ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Research Shows Why it May Be Time to Rethink the 8-Hour Workday

Research Shows Why it May Be Time to Rethink the 8-Hour Workday

If we asked you to tell us how many hours a day you actually work, what would the figure look like? Chances are that you as a business owner put in a little more than the average worker, but would it total over the requisite eight hours? A recent study shows that while eight hours of work 200 years ago was considered revolutionary, it might be a bit on the long side to expect good work from good employees.

The origin of the eight-hour workday has its roots in the Industrial Revolution. In an attempt to make shorter and more productive workdays, a Welsh activist named Robert Owen said in 1817, “Eight hours labor, eight hours recreation, eight hours rest.” At the time, it was a major suggestion that seemed radical--workdays often exceeded 12 hours, sometimes lasting for as long as 16 hours. This concept came to fruition in the 20th century when the Ford Motor Company implemented the eight-hour workday, which led to enhanced productivity while doubling wages.

Naturally, productivity increased, all while simultaneously improving both work ethic and working conditions. Do you think today’s workplace could benefit from another development similar to this one? If not, hold that thought--let’s take a look at a study first, which analyzed 2,000 full-time office workers.

The study found that your employees might only be productive for up to three hours a day. While this might be shocking to hear, it shouldn’t be. As you well know, there are way too many distractions that could be wasting time for your employees. Here are some of the distractions that the study found were most prominent:

  • Reading news websites: 1 hour 5 min
  • Checking social media: 44 min
  • Discussing non-work-related things with coworkers: 40 min
  • Searching for new jobs: 26 min
  • Taking smoke breaks: 23 min
  • Making calls to partners/friends: 18 min
  • Making hot drinks: 17 min
  • Texting or instant messaging: 14 min
  • Eating snacks: 8 min
  • Making food in office: 7 mins

Many of these distractions can be removed by using a content filtering system on your network. Time-wasting and inappropriate websites, like social media and pornography, can easily be blocked with the intention of retaining productivity and security.

What are your thoughts on shortening the workday? Let us know in the comments, and be sure to reach out to us at 866-326-7214 to ask about a content filter.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Smartphones Small Business Microsoft Office Upgrade Network Mobile Devices Data Recovery Managed IT Services Communication Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery Apps IT Support Browser Windows 10 Managed Service Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Government Saving Money Operating System Artificial Intelligence Managed IT services Networking Windows Workplace Strategy Gadgets Bandwidth Encryption Blockchain Server WiFi App Virtualization Information Remote Spam Mobile Device Management Business Technology Information Technology Gmail Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship History Apple Cybercrime Analytics Access Control Data Security Big Data Conferencing Wi-Fi BDR Health Voice over Internet Protocol Compliance Document Management Remote Computing Save Money Patch Management Help Desk Hacking Remote Monitoring Vendor Hacker Employer-Employee Relationship Cost Management IT Management Training Alert Firewall Legal Mobile Office Hiring/Firing Augmented Reality Word Data storage Outlook Managed Services IBM Password Data loss Website Project Management BYOD Computing Search... Vendor Management Applications Hard Drive Best Practice Money Vulnerabilities Retail Customer Service Unified Threat Management Law Enforcement Healthcare End of Support Remote Workers Printer VPN User iPhone Windows 7 Education Cortana Update Free Resource Content Filtering Travel How To Router Chrome Virtual Reality Social Engineering Cryptocurrency Paperless Office Antivirus Black Market The Internet of Things Maintenance YouTube Cleaning Robot Mobile Computing Marketing Laptop Data Breach Running Cable Websites Mobility Meetings Storage Windows 11 Google Maps Twitter Scam Monitoring Sports Social SaaS DDoS Microchip Flexibility Saving Time Disaster HIPAA Tech Terms Managed Services Provider Bitcoin Hack Identity Theft Computers Virtual Private Network Notifications Managed IT Digital Telephone Unified Communications Lithium-ion battery Google Docs Current Events Bluetooth Taxes Processors Excel Solutions Distributed Denial of Service Office Tips Private Cloud Memory Integration Images 101 PowerPoint Display Administration Physical Security Virtual Assistant Presentation Politics Machine Learning Specifications Settings Employees Wireless Technology Avoiding Downtime IT Consultant Start Menu eWaste Solid State Drive Downloads Computer Care Holidays Customer Relationship Management Processor Vulnerability Co-Managed IT Downtime Cooperation Entertainment Safety Drones Video Conferencing Chromebook Software as a Service Data Protection Automobile Virtual Desktop Virtual Machines Computer Repair Experience Multi-factor Authentication Professional Services How To Service Level Agreement Internet Service Provider Staffing Computing Infrastructure Azure Business Communications Knowledge Troubleshooting Corporate Profile Management Regulations Compliance Device security Managed IT Service IP Address Microsoft Excel Workplace In Internet of Things Television Telephony Employer Employee Relationship Wireless Headphones Memes Network Congestion Cabling Going Green Net Neutrality Business Cards Hacks Tech Human Resources Reliable Computing Writing Tablet Error Financial Data G Suite Scams Mouse VoIP Bookmark Risk Management Tracking IT Download Recovery Piracy Competition Term Google Apps Scalability Business Owner Telework Web Server HTML Microsoft 365 Cables Entrepreneur Administrator SharePoint Text Messaging Browsers Smartwatch LiFi Proactive IT Digital Payment Nanotechnology Communitications Worker Upload Procurement Documents Software License Application Bring Your Own Device Google Play Business Intelligence Access Social Network FinTech Point of Sale Time Management Data Analysis CES Music Public Cloud Screen Reader IT Assessment Security Cameras Trends Supply Chain Management Securty Mobile Technology Value Audit Inbound Marketing Spyware Customer Resource management Organization Devices Cyber security Domains Shortcuts Smart Devices Tip of the week Botnet Fileless Malware File Sharing Micrsooft Gamification Remote Working Company Culture Rental Service Redundancy Be Proactive Flash Cache Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Transportation Electronic Payment Telephone Systems Unified Threat Management Directions Digital Security Cameras Business Growth Workers Content Desktop Wasting Time Public Speaking Modem Workplace Strategies Printing Electronic Medical Records Streaming Media CCTV Accountants eCommerce Database Surveillance Keyboard Banking Touchscreen Phone System Videos Google Wallet Deep Learning Computer Malfunction Managing Costs Hard Drives Messenger Emergency SSID intranet Vendor Mangement Health IT Equifax Tactics Development Wireless Hard Drive Disposal Employer/Employee Relationships Shortcut Business Metrics Media Hosted Solution Samsung Books Uninterrupted Power Supply Username Webcam Virtual Machine Heating/Cooling Environment Freedom of Information Smart Technology Social Networking Language Business Mangement Computer Accessories Reviews Windows XP Society Startup Optimization Tablets Addiction email scam Teamwork Navigation 2FA Reading Monitors Data Storage Visible Light Communication Mobile Security Hypervisor News Medical IT Google Calendar User Tip Shopping Windows 8 Supercomputer Legislation Network Management SQL Server Virus Evernote Paperless Relocation Displays PCI DSS Advertising Motion Sickness Licensing Fake News Supply Chain Comparison Work/Life Balance Google Drive Proxy Server Gig Economy Tech Support Emails Humor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?