Christian Computers Blog

Don’t Make the Solutions More Complicated Than the Problem

Don’t Make the Solutions More Complicated Than the Problem

The act of “yak shaving,” also known as “bikeshedding,” is a specific kind of procrastination that can hold you back from getting the most out of your workday. This week’s tip is dedicated to explaining what this nonsensical phrase means and why it’s beneficial to keep your employees on track.

What Does Yak Shaving Have to Do with My Business?
Yak shaving is just another way to define semi-defensible procrastination. It uses the following scenario to make its point: you need to complete a proposal, but you might be tired from a long day of work, making concentration difficult at best. You start to look into the best kind of coffee to get into a productive mindset, and your research yields potent results. The best coffee beans in the world come from a remote island, and they can only be harvested by a yak. So, now you need a yak. You take a trip to the Himalayas to acquire said yak, but the yak can’t take the temperate climate of the island with the coffee beans. In order to bring the yak to the island, you’ll have to shave its long fur off. Once that’s been done, you can take that yak to the island, harvest your coffee beans, and brew that perfect cup of coffee for flawless productivity to finish your proposal.

Basically, it takes a normal problem and uses a ridiculous and overly elaborate method to resolve the issue, but this in itself creates complication to get away from doing the less desired task. Everyone has been in this position before, where a particular task is so unappealing that they would do anything to get away from it, but the fact remains that the task needs to be done, whether you want to do it or not.

How to Identify (and Overcome) Your Hairy Yaks
The first thing to do if you think an issue like this arises is to notice how you tend to react to them. Consider all of the tasks you need to complete; how many of them actually have to be done to reach your ultimate goal? There’s no doubt that looking for excuses will lead to procrastination rather than productivity.

Imagine all the time spent earlier looking into the yak and the island with the coffee. What if you invested all of that time and energy into completing the task? Instead of wasting time, you could have already completed the task, rendering the need for the yak obsolete. Granted, the problem-solving skills you’ll acquire might seem valuable, and they are to an extent, so it’s not a complete waste--just not a great choice in the first place.

Think of the Task as an Investment
Time is money, and time-consuming tasks can be a waste if they aren’t being handled as well as possible. Think about it like this; you’ve already invested a considerable amount of time and effort into one solution, so why not simply go all the way with it and finish it, if the alternative is to waste even more time?

Overall, you need to remember that successfully completing a goal should outweigh the frustration of having to do it. The results are what matters primarily, but if you have only been working on something for a couple of moments, don’t be afraid to change it up.

The technology you use will play a considerable role in the way you complete a task. To learn more about how you can use it to benefit your business, reach out to Christian Computers at (252) 321-6216.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, March 19 2019

