer relationships Distributed Denial of Service Customer Relationship Management NarrowBand Search Telecommuting Manufacturing Analyitcs Project Management Email Best Practices Nanotechnology IT Assessment Cortana iPhone Netflix Programming Two Factor Authentication Computer Tips Digital Signature Managed IT Service Root Cause Analysis Security Cameras HBO Biometric Security Knowledge Music Warranty Virtual CIO OneDrive HVAC Peripheral Skype Antivirus Google Apps Files Chromecast Windows 8 Digital Security Cameras Analysis Using Data Data loss Devices Copiers Outlook IT service 5G Leadership Troubleshooting Consultant Administrator Analytics Enterprise Content Management Quick Tip Start Menu Colocation Uninterrupted Power Supply Smartwatch Loyalty Tablet MSP Ergonomics Accountants Screen Mirroring Thought Leadership Development Frequently Asked Questions Domains Credit Cards OLED Monitor Books Best Available Microchip Password Management PCI DSS Mobile Password Manager Virtual Machine Windows 10s WIndows 7 Multi-Factor Security Employee 2FA IaaS Fiber Optics Cast Maintenance

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code