Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: For Maximum Productivity, Try Sprinting

Tip of the Week: For Maximum Productivity, Try Sprinting

The value of productivity cannot be understated, especially in the workplace. While there are many methods people use to increase theirs, we wanted to share a specific approach with you for our tip: sprinting.

Don’t worry… we don’t expect you to try and work while you’re running as fast as you can. What we mean by “sprinting” is that you commit to focused, intensive work for a period of time, followed by a shorter period of rest.

The Science Behind Sprinting

The human body has certain capabilities, and is subject to certain limits. The way we are designed, we are meant to spend our time either spending or accumulating energy. These cycles are known as ultradian rhythms. Using our brains counts against this energy.

As a result, our focus is limited to somewhere between 90 and 120 minutes. Research indicates that, in order to perform well again after that, you need to take a 20-to-30 minute break so your brain can recover.

A sprinting methodology fits this pattern to a ‘T.’ By narrowing your focus to a single one of your tasks and blocking out distractions, you are better able to commit yourself to your goal. Once you hit the end of your sprint, you spend your recovery time refocusing yourself and preparing for your next foray into intense productivity.

Various authors and researchers have provided anecdotal evidence as to the efficacy of this approach:

  • While writing The Way We’re Working Isn’t Working: The Four Forgotten Needs That Energize Great Performance, Tony Schwartz used 90-minute blocks of time to break up his day, only writing for a daily total of four and a half hours. Six months later, his book was finished.
  • In 1993, performance researcher Anders Ericsson discovered via a study that the most skilled young violinists all followed a similar practice schedule: three 90-minute sessions of morning practice, with breaks in between.
  • In his book, Schwartz tells the story of how Leonardo Da Vinci would put down his paints while working on The Last Supper and daydream for hours at a time. When he was questioned about it, Da Vinci is said to have replied, “The greatest geniuses accomplish more when they work less.”

Why and How to Leverage Sprinting

One of sprinting’s biggest benefits is something that many people are very familiar with: the feeling of being in “the zone.” It’s that time when you are fully committed to your task at hand, and are enjoying yourself as you apply yourself. Psychologists refer to this as “flow.”

One psychologist, Mihaly Csikszentmihalyi, has committed his career to studying flow. As he said in his book, Flow: The Psychology of Optimal Experience, he wrote:

“The best moments usually occur when a person’s body or mind is stretched to its limits in a voluntary effort to accomplish something difficult and worthwhile. Optimal experience is thus something that we make happen.”

To make flow happen, sprinting once again fits quite well. Incorporating these patterns into your daily routine will help you to work more productively and ultimately, be more successful in your work.

