Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Practical Ways to Make Your Smartphone Distraction-Free

b2ap3_thumbnail_no_distraction_celly_400.jpgMobile devices like smartphones and tablets are marketed as powerful productivity tools. However, some workers may find their device’s time-wasting apps to be more of a distraction than an aid to productivity. What’s a distracted smartphone owner to do?

According to a study by mConceirge, 90 percent of Americans actually use their smartphones for work purposes. This is why many businesses are adopting a Bring Your Own Device strategy so that personal devices can be used safely at work and for work. Unfortunately, not every worker has the willpower to forsake a mobile device’s time-wasting apps. For Jake Knapp, blogger and design partner at Google Venture, the struggle is real.

After spending time fighting a losing battle against the distracting power of his smartphone, Knapp began to look for a way out. He told of his experience on the sharing website Medium:

My iPhone made me twitchy. I could feel it in my pocket, calling me, like the Ring called Bilbo Baggins. It distracted me from my kids. It distracted me from my wife. It distracted me anytime, anywhere. I just didn’t have the willpower to ignore email and Twitter and Instagram and the whole world wide web. Infinity in my pocket was too much.

To remedy this problem, Knapp came up with a simple solution; dumb down his smartphone. According to his logic, if he got rid of the most distracting apps and only kept what’s absolutely essential, his phone would no longer have a hold over him. Here are four helpful tips that Knapp came up with in order to make his smartphone less distracting.

  • Disable Safari (or your phone’s Internet browser). For Knapp (and most of us), the Internet is one of the biggest sources of distraction because it’s, as he puts it, “a limitless universe of, y’know, everything.” Most smartphones don’t give the option to delete its Internet browser. However, you can disable it.
  • Delete the email app. Email on your desktop is distracting enough; having your inbox in your pocket is another level of distraction entirely. It’s the nature of email to not be the most urgent form of communication. For example, if someone truly needs an instant response from you, they would call you. Therefore, we think you can get by just fine by only checking your email on your PC.
  • Delete “infinity” apps. Knapp categorizes infinity apps as the apps that one can spend an “infinite” amount of time using. For example, all things social media and even games have a tendency to grab a hold of our attention and never let go. By deleting the worst time-wasting apps on your phone, you will find yourself spending less time glued to your tiny screen.
  • Only keep the apps that you need. Taking a minimalist approach to your smartphone is the best way to keep the distraction levels to a bare minimum. Accomplish this by only keeping apps that have practical value, like your GPS app, text messaging, calculator, etc. If there’s an app on your device that’s designed to waste time in any way, shape, or form, delete it for a happier, healthier, and more focused you.

