Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Much Time is Spent Each Day Checking Notifications?

How Much Time is Spent Each Day Checking Notifications?

Generally speaking, we all get way too much screen time nowadays, between the workstations we all spend our days in front of to the televisions we watch in the evening to the mobile devices that are never far out of reach. While plenty of people have weighed in on the subject, some of the most interesting insights come from scholarly research: the more notifications a person gets, the more their productivity suffers.

The University of California at Irvine recently released some research that demonstrated that each time someone received a notification, it would take another 23 entire minutes to return to the task that the notification interrupted. Making this worse, people check their mobile devices once every 47 seconds—totaling 600 times over the typical eight-hour workday.

Compounding on this, receiving so many notifications and being interrupted so many times tends to lead to excessive errors made and increased stress amongst a workforce.

What Can Be Done?

With the rise in remote work as of late, notifications have only risen in prevalence, so it only makes sense to do whatever you can to manage them as effectively as possible. Fortunately, the two largest smartphone developers—Apple and Google—have taken steps to help shave down the number of interruptions that users have to deal with. Google offers the Digital Wellbeing tool through Android, whereas Apple offers Screen Time to help users keep track of their usage of their device… somewhat ironically, by sending them an additional notification alerting them, while also allowing timeframes and other limits to be set on these notifications.

There are also hardware solutions meant to assist with this excessive screen time, as well. There’s been a resurgence in the mobile device market for options that are much closer to the “dumbphones” around in the ‘90s and ‘aughts. One, called The Light Phone, scales the phone’s capabilities back to simple calls and texts. While effective for some, others are opposed to such a significant downgrade in their mobile device.

Alternatively, app developers have developed programs committed to promoting “deep work”—including the likes of Medium, Seque, Shift, and Asana—meant to help eliminate the stress of the workplace and assist in schedule management.

Are you guilty of looking at your phone too much throughout the workday? How much do you feel it has hurt your productivity over time? Share your thoughts in the comments, and reach out to us directly for more help implementing the solutions you need. Call 866-348-2602 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Users Business Management Upgrade Windows Phishing Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Office Server Cloud Computing Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Gadgets Tech Term Chrome Virtualization Social Media Managed IT Services Managed Service Microsoft Office Automation Cybercrime Operating System Artificial Intelligence Computers Facebook Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi BYOD Covid-19 Information Managed Service Provider Spam Alert Office 365 Telephone Systems Remote Information Technology Employer-Employee Relationship Recovery Router Bandwidth BDR Social Engineering Mobility Human Resources Law Enforcement Remote Monitoring Big Data Password Data Breach Money App History Mobile Computing Encryption Applications Application Paperless Office How To Government Remote Computing Private Cloud Mobile Office Data Storage Patch Management Managed IT Apps Office Tips Training VPN Blockchain Two-factor Authentication Avoiding Downtime Mouse Infrastructure Voice over Internet Protocol HaaS Vulnerability Windows 7 Bring Your Own Device Word Data Management Work/Life Balance Flexibility Servers Marketing Wireless WiFi IT solutions Entertainment Website Gmail Budget Google Drive Data Security Settings Managed Services Telephone System Staff Software as a Service Display Firewall Keyboard Machine Learning Virtual Reality Connectivity Remote Work Apple Employee/Employer Relationship RMM Social User Error Save Time Conferencing Meetings Scam Cleaning Data Protection Risk Management Hacker Vendor Management End of Support The Internet of Things Lithium-ion battery Education Physical Security Safety Sports Vendor USB HIPAA Redundancy Samsung Fax Server Proactive IT Remote Workers IT Consultant Best Practice Value Processor Humor YouTube Update SaaS Black Market Spam Blocking Electronic Medical Records Hard Drive Google Docs Network Congestion Hiring/Firing Identity Theft eWaste Document Management Solid State Drive Wireless Technology Computing How to Downtime Augmented Reality Data storage Fraud Wearable Technology Automobile Business Intelligence Retail Remote Worker Hard Drives Digital Signage Virus Instant Messaging Audit Worker Excel Robot Computing Infrastructure IT Management Cryptocurrency Unified Threat Management Going Green Botnet Computer Accessories Biometrics IT Plan Procurement Virtual Desktop Workplace Strategy Comparison Net Neutrality Battery Unsupported Software Shadow IT CES Help Desk DDoS Legal Printing Charger SharePoint Printer Business Technology Internet Exlporer Content Management Bluetooth Access Control Compliance Computer Care Managed Services Provider OneNote Customer Service PDF Virtual Assistant Current Events Telephony Environment Authentication Database Cables Windows Server 2008 R2 Antivirus Relocation Root Cause Analysis HBO Customer relationships Windows 8 Knowledge Music IT service Video Games Skype Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Cortana Worker Commute Data loss Outlook Computer Tips Tablet Leadership Digital Signature Managed IT Service Troubleshooting Security Cameras Experience Domains Scalability Start Menu Warranty Virtual CIO OneDrive Biometric Security Loyalty Google Apps Business Owner Screen Mirroring HVAC Peripheral Maintenance Frequently Asked Questions Digital Security Cameras NarrowBand Analysis Using Data Books IaaS Consultant Search Mobile Administrator Bloatware Windows 10s Devices Copiers 5G Analytics iPhone Cast Enterprise Content Management Quick Tip Tip of the week MSP Ergonomics Tablets webinar Accountants Emergency Smartwatch Best Available Professional Services Microchip Entrepreneur Public Cloud Thought Leadership Development Employer Employee Relationship Credit Cards OLED Assessment Password Manager Virtual Machine WIndows 7 Files Password Management PCI DSS Shortcut Windows Server 2008 2FA Chromecast Fiber Optics Multi-Factor Security Employee Tools Search Engine Cost Management Twitter Messaging Cabling Uninterrupted Power Supply Television Business Mangement Hypervisor Social Networking Colocation NIST Policy Dark mode Smart Tech Trend Micro Trending Monitor Addiction SMS Amazon Default App Windows Media Player Public Computer Recycling Saving Time User Running Cable PowerPoint Procedure Regulations Wiring dark theme Memory Practices Shopping Transportation Google Search Reputation Computer Fan Cache AI Streaming Media Rootkit Amazon Web Services IT Infrastructure Safe Mode FinTech Tech Support Criminal Bing Managing Stress Content Techology GDPR Laptop Workers Hosted Computing Social Network Benefits Online Shopping Investment Cameras Customers FENG Wireless Internet File Sharing Employees Science IBM Employee/Employer Relationships Audiobook Flash Camera Windows 365 Touchpad Inventory Smart Technology Specifications ISP Evernote ROI Wire Video Conferencing Customer Relationship Management Advertising Software Tips Sales Supercomputer Bitcoin Travel Shortcuts Distributed Denial of Service Politics Sync Printers Point of Sale Analyitcs Emails Personal Millennials Cryptomining Notifications Wireless Charging Printer Server Programming Smart Office Supply Chain Management Monitoring Batteries Virtual Private Network Windows 8.1 Netflix Digitize Two Factor Authentication Workforce

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code