What methods have you used to boost your productivity? Share some in the comments!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Users Business Management Windows Phishing Upgrade Managed IT Services Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Cloud Computing Server Save Money Windows 10 Passwords Tech Term Virtualization Saving Money Gadgets Holiday Chrome Social Media Managed IT Services Automation Microsoft Office Managed Service Cybercrime Computers Artificial Intelligence Operating System Facebook Health Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Hacking Remote Spam Alert Office 365 Telephone Systems Managed Service Provider Covid-19 Information Information Technology Employer-Employee Relationship Recovery Router BDR Bandwidth Social Engineering Mobility Human Resources Mobile Computing Law Enforcement Application Remote Monitoring Password Money App History Big Data Encryption Applications Data Breach Government Remote Computing Private Cloud Mobile Office How To Managed IT Blockchain Paperless Office Apps Office Tips Data Storage Patch Management Training VPN Flexibility Servers Marketing Two-factor Authentication Avoiding Downtime WiFi IT solutions Entertainment Website Data Security Mouse Budget HaaS Bring Your Own Device Data Management Work/Life Balance Wireless Vulnerability Windows 7 Word Gmail Infrastructure Google Drive Voice over Internet Protocol Settings Vendor Management Firewall Keyboard Virtual Reality Apple Data Protection Social USB User Error Save Time Meetings Vendor Cleaning Managed Services Risk Management Software as a Service Display Hacker Telephone System Staff Machine Learning Conferencing End of Support Connectivity Remote Work The Internet of Things Lithium-ion battery Scam Education Physical Security Employee/Employer Relationship Safety RMM Sports HIPAA Redundancy Computer Accessories Fax Server Proactive IT Augmented Reality Unsupported Software Fraud Best Practice Digital Signage YouTube Charger Remote Worker SaaS Black Market Compliance Cryptocurrency Printer OneNote Computer Care Bluetooth Network Congestion Current Events eWaste Document Management Telephony Procurement Solid State Drive Comparison Net Neutrality Wireless Technology Samsung Workplace Strategy How to Downtime Help Desk CES Printing Value IT Consultant Data storage Spam Blocking Electronic Medical Records Business Technology Wearable Technology Automobile Content Management Access Control Humor Retail Hard Drives Managed Services Provider Instant Messaging Robot Computing Infrastructure Excel Hiring/Firing Virtual Assistant Authentication Database Going Green Biometrics Virtual Desktop Remote Workers Battery Processor Update Shadow IT DDoS Legal Business Intelligence SharePoint Hard Drive Audit Google Docs Internet Exlporer Worker IT Management Identity Theft Virus Computing Customer Service PDF Botnet IT Plan Unified Threat Management Environment Benefits Password Management PCI DSS Antivirus Password Manager Virtual Machine Relocation Workers Fiber Optics FENG Multi-Factor Security Employee Windows 8 2FA Managing Stress Search Engine Twitter Messaging IT service Video Games Cabling IBM Smart Technology NIST Policy Worker Commute Flash Business Mangement Hypervisor Cameras Smart Tech Trend Micro Trending Tablet Dark mode Experience Addiction SMS Domains Scalability Software Tips Amazon Default App Supercomputer Procedure Business Owner Sync Recycling Saving Time Emails Practices Shopping Maintenance Google Search NarrowBand Wiring dark theme IaaS Cache AI Search Amazon Web Services IT Infrastructure Bloatware Bing Two Factor Authentication Safe Mode FinTech Criminal Printer Server iPhone Netflix Hosted Computing Social Network Root Cause Analysis Tablets GDPR Wireless Internet HBO Online Shopping Investment Entrepreneur Knowledge Music Files File Sharing Employees Skype Employee/Employer Relationships Inventory Shortcut Data loss Specifications ISP Chromecast Camera Windows 365 Troubleshooting Wire Video Conferencing Outlook Evernote ROI Cost Management Leadership Social Networking Colocation Travel Shortcuts Uninterrupted Power Supply Sales Start Menu Bitcoin Personal Screen Mirroring Millennials Cryptomining Loyalty Printers Point of Sale Books Smart Office Supply Chain Management Frequently Asked Questions Wireless Charging Monitor Windows 10s Monitoring Running Cable Mobile Batteries Digitize Cast Workforce Memory Virtual Private Network Windows 8.1 Streaming Media Emergency Consultant Tip of the week Cables Windows Server 2008 R2 Reputation webinar Public Cloud Tech Support Employer Employee Relationship Customer relationships Content Professional Services Analytics Nanotechnology IT Assessment Techology Telecommuting Manufacturing Laptop Assessment Project Management Email Best Practices Best Available Windows Server 2008 Cortana Customers Security Cameras Science Computer Tips WIndows 7 Audiobook Tools Digital Signature Managed IT Service OneDrive Biometric Security Touchpad Television Warranty Virtual CIO HVAC Peripheral Google Apps Customer Relationship Management Advertising Digital Security Cameras Distributed Denial of Service Politics Analysis Using Data Administrator Devices Copiers 5G Analyitcs Public Computer Notifications Transportation Enterprise Content Management Quick Tip Regulations Programming Accountants PowerPoint Computer Fan Smartwatch Windows Media Player Rootkit MSP Ergonomics User Microchip Thought Leadership Development Credit Cards OLED

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code