Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

5 Tech Hacks to Reclaim an Hour of Your Day

5 Tech Hacks to Reclaim an Hour of Your Day

We can probably all agree that there’s a big difference between “staying busy” and “looking busy,” and that the first option is generally the better one in the workplace. The big difference is how productive you actually are.

Let’s go over some simple-to-implement ways you can help your team boost their productivity without even thinking about it.

Why Doesn’t “Busy” Always Mean “Productive?”

We’ve all been there—schedules or to-do lists longer than the most deranged coffee order. Sometimes, it seems that the busier one is, the better off they are.

However, being consistently busy can foster many less-than-productive habits, defeating the purpose of taking on so many tasks in the first place. It doesn’t matter how much pressure you’re producing under if what you’re making isn’t of a requisite quality, or if your output doesn’t actually increase.

Fortunately, the opposite is also true: by adopting productive habits and tools into our daily tasks, more can be accomplished without the pressure that being “busy” inherently brings. It’s the practical application of work smarter, not harder.

5 Simple Tricks to Boost Actual Productivity

It’s a lot easier than you’d think to shift from “busy” work to “productive” work. For instance:

Learn Your Keyboard Shortcuts

Did you know that the modern QWERTY keyboard, designed back in 1870, was initially designed to slow typists down

The mechanical typewriter tended to jam up if its keys were pressed too quickly. The first version of the QWERTY layout (or QWE.TY, at the time) was initially developed by inventor Christopher Laytham Sholes, printer Samuel W. Soule (replaced by financier James Densmore after Soule’s departure), and mechanic Carlos S. Glidden to solve this very issue. Upon its purchase by arms manufacturer E. Remington and Sons in 1873, the layout was tweaked to become the QWERTY keyboard we know and use today.

This revision was primarily for marketing purposes, as it allowed users to type "TYPEWRITER" using only the top row of keys.

Knowing this history, it seems somewhat ironic that we now implement special key combinations to speed up various tasks, from formatting the text we type (Ctrl+I was used a few times when composing this very article, including just then, wherever you see italics) to interacting with different programs, like reopening a prematurely-closed browser tab via Ctrl+Shift+T.

There are far, far too many to list here in their entirety, so we recommend identifying which will be most helpful for your most frequent workplace tasks.

Apply Rules to Your Inbox

Email, whether you use Outlook or Gmail, can be a real time sink to keep organized, unless you implement rules that automatically sort different messages on your behalf. In Gmail, this is as simple as clicking the Gear icon to open your Quick Settings, selecting See all settings, and navigating to Filters and Blocked Addresses to create all the filters you need.

In Outlook, you can create these kinds of rules by right-clicking an existing message, hovering over the Rules option, and selecting Create rule when the option pops up

By creating some thoughtful and strategic filters and rules, you can easily clean up your inbox to make it much more user-friendly..

Use a Password Manager

Passwords are hard to remember, by design, and if you’re abiding by accepted password best practices as you should be, you’ll have a frankly ludicrous number to memorize. This is precisely where a password manager shows its value.

A password manager is essentially an encrypted vault that securely stores all your existing passwords for you, protected behind a single master password—the only one you need to remember. Let’s be clear: this is the only secure method of writing down your passwords, and even then, you need to be selective about the password manager you use. The one built into your web browser won’t suffice.

Schedule Time for Deep Focus

Modern operating systems are designed to help users stay focused on their tasks, especially when they intend to dive into their work fully for a set period. Built-in features will silence notifications for this duration, minimizing the chance of an errant alert pulling their attention away from their task.

Similarly, many collaboration tools allow users to set a status so that their coworkers can see how receptive they are to messages at a given time. It’s a great way to manage expectations about when a response may be expected, or even whether a message is necessary at the moment.

Embrace the Cloud’s Capabilities

One of the most effective ways to kill productivity is to have your team members all working separately on the same project. Instead of maintaining multiple users’ versions and renaming these files to things like “Expected-Inventory-Changes-v2-v6-FINAL-use-this-one-FINAL-FINAL-Susan-version-THIS-ONE,” cloud platforms allow all your users to work collaboratively on a single document, complete with saved past versions and records of who changed what and when.

We Can Help You Introduce These Habits, and More!

While these tricks are certainly handy, they will only provide their real value if they become your standard operations. This means you also need a technology infrastructure built to support these processes.