Can you identify with Knapp’s smartphone addiction problem? What are some ways that you minimize your smartphone’s hold over your life. Share your thoughts in the comments.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Sunday, 15 September 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Network Security Internet IT Services Computer Windows 10 Productivity Managed Service Provider Backup Ransomware Innovation Mobile Devices Outsourced IT Android Smartphone Data Backup Business Continuity Hardware User Tips Google Managed IT services Social Media Upgrade Data Recovery Data Efficiency Browser Communication IT Support Disaster Recovery Workplace Tips Small Business Business Management Cloud Computing Managed IT Services Smartphones App IT Support Data Management Office Server Remote Monitoring Holiday Internet of Things Microsoft Office Phishing Office 365 Windows Miscellaneous WiFi Facebook Network Paperless Office communications Password Tech Term VoIP Artificial Intelligence Gmail Spam Big Data Passwords Save Money Encryption Collaboration Employer-Employee Relationship Saving Money Document Management Risk Management Customer Relationship Management Unified Threat Management Bandwidth Firewall Apps Robot Hosted Solution Recovery Infrastructure Wi-Fi Customer Service Managed IT Mobile Device Management Office Tips Operating System Windows 10 Tip of the week Remote Computing Analytics Vendor Management Compliance Cybersecurity Word Hacker Chrome How To Content Filtering Apple Government Avoiding Downtime Money Work/Life Balance Downtime Business Technology Telephone Systems File Sharing Two-factor Authentication Settings Healthcare Presentation Business Growth Automation The Internet of Things Going Green Computers Vulnerability Alert Help Desk Printing Outlook Data Security Data storage Applications Computing Education IT Management Cybercrime Health Virtual Reality Training Mobile Device Antivirus SaaS Hacking BYOD Social Mobile Computing Project Management Data loss Website Tech Support BDR Mouse YouTube Information Technology Unified Communications Legal Humor Display LiFi Twitter Analyitcs Monitors Managed Service Politics Travel Patch Management Scam Identity Theft Google Drive Websites Physical Security Augmented Reality Regulations Taxes Specifications Proactive IBM Running Cable Botnet VPN Net Neutrality Assessment Samsung Remote Monitoring and Management User Server Management Licensing Meetings Bring Your Own Device Search Windows 7 Virtual Private Network Smart Technology Consultation Digital Payment Sports Storage HIPAA Retail IT service Software as a Service Maintenance Cortana Router Virtualization Mobile Security Best Practice Computer Care Administration Lithium-ion battery Business Owner IT solutions Safety Marketing Wireless Technology Tablet Upgrades Wireless Automobile Budget Laptops Competition Access Control End of Support Administrator 3D Printing Information Chatbots RMM Cyber Monday Data Warehousing Cameras VoIP Windows 8 Chromebook GPS IoT Active Directory Network Congestion Cables eWaste Domains Technology Laws Alerts Touchscreen SharePoint Law Enforcement Google Maps Disaster Unsupported Software Monitoring 5G Identity Procurement Entrepreneur flu season IT Sevices Application Lenovo Microsoft Excel CCTV Digital Emoji Tracking Utility Computing Windows Server Users Wires Environment Public Speaking Unified Threat Management Cooperation Downloads Gadget Uninterrupted Power Supply Mobile Data Electronic Health Records Hacks Remote Worker Shortcut Fort Worth Superfish Blockchain Spyware User Management Troubleshooting business communications systems Staff Multi-Factor Security Solid State Drive Cyberattacks Current Events Professional Services flu shot Hard Drives Permissions G Suite How To Processors Laptop Cost Management Batteries Virtual Desktop MSP Internet Protocol Flexibility Phone System Heating/Cooling Google Calendar Motion Sickness Hard Disk Drive Virtual Assistant Fort Worth IT Refrigeration Networking Fraud Firefox Supercomputer Halloween Google Docs Recycling Remote Work Writing VoIP streamlines Operations Bookmarks Servers Legislation Deep Learning Personal Information Fun Social Networking Voice over Internet Protocol DFW IT Service IT Consultant IT Budget Scary Stories Management File Management Social Engineering business network infrastructure Wearable Technology Favorites Machine Learning Computer Repair Motherboard Undo Techology Internet Exlporer Cleaning Notifications Enterprise Resource Planning WPA3 iPhone IP Address Conferencing Statistics Relocation Software Tips Webcam Alt Codes Electronic Medical Records Google Wallet Manufacturing Mail Merge Distributed Denial of Service Mobile Disaster Resistance data services Crowdsourcing Dark Data Fleet Tracking Mobile Office IT Technicians Employees Bluetooth Technology Tips Private Cloud Managed IT Service Point of Sale Corporate Profile Typing Drones Modem Proactive Maintenance Address Company Culture Proactive IT Hotspot Quick Tips User Error Buisness Asset Tracking Mirgation Zero-Day Threat Comparison Error History Redundancy Break Fix WannaCry Cryptocurrency Knowledge Cookies Processor Vulnerabilities IT Consulting Language PowerPoint Time Management Printer Cabling Remote Workers Migration Backup and Disaster Recovery Mobility Black Friday Dark Web Web Server Bitcoin Update Staffing Experience Nanotechnology Consumers Geography Data Breach Computing Infrastructure Network Management

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...
QR-Code