631-905-9617    Get SUPPORT

Suffolk Computer Consultants Blog

Tip of the Week: Solve (Don’t Complicate) Problems

Tip of the Week: Solve (Don’t Complicate) Problems

Have you ever heard someone refer to an activity as “yak shaving?” Also known as “bikeshedding,” this is effectively a way to describe a specific kind of procrastination. For this week’s tip, we’ll explore how a freshly barbered yak relates to your business’ productivity, and how to keep you and your employees on the right track.

What Does Yak Shaving Have to Do With My Business?
Literally? Probably nothing, but as a metaphor, quite a bit. The Yak Shaving example presents a hypothetical scenario depicting the worst kind of procrastination: semi-defensible.

Let’s walk through such a scenario: You need to complete a proposal, but you’re tired and having difficulty concentrating. However, when you go to the break room, you find that there’s no coffee. Uh oh. So, you figure you need to make sure that the company has more… but you’re really tired, so ordinary coffee just isn’t going to cut it. Therefore, you start researching the most potent coffee beans in the world, which just so happen to be grown on a remote island, and can only be harvested by a yak. Great, now you need a yak. Hopping on a plane, you fly to the Himalayas to procure a yak - but wait! This coffee-bean island is located in a very temperate climate, so it would be cruel to bring a shaggy yak there still covered in its thick, insulating fur. You simply have to shave it. Only once you have shaved your yak free of all that oppressive hair, will you be able to bring it to this coffee-bean island so that you can brew a potent enough cup of coffee to finally, finally complete your proposal.

Obviously, this example is ridiculous, but only because it is an overly exaggerated version of the “logic” that many turn to in the attempt to avoid a less-desirable task.

We’ve all been in a position where the prospect of working on a particular task is so unappealing to us in a given moment, that we will do anything we can to avoid it - even if that means prolonging the preparation of this task. However, once we can recognize that we’re approaching a yak with a razor, we can correct this behavior and resume worthwhile, productive work.

How to Identify (and Overcome) Your Hairy Yaks
If you find that you have a propensity for procrastination of this kind, there are ways that you can work on your problems.

The first step is, like so many things, to develop the ability to recognize your tendencies. Consider the tasks that you have lined up for yourself - how many actually need to be completed in order to proceed toward the ultimate goal? While any plan will have a few legitimate problems, seeking out excuses is a sure sign of procrastinating what really needs to be done.

However, this doesn’t entirely discount the value that your particular yak can provide you - after all, to get to the yak-shaving portion of your problem-solving process, you will have to have collected quite a bit of insight. In turn, this means that there’s a fair chance that you know a better way to approach your challenge - which means you have the option to do something that may seem somewhat extreme.

Your Costs Thus Far Are an Investment
By nature, any hairy yak problem will be a time-consuming endeavor - time-consuming to the point that, even when you discover the better answer, it may not seem worth it. After all, you’ve already put so much time into the one approach, why let all that time go to waste?

At the end of the day, the successful completion of your actual goal needs to outweigh any frustration you may feel at your process of completing it. The results are what matter - so, regardless of if you’ve been working on a problem for minutes, hours, or weeks, don’t be afraid to go back to the drawing board if a better way pops up.

Suffolk Computer Consultants is in the business of delivering optimized solutions to meet your business’ needs, eliminating any excuse your employees may have to shave a yak. To learn more about what we offer, feel free to explore our website, or call us at 631-905-9617.

Is Your Business a Target for Internet-Based Threa...
New Technologies You’ll Soon See in Smartphones


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, April 24 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Network Security Productivity User Tips Cybersecurity Microsoft Malware Smartphones Google Communication Tech Term Managed IT Services Communications Business Internet Efficiency Hackers Backup Hardware Email Outsourced IT Passwords Software Innovation Business Management Data Small Business Hosted Solutions Browser Ransomware Windows 10 Android Data Backup Users Data Recovery IT Services Bandwidth VoIP Collaboration Mobile Devices Wi-Fi Mobile Device Managed IT Services IT Support Apps Save Money Microsoft Office Internet of Things Smartphone Cloud Computing Network Social Media Applications Alert Holiday Computer Access Control Password Twitter Gadgets Office Miscellaneous Business Intelligence Saving Money Employer-Employee Relationship Wireless Workplace Tips Router Chrome BDR Marketing Word Blockchain Excel Information Government Office 365 Paperless Office Automation Data Management Analytics Settings Patch Management Vulnerability Networking VoIP Phishing Virtualization Data Breach Business Continuity Facebook Virus Battery Retail Productivity Cortana Virtual Assistant VPN Remote Monitoring and Management App Workers Healthcare How To Hacking Computers BYOD Medical IT Net Neutrality Website Wireless Charging Data Protection Data Security IT Support Artificial Intelligence Physical Security Managed IT Service Cost Management Company Culture Mobility Gmail Politics Spam Managed Service Remote Monitoring Law Enforcement Mobile Device Management Windows Dark Web WiFi Cybercrime Compliance G Suite Value Scam Tech Terms Connectivity Tip of the week Remote Computing Wireless Internet Google Maps Laptop Entertainment Printing Biometrics Tech Support Specifications Chrome OS Bring Your Own Device Shortcut Spyware Disaster Recovery Spam Blocking Business Technology Proactive IT instant Messaging Data loss Recovery Unified Communications Safety eCommerce Troubleshooting Copy Apple Voice over Internet Protocol Wearables Network Attached Storage Cleaning Streaming Media Printers Telecommuting Touchscreen Operating System Maintenance Help Desk Paper Access Multi-Factor Security Conferencing Reporting Human Resources Technology Tips Hybrid Cloud CrashOverride News Spotify HP Database Email Management Sales Vulnerabilities Staff RAM Licensing Online Shopping Update Big Data Paste iPhone Server Management Downloads Millennials Microsoft Office 365 WannaCry Antivirus Environment Certification Personal Information Ink Content Filtering Employee-Employer Relationship Hiring/Firing Backup and Disaster Recovery Telephone System Outlook Document Management Education Tactics Smart Technology Tablet Analysis Cryptocurrency Websites Microsoft Teams Phone System Travel Upgrade Amazon Trends Authentication Work/Life Balance HIPAA e-waste IT budget SaaS PowerPoint GDPR Electronic Health Records Managed IT SSD Profitability Office Tips Automobile Digital Internet Explorer Knowledge Botnet Managing Stress Live Streaming disposal Telephone Systems File Sharing E-Commerce Machine Learning A.I. Staffing Files Telephony Authorization Hard Drive Training IT Management Sports User Tip Storage Health Inventory Remote Support Eliminating Downtime Edge Threat Information Technology Two-factor Authentication Google Drive Comparison Time Management Hard Drives Dongle Gadget WhatsApp Processors Remote Control User Security Plug-In Payment Telecommute Movies Voice over IP Cables Security Cameras Printer Server Error Employees Server Lead Generation Mobile Security Hosted Solution Regulation Autocorrect Wireless Technology 5G Avoiding Downtime Unified Threat Management IBM Emergency The Internet of Things Dark Data Hacker Solid State Drive Scheduling Samsung Leadership Budget Current Events Customer Relationship Management Managed Service Provider Competition DDoS Computer Care IP Address Hard Disk Drive Instagram Money Employer Employee Relationship Customer Service Fun Gaming Console Mobile Office Freedom of Information Domains Windows 7 Scalability Windows 10 Video Games Synergy Yahoo IaaS Encryption Worker Public Speaking Television Credit Cards Presentation Emoji Search Lithium-ion battery Quick Tips Augmented Reality HaaS Vendor Management Printer

Newsletter Sign Up