SlideShare a Scribd company logo
4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong
https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 1/3
The Productivity Myth: How Modern Enterprises Are
Getting Work Wrong
Burnout among knowledge workers is a widespread occurrence and a driving factor in The Great
Resignation and Great Reshuffle movements afflicting many businesses.
Burnout and hybrid working circumstances have sparked rising worries among many CEOs about
their staff’s productivity, particularly their knowledge workers. Businesses have responded to this
trend by loosening limitations on when and where employees can work. In many situations,
productivity was maintained or even increased during the depths of the Covid crisis simply by
changing commute time to work time and eliminating the social distractions inherent in typical office
environments. 
However, it is doubtful that productivity based on these elements can be sustained in the long run.
Entrepreneurs have recognized these growing problems and are developing new technologies for
monitoring knowledge worker productivity in today’s geographically dispersed, virtual-first,
asynchronous workplace. Regrettably, many, if not all, of these tools are built on faulty principles. The
productivity of knowledge workers is fundamentally ambiguous and nearly hard to assess. The
following fallacies underpin the tools that profess to do so.
Myth 1: Workplace activity is a metric for productivity
Productivity is easy to quantify when it results in manufacturing or delivering real products, such as
automobile manufacturing or cable box installation. It is difficult to quantify when it results in the
generation or distribution of information or is intended to affect human behavior. Collaboration
activity metrics are much more problematic. Excessive dependence on tools may actually work
against the productivity gains expected by the technologies.
Myth 2: Time utilization is a measure of productivity
By Swapnil Miahra - April 27, 2022
4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong
https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 2/3
There is a prevalent belief that specific ways of spending time are extremely productive, while others
are only slightly effective. Concentrating on a single task over an extended period of time, as
demonstrated by the usage of a single business application or the time committed to a single
project, is often regarded to be a productive use of time. Meetings, exchanging text messages, and
processing email are typically regarded as necessary evils that obstruct actual work. However, a
substantial amount of productive work may be performed through a lively exchange of conversations
among a geographically distributed team.
Also Read: Four Approaches to Retain IT Talent after the Great Resignation
Myth 3: Knowledge workers can assess their own productivity.
Survey instruments are regularly used to ascertain how satisfied individuals are with various sorts of
activity. There is a widespread belief that job contentment is connected to job productivity and hence
that a contented employee is a productive employee. Regrettably, there is little empirical support for
this assumption.
Myth 4: The time and effort of knowledge workers are closely tied to financial business outcomes
This is one of the most disappointing and difficult myths to embrace, as IT [professionals well
understand.
 While IT companies constantly deliver new capabilities to their business partners, it is up to the
partners to maximize revenue and profit. Due to the difficulty in correlating financial results to the
efficiency of knowledge labor, a number of the operational indicators that are typically used to assess
the productivity of software engineering teams, accounting departments, and contact centers, cannot
be taken as correct. If financial measurements are first indicators of business performance, and
operational metrics are second-order indicators, employee activity, time utilization, and job
satisfaction are at best tertiary indicators of business success.
These so-called productivity tools may give valuable information about how employees use their time
and engage with co-workers but fail to measure productivity. The attempts managers make to boost
their team’s productivity through these technologies are fruitless. 
At the end of the day, it’s a comfort level, a work life balance and job satisfaction that make a
satisfied employee.
Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google
News Enterprisetalk News.
Swapnil Miahra

4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong
https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 3/3


More Related Content

Similar to The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf

5 ways digital work management is driving a new productivity revolution
5 ways digital work management is driving a new productivity revolution5 ways digital work management is driving a new productivity revolution
5 ways digital work management is driving a new productivity revolution
📈 Aaron Ripper
 
Mastering Internal Communication: Connect Your Mission and Manpower
Mastering Internal Communication: Connect Your Mission and ManpowerMastering Internal Communication: Connect Your Mission and Manpower
Mastering Internal Communication: Connect Your Mission and Manpower
Ving
 
