facebook linkedin twitter

How to Order the Items on Your To-Do List

How to Order the Items on Your To-Do List

Being in business today means that you have a lot on your plate, it’s as simple as that. Yet, with so many tasks piling up, it can be challenging to prioritize them all so you can figure out where to start. Below, we go over some strategies you can use to make sense out of all the tasks you have on your day and reach a point of productivity.

1. Eliminate Non-Starters
If you are not currently able to work on a particular task, it shouldn’t be on your to-do list. Therefore, you need to identify which of your compiled tasks you are actually able to complete, and which you can’t do for reasons outside of your control. Once you have determined these, remove them from your to-do list consideration, or make a point of following up on them. These kinds of tasks will likely only frustrate you and slow you down.

2. Rank Your Tasks by Importance and Urgency
Let’s all be honest here - there are tasks that we all just don’t want to do, which means that there is going to be the temptation to procrastinate doing them until the very last possible moment, hoping that we’ll have the time when it’s down to the wire. However, there are also tasks that unequivocally must be done within a certain timeframe. Yet, even when these two categories overlap, the urge is still there to push back the unwanted task. Resist it - the negative consequences of missing a deadline would be far worse than some frustration now.

3. Determine a Task’s Value
This is related somewhat to the importance and urgency consideration. What item on your to-do list will deliver the greatest benefit to the company as a whole, and a bit more importantly, to your clientele? Alternatively, which task will cause the greatest fallout if it isn’t completed in a timely fashion? By comparing each item on your list to one another in this way, you can arrange them so that the work gets done in the order it needs to.

4. What Does the Boss Want?
What does the person immediately above you in the company hierarchy see to be the priority? Whether or not you necessarily agree with them is moot. They are in charge, so if they want things to be done in a certain way, or certain objectives to take precedence over others, that is their prerogative. This is not to say that you necessarily do things in the order they tell you without question, either. If you see a way to do things that is better, pitch it to them - just make sure you have your counterpoints prepared for the ensuing fallout.

This deciding factor works at all levels of an organization, from entry all the way up to the executive suite. After all, the boss’ boss in any organization is, to a point, the customer.

5. What Are You Ready to Tackle?
It is also important to remember that you’re only human, and there are going to be those days that you just aren’t ready to dive into a big, important project first thing. Knowing your own limits and working style will help you to understand how your time is best spent, which is really the most important factor to productivity.

On a related note, you also want to remember that businesses are dynamic things, and you may suddenly be presented with an urgent, high-priority task - something that your team needs right now. Remaining adaptable and able to pivot between responsibilities is an important talent to develop in business.

Again, it is all about the work that you are prepared to do in the moment. If small tasks need to take precedence over large ones because that’s the only way anything will get done, so be it.

Once you’ve settled on your list, Computerware can help you execute on it with a variety of IT services and solutions. For more information, reach out to us at (703) 821-8200.