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Security Technology Tip of the Week Best Practices Privacy Business Management Cloud Business Computing Managed Service Provider Internet Microsoft Saving Money Software Workplace Tips Malware Hosted Solutions Hackers IT Services Backup Productivity Data Email Mobile Devices IT Support Small Business Hardware Business Computer Business Continuity Network Innovation Network Security Google Smartphones Server Managed IT Services Productivity VoIP Outsourced IT Efficiency Upgrade Ransomware Data Backup Social Media Communication Windows Disaster Recovery User Tips Tech Term Vendor Management Microsoft Office Smartphone Remote Monitoring Gadgets Mobile Office Virtualization Quick Tips Mobile Device Management Cloud Computing Android Data Recovery Windows 10 Save Money Internet of Things Alert Encryption Paperless Office Passwords Miscellaneous Unified Threat Management Holiday BYOD Bring Your Own Device IT Support Phishing Data Management Best Practice Users Artificial Intelligence Collaboration Browser Facebook Trending Going Green Apps Apple Firewall Windows 10 Antivirus Wireless Technology Remote Computing Mobile Device Current Events Cybersecurity Mobile Computing Maintenance Office 365 Managed IT App Operating System communications IT Consultant Printer Managed IT Services History Wi-Fi Router VPN Vulnerability Health Recovery The Internet of Things Document Management IT Solutions Customer Relationship Management Risk Management Scam WiFi Money Tech Support Digital Payment Tablet BDR Employer-Employee Relationship Big Data Spam Excel Analytics Applications File Sharing Training Compliance Automation Hard Drives Password Office Gmail Robot Content Filtering Windows 8 Hosted Solution Information Technology Computer Repair Government Fax Server Managed Service Infrastructure SaaS Work/Life Balance Information Wireless Data storage Healthcare Downtime Budget IT Management Help Desk Net Neutrality Telephone Systems Hacker Bandwidth Humor Proactive IT Point of Sale How To Social Virtual Reality Statistics Blockchain Twitter Avoiding Downtime Customer Service Education Private Cloud Computers Virus Social Networking Two-factor Authentication Unified Communications Inbound Marketing Licensing Project Management Company Culture Storage Marketing Website Chrome Data Security Printing Administration PowerPoint Mouse Regulations Word Outlook Politics Machine Learning Lithium-ion Battery Business Technology Computing Saving Time IT Service Samsung Touchscreen Taxes User Error Sports Webcam Heating/Cooling Application End of Support Remote Workers Physical Security HIPAA Upgrades Management Co-Managed IT Assessment Video Surveillance Files Meetings IBM Employees Identity Theft Patch Management Solid State Drive Recycling Piracy Websites USB iPhone Access Control LiFi Business Growth Augmented Reality Settings Legal Chromebook Computer Care Botnet Save Time Uninterrupted Power Supply Software as a Service Monitors Search Phone System Internet Exlporer Electronic Medical Records Mobility Server Management Alerts Virtual Private Network G Suite Smart Technology Wearable Technology Automobile How To Cost Management Bluetooth IoT Hiring/Firing Mobile Security Conferencing Flexibility Travel Data loss Google Drive Remote Monitoring and Management Network Management Display Office Tips Streaming Media Wires Permission Firefox 3D Text Messaging Comparison Nanotechnology Retail Telephony Programming Star Wars E-Commerce Relocation Cabling lenevo Hotspot Google Wallet VoIP Two-factorAuthentication Identity Professional Services IT Budget Shortcut Safety Identities Windows 7 Leadership Work Station Address Cryptocurrency Vulnerabilities Authorization Motion Sickness Data Loss Google Docs Black Market WPA3 Procurement Tracking Managed IT Service Bookmarks Sync Business Intelligence Test Specifications Screen Reader Social Engineering Utility Computing Trojan Features Scheduling Avoiding Downtown Superfish Language Drones Digital Multi-Factor Security Print Server Google Maps Redundancy Permissions Bitcoin Geography Technology Laws IT Technicians Processors Crowdfunding Fleet Tracking Security Cameras Tip of the week Virtual Assistant Phone Systems Break Fix 3D Printing Intranet Enterprise Resource Planning Favorites Mobile Device Managment User Update Skype RMM Cleaning Consultation YouTube Black Friday Smart Tech Java Electronic Health Records Error Disaster Cortana Networking Computing Infrastructure Backups Zero-Day Threat Web Server Spyware Hacking Gaming Console Motherboard Network Congestion Law Enforcement Law Firm IT Monitoring Fraud Hacks Personal Information High-Speed Internet Mirgation Notifications Running Cable Asset Tracking Remote Worker Servers Wasting Time Dark Web Unsupported Software Windows 8.1 Update Mobile Instant Messaging Corporate Profile LinkedIn MSP Tech Terms Computer Accessories Cyber Monday Connectivity Hard Drive Cyberattacks Public Cloud Cooperation Development Webinar Backup and Disaster Recovery Cameras Refrigeration ebay Modem Gadget Consulting Software Tips Emergency Value Cybercrime SharePoint Migration Dark Data Memory OneNote Macro ROI Deep Learning Database Data Warehousing Alt Codes Mobile Data Online Currency Managing Stress Finance WannaCry Staff Emoji Best Available Proactive Theft Staffing Time Management Cache Read Only Disaster Resistance Cables Human Error CCTV CIO Technology Tips Cookies Writing Debate Managed Services Provider Virtual Desktop Downloads Chatbots Crowdsourcing People Employee-Employer Relationship Notes Supercomputer IP Address Voice over Internet Protocol PC Care Remote Support Mail Merge Microsoft Excel Typing Enterprise Content Management Authentication Data Breach Operations Financial GPS Distributed Denial of Service eWaste Administrator Hard Disk Drive Undo Fun Halloween Competition Scary Stories Regulation Presentation Knowledge CrashOverride Buisness 5G Domains Experience Laptop Public Speaking Printers