The Ultimate Guide to Frontline Success in 2023
The Ultimate Guide to Frontline Success in 2023The Ultimate Guide to Frontline Success in 2023
The Ultimate Guide to Frontline Success in 2023
Jessica Ruane
 
Maximising your costliest assets
Maximising your costliest assetsMaximising your costliest assets
Maximising your costliest assets
Olive Communications
 
COVID-19: The future of organisations and the future of technical communication
COVID-19: The future of organisations and the future of technical communicationCOVID-19: The future of organisations and the future of technical communication
COVID-19: The future of organisations and the future of technical communication
Ellis Pratt
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3Waseem Saeed
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
Cognizant
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
Microsoft
 
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote EmploymentThe Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
crystaldnetwork
 
Condeco | Flexible Work e-Book | Slideshare
Condeco | Flexible Work e-Book | SlideshareCondeco | Flexible Work e-Book | Slideshare
Condeco | Flexible Work e-Book | Slideshare
Condeco
 
Digital-skills-gap-whitepaper
Digital-skills-gap-whitepaperDigital-skills-gap-whitepaper
Digital-skills-gap-whitepaper
Liberteks
 
Social Media in the Workplace - Are We Nearly There?
Social Media in the Workplace - Are We Nearly There?Social Media in the Workplace - Are We Nearly There?
Social Media in the Workplace - Are We Nearly There?
Infor HCM
 
The Complete Guide to Enterprise Work Management
The Complete Guide to Enterprise Work Management The Complete Guide to Enterprise Work Management
The Complete Guide to Enterprise Work Management Blake Howell
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource Management
Navitha Pereira
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
Michelle Singh
 
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdfGuide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
andinieldananty
 
Reduce the Internal and External Interruptions and Improving Communications u...
Reduce the Internal and External Interruptions and Improving Communications u...Reduce the Internal and External Interruptions and Improving Communications u...
Reduce the Internal and External Interruptions and Improving Communications u...
IRJET Journal
 
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
Melissa Luongo
 
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience  7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
Mighty Guides, Inc.
 

Similar to The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf (20)

5 ways digital work management is driving a new productivity revolution
5 ways digital work management is driving a new productivity revolution5 ways digital work management is driving a new productivity revolution
5 ways digital work management is driving a new productivity revolution
 
Mastering Internal Communication: Connect Your Mission and Manpower
Mastering Internal Communication: Connect Your Mission and ManpowerMastering Internal Communication: Connect Your Mission and Manpower
Mastering Internal Communication: Connect Your Mission and Manpower
 
The Ultimate Guide to Frontline Success in 2023
The Ultimate Guide to Frontline Success in 2023The Ultimate Guide to Frontline Success in 2023
The Ultimate Guide to Frontline Success in 2023
 
Maximising your costliest assets
Maximising your costliest assetsMaximising your costliest assets
Maximising your costliest assets
 
COVID-19: The future of organisations and the future of technical communication
COVID-19: The future of organisations and the future of technical communicationCOVID-19: The future of organisations and the future of technical communication
COVID-19: The future of organisations and the future of technical communication
 
Organizational Behavior Question#3
Organizational Behavior Question#3Organizational Behavior Question#3
Organizational Behavior Question#3
 
Operations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First ApproachOperations Workforce Management: A Data-Informed, Digital-First Approach
Operations Workforce Management: A Data-Informed, Digital-First Approach
 
The Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT ProfessionalsThe Benefits of Enterprise Social for IT Professionals
The Benefits of Enterprise Social for IT Professionals
 
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote EmploymentThe Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
The Future Unveiled: Unraveling The Forecasts And Wisdom Of Remote Employment
 
Condeco | Flexible Work e-Book | Slideshare
Condeco | Flexible Work e-Book | SlideshareCondeco | Flexible Work e-Book | Slideshare
Condeco | Flexible Work e-Book | Slideshare
 
Digital-skills-gap-whitepaper
Digital-skills-gap-whitepaperDigital-skills-gap-whitepaper
Digital-skills-gap-whitepaper
 
Social Media in the Workplace - Are We Nearly There?
Social Media in the Workplace - Are We Nearly There?Social Media in the Workplace - Are We Nearly There?
Social Media in the Workplace - Are We Nearly There?
 