Look to Technology to Shift Your Business’ Prospec...
Is Your Organization Ready for a Disaster
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, November 17, 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Software Business Computing Hackers Microsoft Managed Service Provider Backup Workplace Tips Productivity Data Hardware Saving Money Business Email Malware IT Services Network Security Efficiency IT Support Hosted Solutions Google Small Business Computer Smartphones User Tips Quick Tips Mobile Devices Gadgets Business Continuity Disaster Recovery Innovation Microsoft Office Mobile Office Virtualization Network Android Social Media Collaboration Server VoIP Mobile Device Management Communication Smartphone Miscellaneous Data Backup Windows 10 Upgrade Ransomware IT Support Windows Productivity Tech Term Data Recovery Unified Threat Management Remote Monitoring Passwords Operating System Mobile Computing Holiday BYOD Remote Computing Managed IT services Vendor Management BDR Apps communications Facebook WiFi Cybersecurity The Internet of Things Marketing Analytics Users Firewall Mobile Device Phishing Outsourced IT Automation History Apple Managed IT Services Data Management Internet of Things Alert Browser Save Money Big data Artificial Intelligence App Encryption IT Consultant Content Filtering Going Green Spam Bring Your Own Device Maintenance Antivirus Gmail Bandwidth Office Health Business Technology Lithium-ion Battery Best Practice Information Technology Cost Management Windows 8 Outlook Office 365 Hiring/Firing Hard Drives Help Desk Budget Wireless Technology Printer Two-factor Authentication Virus Tech Support Search Managed IT Cybercrime Hacking IBM Money Cloud Computing Document Management Saving Time Computers VPN Travel Training Recovery Employer-Employee Relationship Update Phone System Hard Drive It Management Blockchain Networking Legal Managed Service Save Time Regulations Windows 10 SaaS Running Cable Proactive IT Humor Customer Service Administration Law Enforcement Intranet Compliance Website Education Government Access Control Data storage Risk Management Data Security Applications Current Events Laptop Value Business Intelligence Password Cortana Business Growth Google Maps Digital Payment Mobility Patch Management Excel Hacker Data Loss Downtime Social Engineering Customer Relationship Management Comparison Tablet Augmented Reality Paperless Office Fax Server Data Breach Company Culture PowerPoint Sports User Computing Computer Repair Disaster Project Management End of Support Social Networking Digital Hosted Solution Robot Information Websites Machine Learning Wireless Securty Twitter Telephone Systems DDoS Solid State Drive Avoiding Downtime Flexibility Black Market Cryptocurrency File Sharing Word iPhone Net Neutrality Data Protection Pain Points eWaste Google Docs Co-managed IT Experience Chrome User Error Monitors Virtual Reality Cleaning Politics Conferencing Automobile Router Emails Office Tips Scam Chromebook Processors Computer Accessories Redundancy YouTube Computing Infrastructure Hack Lifestyle USB Trending Monitoring How To Presentation Gaming Console Unified Communications Settings Download Mouse Private Cloud Webcam Specifications Safety Text Messaging Virtual Desktop Statistics Management Programming Telephony Social Start Menu Tech Terms IT service Network Congestion Microchip Taxes Documents Heating/Cooling Vulnerabilities Distributed Denial of Service Entertainment Mobile Technology Healthcare Storage Software as a Service Public Cloud Vendor Uninterrupted Power Supply Bluetooth Streaming Media Inbound Marketing Identity Theft Retail Bitcoin Screen Reader Customer Resource management User Tip Public Speaking Visible Light Communication Memory Gamification Notifications CCTV Windows 7 Shortcut IT consulting Piracy Upload Business Metrics Computer Malfunction Navigation cache Television Device Management Smart Tech Distribution Reliable Computing Fiber-Optic Database Business Managemenet In Internet of Things Webinar Data Analysis Troubleshooting WannaCry Downloads HTML Content Management Entrepreneur Telephone System HIPAA Corporate Profile Upselling Advertising Flash Mobile Security Environment Time Management Freedom of Information CIO Competition Windows XP Software License Trends Motion Sickness Electronic Payment Assessment SharePoint Video Surveillance Staffing Google Wallet Multi-Factor Security online Currency Cost Scalability Tip of the week Saving ZTime Displays Fraud Tactics Fileless Malware Business Owner Google Calendar Society Devices Messenger Tracking Micrsooft LinkedIn Proxy Server IP Address VoIP UTM Content Rental Service Meetings Touchscreen News Cabling Best Practives Electronic Medical Records Application Knowledge Harddrive IT Plan Enterprise Resource Planning Web Server Human Resources Consultation Evernote Debate Drones Legislation Error Virtual Assistant email scam Addiction Skype Wi-Fi Administrator Directions Technology Tips GPS Accountants Archive A.I. Books Workers Dark Web Audit Permissions Language Multi-factor Authentication Supercomputer Microserver External Harddrive Fake News Worker Health IT Digital Signature Migration Point of Contact Connected Devices Data Warehousing Wireless Headphones Telephone Emergency Hard Drive Disposal Thin CLient switches Writing Network Management Managed IT Service Access 3D Ebay Music Equifax Fleet Tracking Reading Samsung Get More Done Teamwork Upgrades G Suite Printer Server Bookmark Computer Care Device security MSP Employer Employee Relationship Turn Key Smart Phones Microsoft Excel Licensing Trojan LiFi Desktop Finance Analytic Hacks Physical Security PDF Google Drive Windows Server 2008 Recycling Nanotechnology Social Network Best Available Keyboard Vulnerability Leadership Business Cards Service Level Agreement Product Reviews Banking Botnet Organize Processor Spyware Mobile Payment Adminstration Pirating Information Startup Asset Tracking Relocation Tablets Deep Learning Unified Threat Management Backup and Disaster Recovery Sync Browsers Domains Electricity Printing Work/Life Balance Username Read 3D Printing Printers Managing Stress CrashOverride Regulation Capital Productuvuty

toner1