10 Ways to Show Your Devices Who's Boss - Slide 5

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next 10 Ways to Show Your Devices Who's Boss-5 Next

The e-mail that comes into your inbox every day can be overwhelming. Arrange to get less e-mail by blocking spam, unsubscribing from unnecessary mailing lists and filtering wanted but non-urgent e-mails into appropriate folders. Set your e-mail program to check for new messages less frequently. Sort through your new e-mail during breaks in your work.

In Don Tennant’s post "Dealing with the ‘Vice’ in ‘Devices,'" he writes about the extent to which we’re addicted to the instruments that keep us online, following a discussion he had on the topic with Dr. Joanne Cantor, a psychologist and author of the book, “Conquering CyberOverload.” Chances are you’re able to identify with that need for a fix to at least some degree, so advice on changing the habits that drive that need might be helpful.

Here are 10 tips offered by Cantor on how to retrain yourself so that you can show your devices who’s boss.

More Slideshows:

Top Outsourcing Trends for Q2 2010 The latest outsourcing trends identified by the Everest Group.

12 Hot New Tablets Hitting the Market The market is expanding at a brisk pace with many new competitive tablets being introduced to the public.

10 Reasons Why You Should Avoid Office Politics See why you're far better off avoiding office politics.


Related Topics : Application Security, IT Process Management, Six Sigma

More Slideshows

DynCloudInternetVisibility0x 8 Reasons the Enterprise Needs More Visibility into the Cloud

IT executives need the right tools to monitor and control their cloud infrastructure to maximize the positive impacts and mitigate security threats. ...  More >>

Analytics21-190x128 5 Ways to Avoid Becoming 'Digital Prey'

Future IT leaders will need to seek technologies that eliminate silos in order to deliver the right information to the right person within the right application environment at the right time. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.