The Complete Guide to Enterprise Work Management
The Complete Guide to Enterprise Work Management The Complete Guide to Enterprise Work Management
The Complete Guide to Enterprise Work Management
 
A Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource ManagementA Report On The Influence Of Technology On Human Resource Management
A Report On The Influence Of Technology On Human Resource Management
 
Organization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The WorkflowOrganization And Technical Aspects Of The Workflow
Organization And Technical Aspects Of The Workflow
 
Information Management White Paper
Information Management White PaperInformation Management White Paper
Information Management White Paper
 
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdfGuide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
Guide-Knowledge ManagementinTodaysDigitalWorkplace.pdf
 
Reduce the Internal and External Interruptions and Improving Communications u...
Reduce the Internal and External Interruptions and Improving Communications u...Reduce the Internal and External Interruptions and Improving Communications u...
Reduce the Internal and External Interruptions and Improving Communications u...
 
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
Yorktel Whitepaper: Save Money, Leverage Time Return on Engagement Using Coll...
 
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience  7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
 

More from Enterprise Insider

Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdfFive Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Enterprise Insider
 
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdfDark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Enterprise Insider
 
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Enterprise Insider
 
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdfThree Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Enterprise Insider
 
Communication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdfCommunication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdf
Enterprise Insider
 
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Enterprise Insider
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Enterprise Insider
 
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Enterprise Insider
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Enterprise Insider
 
Why MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdfWhy MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdf
Enterprise Insider
 
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdfFour Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Enterprise Insider
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Enterprise Insider
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Enterprise Insider
 
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdfIndispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Enterprise Insider
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
Enterprise Insider
 
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Enterprise Insider
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Enterprise Insider
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
Enterprise Insider
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Enterprise Insider
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdf
Enterprise Insider
 

More from Enterprise Insider (20)

Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdfFive Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
Five Essential Techniques to Prevent Data Leaks - ITSecurityWire.pdf
 
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdfDark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
Dark Data Management_ Mitigating the Risks of the Invisible - EnterpriseTalk.pdf
 
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
Tips to Overcome Integration Challenges of Modern Enterprises - EnterpriseTal...
 
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdfThree Strategies for Fostering Teamwork in a Hybrid Setting.pdf
Three Strategies for Fostering Teamwork in a Hybrid Setting.pdf
 
Communication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdfCommunication is Key to Addressing Ransomware and Extortion.pdf
Communication is Key to Addressing Ransomware and Extortion.pdf
 
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
Addressing SaaS Security Challenges with Comprehensive SaaS Management - ITSe...
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
Addressing Risks Associated with Extended Software Supply Chain - ITSecurityW...
 
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdfThree Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
Three Key Ways OEMs Can Mitigate Their Cyber-Threat Risk.pdf
 
Why MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdfWhy MLOps is Essential for AI-enabled Enterprises.pdf
Why MLOps is Essential for AI-enabled Enterprises.pdf
 
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdfFour Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
Four Third-Party Risk Cyber Gaps that Businesses Need to be Aware of in 2022.pdf
 
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdfFour Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
Four Ways Businesses Can Secure Themselves from Digital Supply Chain Attacks.pdf
 
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdfWhy CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
Why CISOs Need a New Approach to Enhance Attack Surface Visibility.pdf
 
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdfIndispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
Indispensable Role Of CTOs and CIOs in Advancing Technological Change.pdf
 
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdfHow Enterprises Can Strengthen Their Threat Detection and Response.pdf
How Enterprises Can Strengthen Their Threat Detection and Response.pdf
 
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdfWhy Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
Why Data-Centric Security Needs to be a Top Priority for Enterprises.pdf
 
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdfFour Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
Four Steps to Boosting Cybersecurity Hygiene - ITSecurityWire.pdf
 
