Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Richland Hills area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Practical Ways to Make Your Smartphone Distraction-Free

b2ap3_thumbnail_no_distraction_celly_400.jpgMobile devices like smartphones and tablets are marketed as powerful productivity tools. However, some workers may find their device’s time-wasting apps to be more of a distraction than an aid to productivity. What’s a distracted smartphone owner to do?

According to a study by mConceirge, 90 percent of Americans actually use their smartphones for work purposes. This is why many businesses are adopting a Bring Your Own Device strategy so that personal devices can be used safely at work and for work. Unfortunately, not every worker has the willpower to forsake a mobile device’s time-wasting apps. For Jake Knapp, blogger and design partner at Google Venture, the struggle is real.

After spending time fighting a losing battle against the distracting power of his smartphone, Knapp began to look for a way out. He told of his experience on the sharing website Medium:

My iPhone made me twitchy. I could feel it in my pocket, calling me, like the Ring called Bilbo Baggins. It distracted me from my kids. It distracted me from my wife. It distracted me anytime, anywhere. I just didn’t have the willpower to ignore email and Twitter and Instagram and the whole world wide web. Infinity in my pocket was too much.

To remedy this problem, Knapp came up with a simple solution; dumb down his smartphone. According to his logic, if he got rid of the most distracting apps and only kept what’s absolutely essential, his phone would no longer have a hold over him. Here are four helpful tips that Knapp came up with in order to make his smartphone less distracting.

  • Disable Safari (or your phone’s Internet browser). For Knapp (and most of us), the Internet is one of the biggest sources of distraction because it’s, as he puts it, “a limitless universe of, y’know, everything.” Most smartphones don’t give the option to delete its Internet browser. However, you can disable it.
  • Delete the email app. Email on your desktop is distracting enough; having your inbox in your pocket is another level of distraction entirely. It’s the nature of email to not be the most urgent form of communication. For example, if someone truly needs an instant response from you, they would call you. Therefore, we think you can get by just fine by only checking your email on your PC.
  • Delete “infinity” apps. Knapp categorizes infinity apps as the apps that one can spend an “infinite” amount of time using. For example, all things social media and even games have a tendency to grab a hold of our attention and never let go. By deleting the worst time-wasting apps on your phone, you will find yourself spending less time glued to your tiny screen.
  • Only keep the apps that you need. Taking a minimalist approach to your smartphone is the best way to keep the distraction levels to a bare minimum. Accomplish this by only keeping apps that have practical value, like your GPS app, text messaging, calculator, etc. If there’s an app on your device that’s designed to waste time in any way, shape, or form, delete it for a happier, healthier, and more focused you.

Can you identify with Knapp’s smartphone addiction problem? What are some ways that you minimize your smartphone’s hold over your life. Share your thoughts in the comments.