Voyage Technology can help with all of the above, from maintaining the hardware and software your business relies on to supporting your team with all of their technology questions and needs. Just imagine how much time having someone to turn to for help can save!

Or, if you’d rather experience these time savings and productivity boosts for yourself, give us a call at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Quick Tips Productivity Passwords Cybersecurity Saving Money Communication Managed Service Data Backup Smartphone Android Upgrade VoIP Business Management Smartphones AI Data Recovery Mobile Devices communications Disaster Recovery Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Facebook Miscellaneous Information Automation Artificial Intelligence Gadgets Cloud Computing Covid-19 Holiday Training Remote Work Server Managed Service Provider Outsourced IT Compliance Encryption Spam Employee/Employer Relationship IT Support Office Windows 10 Government Business Continuity Data Management Virtualization Blockchain Wi-Fi Business Technology Bandwidth Windows 10 Data Security Apps Vendor Two-factor Authentication Mobile Office App Employer-Employee Relationship BYOD Tip of the week Chrome Mobile Device Management Managed Services Voice over Internet Protocol Budget Gmail Apple Networking How To WiFi BDR HIPAA Computing Applications Information Technology Hacker Access Control Avoiding Downtime Office 365 Marketing Conferencing Big Data Operating System Router Virtual Private Network Risk Management Computers Health 2FA Help Desk Analytics Website Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Managed IT Services The Internet of Things Cooperation Free Resource Project Management Windows 7 Social Going Green Patch Management Save Money Microsoft 365 Remote Monitoring End of Support Vulnerability Vendor Management Solutions Cybercrime Physical Security Customer Service Display Printer Windows 11 Paperless Office Infrastructure Monitoring Excel Document Management Remote Workers Firewall Telephone Scam Data loss Data Privacy Images 101 Robot Mobility Telephone System Multi-Factor Authentication Cost Management Settings Wireless Printing Content Filtering IT Management Customer Relationship Management VPN Employees YouTube Meetings Integration Cryptocurrency User Tip Modem Hacking Presentation Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Wireless Technology Data storage Data Storage Smart Technology Supply Chain Video Conferencing Outlook Machine Learning Managed Services Provider Professional Services Money Saving Time Virtual Machines Word Humor Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Safety Vulnerabilities Entertainment Administration Best Practice Trends Supply Chain Management Alert Dark Data Google Calendar Term Google Apps Managed IT Customer Resource management FinTech Buisness File Sharing Regulations IT solutions Star Wars IT Assessment How To Microsoft Excel IT Maintenance Legal Data Analysis Business Growth Gamification Flexibility Notifications Staff Value Business Intelligence Legislation Shortcuts Organization Travel Social Networking Application Google Maps Smart Devices Cortana Ransmoware Techology Fileless Malware Digital Security Cameras Alt Codes Content Remote Working IBM Wearable Technology Memory Vendors Comparison Google Play Be Proactive Health IT Downtime Unified Threat Management Motherboard Data Breach Hosted Solution Assessment Electronic Health Records Permissions Workforce Unified Threat Management Directions Videos Typing Wasting Time Threats Network Congestion Specifications Security Cameras Workplace Strategies Trend Micro Internet Exlporer Software as a Service Competition Knowledge Fraud Meta Google Drive User Error Microchip Username Managing Costs Amazon 5G Black Friday SSID Point of Sale eCommerce Unified Communications Database Surveillance Experience Virtual Assistant Outsource IT Google Docs Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Environment User Media Monitors Cyber Monday Medical IT Google Wallet Proxy Server Reviews Cookies Tactics Development Hotspot Transportation Small Businesses Windows 8 IP Address Laptop Websites Mirgation Hypervisor Displays PowerPoint Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Outsourcing SharePoint Management PCI DSS Halloween Chatbots Recovery Navigation Writing Distributed Denial of Service Workplace Lenovo Gig Economy Screen Reader Hard Drives Service Level Agreement Internet Service Provider Domains Virtual Reality Computing Infrastructure Teamwork Hiring/Firing Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Paperless Refrigeration Fun Co-managed IT Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Public Speaking Twitter Alerts SQL Server Technology Care Financial Data Lithium-ion battery Error History Business Communications Social Engineering Break Fix Scams Entrepreneur Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Hybrid Work Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Human Resources Undo Search Dark Web Cables CES Tablet IoT Communitications

Blog Archive