Three Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdfThree Ways To Secure Cloud Migration.pdf
Three Ways To Secure Cloud Migration.pdf
 
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdfFive Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
Five Strategies for Enterprises to Secure their Kubernetes Clusters.pdf
 
Four Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdfFour Key Attributes of a Successful CISO.pdf
Four Key Attributes of a Successful CISO.pdf
 

Recently uploaded

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 

Recently uploaded (20)

GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 

The Productivity Myth_ How Modern Enterprises Are Getting Work Wrong.pdf

  • 1. 4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 1/3 The Productivity Myth: How Modern Enterprises Are Getting Work Wrong Burnout among knowledge workers is a widespread occurrence and a driving factor in The Great Resignation and Great Reshuffle movements afflicting many businesses. Burnout and hybrid working circumstances have sparked rising worries among many CEOs about their staff’s productivity, particularly their knowledge workers. Businesses have responded to this trend by loosening limitations on when and where employees can work. In many situations, productivity was maintained or even increased during the depths of the Covid crisis simply by changing commute time to work time and eliminating the social distractions inherent in typical office environments.  However, it is doubtful that productivity based on these elements can be sustained in the long run. Entrepreneurs have recognized these growing problems and are developing new technologies for monitoring knowledge worker productivity in today’s geographically dispersed, virtual-first, asynchronous workplace. Regrettably, many, if not all, of these tools are built on faulty principles. The productivity of knowledge workers is fundamentally ambiguous and nearly hard to assess. The following fallacies underpin the tools that profess to do so. Myth 1: Workplace activity is a metric for productivity Productivity is easy to quantify when it results in manufacturing or delivering real products, such as automobile manufacturing or cable box installation. It is difficult to quantify when it results in the generation or distribution of information or is intended to affect human behavior. Collaboration activity metrics are much more problematic. Excessive dependence on tools may actually work against the productivity gains expected by the technologies. Myth 2: Time utilization is a measure of productivity By Swapnil Miahra - April 27, 2022
  • 2. 4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 2/3 There is a prevalent belief that specific ways of spending time are extremely productive, while others are only slightly effective. Concentrating on a single task over an extended period of time, as demonstrated by the usage of a single business application or the time committed to a single project, is often regarded to be a productive use of time. Meetings, exchanging text messages, and processing email are typically regarded as necessary evils that obstruct actual work. However, a substantial amount of productive work may be performed through a lively exchange of conversations among a geographically distributed team. Also Read: Four Approaches to Retain IT Talent after the Great Resignation Myth 3: Knowledge workers can assess their own productivity. Survey instruments are regularly used to ascertain how satisfied individuals are with various sorts of activity. There is a widespread belief that job contentment is connected to job productivity and hence that a contented employee is a productive employee. Regrettably, there is little empirical support for this assumption. Myth 4: The time and effort of knowledge workers are closely tied to financial business outcomes This is one of the most disappointing and difficult myths to embrace, as IT [professionals well understand.  While IT companies constantly deliver new capabilities to their business partners, it is up to the partners to maximize revenue and profit. Due to the difficulty in correlating financial results to the efficiency of knowledge labor, a number of the operational indicators that are typically used to assess the productivity of software engineering teams, accounting departments, and contact centers, cannot be taken as correct. If financial measurements are first indicators of business performance, and operational metrics are second-order indicators, employee activity, time utilization, and job satisfaction are at best tertiary indicators of business success. These so-called productivity tools may give valuable information about how employees use their time and engage with co-workers but fail to measure productivity. The attempts managers make to boost their team’s productivity through these technologies are fruitless.  At the end of the day, it’s a comfort level, a work life balance and job satisfaction that make a satisfied employee. Check Out The New Enterprisetalk Podcast. For more such updates follow us on Google News Enterprisetalk News. Swapnil Miahra 
  • 3. 4/28/22, 2:42 PM The Productivity Myth: How Modern Enterprises Are Getting Work Wrong https://enterprisetalk.com/featured/the-productivity-myth-how-modern-enterprises-are-getting-work-wrong/ 3/3 