No comments yet
Already Registered? Login Here
Tuesday, 25 June 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Software Internet Network Security IT Services Windows 10 Managed Service Provider Backup Computer Ransomware Productivity Innovation Mobile Devices Android Smartphone Outsourced IT Managed IT services Hardware User Tips Google Social Media Data Backup Business Continuity Efficiency Data Browser Communication IT Support Workplace Tips Disaster Recovery Data Recovery Business Management Upgrade Cloud Computing Small Business App Smartphones Data Management Office Remote Monitoring Server Holiday Microsoft Office Managed IT Services Internet of Things Facebook Phishing Office 365 Miscellaneous WiFi Windows IT Support Network Password Encryption Save Money Paperless Office Spam Passwords Artificial Intelligence Gmail Tech Term Big Data Apps Hosted Solution Recovery VoIP communications Robot Employer-Employee Relationship Customer Relationship Management Risk Management Collaboration Bandwidth Firewall Unified Threat Management Mobile Device Management Content Filtering Customer Service How To Downtime Saving Money Remote Computing Infrastructure Wi-Fi Office Tips Government Money Work/Life Balance Document Management Tip of the week Analytics Chrome Cybersecurity Word Hacker Vendor Management Apple Avoiding Downtime Compliance Data storage Mobile Device Computing Antivirus Project Management Applications Operating System Social Managed IT Business Technology Data loss BDR Website Virtual Reality Presentation Business Growth SaaS BYOD Windows 10 Telephone Systems Two-factor Authentication Outlook Settings Vulnerability The Internet of Things Computers Data Security File Sharing Health Automation Hacking Education Mobile Computing Alert IT Management Cybercrime Printing Tech Support Samsung Remote Monitoring and Management Meetings Safety Information Technology IT solutions Net Neutrality Storage Humor Tablet Wireless Technology Wireless Smart Technology Computer Care HIPAA Software as a Service Analyitcs Router Training Mobile Security YouTube Unified Communications Upgrades Specifications Automobile Budget Patch Management LiFi Scam End of Support Mouse User Identity Theft Augmented Reality Legal Retail VPN Running Cable Best Practice Help Desk IBM Virtual Private Network Twitter Lithium-ion battery Business Owner Assessment Managed Service Politics Monitors Licensing Server Management Travel Bring Your Own Device Search Healthcare Google Drive Marketing Consultation Sports Websites Digital Payment Physical Security IT service Going Green Taxes Maintenance Cortana Proactive Botnet Virtualization Regulations Competition Administration Redundancy Typing IT Consultant Corporate Profile Management Fraud Legislation IT Consulting Quick Tips Buisness Zero-Day Threat Machine Learning Operations Social Engineering History Social Networking Computer Repair DFW IT Service eWaste Cryptocurrency IT Sevices Cleaning WannaCry Knowledge Enterprise Resource Planning Notifications Wearable Technology Data Breach Time Management Backup and Disaster Recovery WPA3 Relocation Webcam Cabling Motherboard Electronic Medical Records Google Wallet Environment Bitcoin Experience Mobile Crowdsourcing Staffing Internet Exlporer Dark Data Technology Laws Network Management Procurement Fleet Tracking Private Cloud Point of Sale Distributed Denial of Service Drones Troubleshooting Lenovo Windows 8 VoIP Company Culture GPS IT Technicians Technology Tips Unified Threat Management Touchscreen Remote Worker Asset Tracking Error Google Maps Domains Disaster 5G Modem Entrepreneur Managed IT Service Phone System Shortcut User Error Superfish Digital Vulnerabilities Tracking Application Hotspot Mirgation Comparison business communications systems Users Virtual Assistant Remote Workers Public Speaking Web Server Uninterrupted Power Supply Cookies Update Break Fix Printer Spyware Geography Language Migration 3D Printing Black Friday Internet Protocol Voice over Internet Protocol Information Administrator Cameras Solid State Drive Nanotechnology Chromebook Dark Web Access Control Networking How To Laptop Cables Law Enforcement Hard Drives Computing Infrastructure Network Congestion Chatbots Unsupported Software Cyber Monday VoIP streamlines Heating/Cooling Virtual Desktop Manufacturing Electronic Health Records CCTV Hard Disk Drive IoT Emoji Data Warehousing iPhone SharePoint Firefox Halloween Wires Gadget Supercomputer Refrigeration Alerts Display Identity Mobile Data flu season Hacks business network infrastructure Servers Proactive Maintenance Cyberattacks Deep Learning Fun Utility Computing Microsoft Excel Downloads Techology Scary Stories IT Budget Cooperation Fort Worth Current Events data services Bookmarks Mail Merge G Suite Processors Blockchain Multi-Factor Security Disaster Resistance MSP Undo Staff Software Tips IP Address flu shot PowerPoint Statistics Favorites Motion Sickness Address Alt Codes Cost Management Permissions Google Docs Google Calendar Consumers Proactive IT Employees Flexibility Writing Mobile Office Personal Information Fort Worth IT Bluetooth Conferencing

Top Blog

Let's look at the definition of disaster. dis·as·ter A calamitous event, especially one occurring suddenly and causing great loss of life, damage, or hardship, as a flood, airplane crash, or business failure.To Telesys Voice and Data, a disaster is anything that involves a major loss of data or major downt...