Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

How to Order the Items on Your To-Do List

How to Order the Items on Your To-Do List

Being in business today means that you have a lot on your plate, it’s as simple as that. Yet, with so many tasks piling up, it can be challenging to prioritize them all so you can figure out where to start. Below, we go over some strategies you can use to make sense out of all the tasks you have on your day and reach a point of productivity.

1. Eliminate Non-Starters
If you are not currently able to work on a particular task, it shouldn’t be on your to-do list. Therefore, you need to identify which of your compiled tasks you are actually able to complete, and which you can’t do for reasons outside of your control. Once you have determined these, remove them from your to-do list consideration, or make a point of following up on them. These kinds of tasks will likely only frustrate you and slow you down.

2. Rank Your Tasks by Importance and Urgency
Let’s all be honest here - there are tasks that we all just don’t want to do, which means that there is going to be the temptation to procrastinate doing them until the very last possible moment, hoping that we’ll have the time when it’s down to the wire. However, there are also tasks that unequivocally must be done within a certain timeframe. Yet, even when these two categories overlap, the urge is still there to push back the unwanted task. Resist it - the negative consequences of missing a deadline would be far worse than some frustration now.

3. Determine a Task’s Value
This is related somewhat to the importance and urgency consideration. What item on your to-do list will deliver the greatest benefit to the company as a whole, and a bit more importantly, to your clientele? Alternatively, which task will cause the greatest fallout if it isn’t completed in a timely fashion? By comparing each item on your list to one another in this way, you can arrange them so that the work gets done in the order it needs to.

4. What Does the Boss Want?
What does the person immediately above you in the company hierarchy see to be the priority? Whether or not you necessarily agree with them is moot. They are in charge, so if they want things to be done in a certain way, or certain objectives to take precedence over others, that is their prerogative. This is not to say that you necessarily do things in the order they tell you without question, either. If you see a way to do things that is better, pitch it to them - just make sure you have your counterpoints prepared for the ensuing fallout.

This deciding factor works at all levels of an organization, from entry all the way up to the executive suite. After all, the boss’ boss in any organization is, to a point, the customer.

5. What Are You Ready to Tackle?
It is also important to remember that you’re only human, and there are going to be those days that you just aren’t ready to dive into a big, important project first thing. Knowing your own limits and working style will help you to understand how your time is best spent, which is really the most important factor to productivity.

On a related note, you also want to remember that businesses are dynamic things, and you may suddenly be presented with an urgent, high-priority task - something that your team needs right now. Remaining adaptable and able to pivot between responsibilities is an important talent to develop in business.

Again, it is all about the work that you are prepared to do in the moment. If small tasks need to take precedence over large ones because that’s the only way anything will get done, so be it.

Once you’ve settled on your list, Decatur Computers Inc. can help you execute on it with a variety of IT services and solutions. For more information, reach out to us at 217-475-0226.

Are Your Mobile Security Settings Up to Par?
Is Your Organization Ready for a Disaster
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Tech Term Privacy Business Computing Hackers Productivity Data Software IT Support Data Backup Android Efficiency Innovation Google Business Management Malware User Tips Data Recovery Email Communications Computer Cybersecurity Internet Collaboration Smartphone Cloud Small Business IT Services Backup Windows 10 Phishing Hosted Solutions Communication Managed IT Services Mobile Device Ransomware VoIp Browser Facebook Artificial Intelligence Microsoft Office Social Media Business Technology Hardware BDR Cloud Computing Automation Applications Cybercrime Cost Management Managed Service Blockchain Mobile Devices IT Management Access Control Office 365 Business Outsourced IT Mobile Device Management App Information Data Security Microsoft Patch Management Passwords Scam Apps Websites Encryption Server Gadgets Network Maintenance Smartphones Data Management Two-factor Authentication Hard Drive Managed IT Services Update Saving Money Disaster Recovery Antivirus Workplace Tips Holiday Augmented Reality Windows VPN Law Enforcement Quick Tips Start Menu Bandwidth Vulnerability Laptop Bitcoin Cooperation Operating System Mobility Saving Time Printer Social Engineering Tech Terms Analytics Remote Monitoring Internet of Things Users SaaS Gmail Healthcare Conferencing Business Continuity Project Management Data loss Money Hacking Apple Vendor Search Spam Managed Service Provider Google Maps Save Money Big Data Document Management Word Alert Touchscreen Digital Data Protection Data Breach Vulnerabilities Cryptocurrency Customer Resource management SSID Hard Drive Disposal Compliance Google Docs Gamification Entertainment Unified Threat Management Management Google Play Website Access Service Level Agreement Vendor Management Piracy History Bluetooth VoIP Freedom of Information Settings Twitter Unified Communications Cortana Computing Infrastructure Business Mangement Mouse Username Navigation Virtual Reality Screen Reader Audit Telephone System email scam Regulations Redundancy Budget Data Analysis News Computing Security Cameras Automobile Running Cable Spyware Going Green WiFi Software License IBM Wireless Headphones Knowledge Telephone Systems Mobile Security Administration Printing User Tip Networking Solid State Drive Legislation DDoS Evernote Company Culture Tablet Software as a Service Electronic Medical Records Medical IT IT Support Accountants Content Fileless Malware Best Practice Fake News Error Social Cabling HTML Managed IT Download Bookmark Wireless Corporate Profile Cleaning Time Management Consultant Employer-Employee Relationship Paperless Office Government Addiction Business Cards Virtualization Miscellaneous Identity Theft How to Computer Care Excel Health IT PowerPoint eWaste Training Password Comparison BYOD Directions Unsupported Software Telephone Router Voice over Internet Protocol Virtual Assistant Google Calendar Upload Browsers Information Technology Computers Multi-factor Authentication Database Legal Machine Learning Proxy Server Uninterrupted Power Supply Google Drive SharePoint Tech Desktop Chromebook Virus Tip of the week Professional Services Robot Equifax Specifications Microchip Microsoft Excel Social Network Modem iPhone Worker Devices Outlook Trends Mobile Technology Nanotechnology Unified Threat Management Term Device security Tactics Downloads Network Management Help Desk Downtime Emails Telephony Disaster Distributed Denial of Service Monitoring Upgrades YouTube Backup and Disaster Recovery Sports Samsung Startup Vendor Mangement Emergency Television Travel Processor Multi-Factor Security Retail Windows 10 Managing Stress Marketing Office CrashOverride Printers Office Tips Regulation

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at http://www.decaturcomputers.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.