Skip to main content

Multitasking in the workplace

Multitasking in the workplace degrades the quality of work. Laser like intensity and single mindedness of purpose promotes quality. I am terrible at multitasking. I admit it, but only to myself. Is multitasking is a badge of honor? I doubt my co workers believe they are good at multitasking as well. Perhaps it's co worker peer pressure.

During my typical workday as a UI web developer I have 3 Photoshop files open, my phone concerning head set on and dialed into a meeting. I'm composing a design document in MS Word for another project. I'm coding another project in my editor. I'm checking code into the repository before the cut off which is fast approaching, and 3 people are asking me questions on IM. Maybe its peer pressure in the work place exacerbated by the current economic environment. I dare not show I'm incapable of multitasking! As pointed out (Hillstrom, 2002) "Technology is also creating the ability to leverage the efforts of employees more and more. As organizations use more team-building and decentralized decision-making, people are forced to become both specialists and generalists." Perhaps it will become less of an issue for future workers as teens eventually enter the workforce. Apparently, they seem to be able to handle connectivity and communication on multiple levels albeit mostly on the "entertainment" level. Will it translate to more efficient multitasking tasking in the future? Additionally, the tech innovations that this newer generation of workers could potentially develop may improve multitasking hardware and software.

The focus of my attention should be getting the cleanest locked down solid code that I possibly can develop before I move it into production. Yet, the very same people that expect that from me are the ones that impede it the most.
As (Dario D. Salvucci, 2010) points out it's "Sequential Multitasking". "We call this behavior Sequential Multitasking: although there may be some overlap between tasks during switching periods (e.g., when a person finishes typing a sentence before picking up a ringing phone), each task receives focused attention during most of its allocated execution time."
I think it all stems from the false notion that we are getting things done simultaneously, when the fact is we are doing one thing at a time and switching back and forth quickly.
So quickly as to delude ourselves into thinking we are doing them simultaneously. It may delude our egos into thinking we can do tasks simultaneously and do them well, however we are not.
I totally agree with Goodman's assessment: "...High multitaskers are not better at anything. Even multitasking. They are worse"

For me, I just want to add quality to my work. Allow the next developer that uses it to see that I have integrated it in the cleanest and secure way possible.
This is not walking, chewing gum and listening to a podcast. This is a product being developed for a business that creates value.
As (Greenblatt, 2010) points out "Multitasking leads us to do everything a little bit worse all the time. Certain types of tasks can be done simultaneously pretty well. Carrying on a conversation while stirring spaghetti, for instance. Or listening to music while working on a term paper. The problem for many people is that they're trying to do quite similar tasks at the same time, and that turns out to be surprisingly hard to pull off, causing the most interference".

References:
  • Dario D. Salvucci, N. A. (2010). The Multitasking Mind. Oxford University Press.
  • Greenblatt, A. (2010, 09 24). Impact of the Internet on Thinking Is the Web changing the way we think" Retrieved 2011, from CQ Researcher: http://library.cqpress.com/cqresearcher/
  • Hillstrom, L. C. (2002). Multitasking. In L. C. Hillstrom, & K. Hillstrom, Encyclopedia of Small Business (pp. 762-763). Gale, Cengage Learning.

Comments

Jackie Co Kad said…
Hi, Great.. Tutorial is just awesome..It is really helpful for a newbie like me.. I am a regular follower of your blog. Really very informative post you shared here. Kindly keep blogging. If anyone wants to become a Front end developer learn from Javascript Online Training from India . or learn thru ES6 Training in Chennai. Nowadays JavaScript has tons of job opportunities on various vertical industry. HTML5 CSS3 Javascript Online Training from India

Popular posts from this blog

:nth-child structural pseudo-class selectors

There are 4 pseudo-class expressions that are part of the :nth-child pseudo-class. Structural pseudo-class selectors target HTML elements based on the DOM tree. Basically, elements that cannot easily be targeted by simple selectors or combinations of selectors. What makes pseudo-classes so handy is the ability style elements dynamically based on its position in the DOM. :nth-of-type(N) :nth-last-child(N) :nth-child(N) :nth-last-of-type(N) :nth-of-type(N) selector My favorite of the 4 is the :nth-of-type(N) selector. The nth-of-type selector allows you to select child elements of a parent based on the particular type of the element, for example every 5th "li" element in a list. You can select even or odd elements, or the nth (order number) child in the group of elements. The class accepts the argument "n" which can can be a keyword, a number, or strings "odd", "even", or an expression "-n+3". Let's look at a simple but ef

The ICMP protocol

Let's look into the ICMP protocol. Specifically, ping and traceroute. ICMP is the Internet Control Message Protocol and is a component of the IP Layer. Basically, used by hosts to communicate diagnostic network layer information that is carried in the IP payload. It communicates error messages which are acted on by the IP layer or the UDP or TCP protocols. All of the exercises were carried out using the open source network protocol analyzer "Wireshark". www.wireshark.org Describe in detail the protocols ARP and ICMP. ARP is the Address Resolution Protocol is similar to that of DNS. Where DNS resolves IP addresses to domain names, ARP resolves network layer IP addresses to link layer MAC addresses. In order to send a datagram the source must give the adaptor the IP address and the MAC address. For example, host A wants to send a packet to host B. Host A uses a cached ARP table to look up the IP address for any existing records of host B's MAC address. If the MA

Creating triggers

Triggers are SQL statements which are stored with the intention of being activated or fired when an event associated with a database table occurs. This could be any event including an INSERT, UPDATE and DELETE. Lets begin by creating a few simple insert triggers CREATE a trigger on the ORDERLINE table for the insert event. The trigger will update the corresponding PRODUCT record QTY_ORDERED by adding the value of QTY to QTY_ORDERED. CREATE TRIGGER tr_qty_ordered_value_insert ON Orderline FOR INSERT AS BEGIN UPDATE product SET QTY_ORDERED = QTY_ORDERED + ((SELECT qty from INSERTED) * (SELECT unitprice from INSERTED)) WHERE product.ProductID = (SELECT ProductID from INSERTED); END; Command(s) completed successfully. CREATE a trigger on the ORDERLINE table for the delete event. The trigger will update the corresponding PRODUCT record QTY_ORDERED by subtracting the value of QTY FROM QTY_ORDERED. CREATE TRIGGER tr_qty_ordered_value_delete ON Orde