8 Tools to Beat Procrastination at Work

The Art of Strategic Downtime: Procrastination in the Modern Workplace
It is widely accepted that brief periods of rest, such as a power nap, or even a new gadget purchase, can be effective methods for coping with the demands of office work.
Incorporating intentional pauses into the workday, even through procrastination, could be beneficial for employee well-being and stress reduction.
However, the acceptance of such practices varies significantly between workplaces, with some organizations maintaining strict policies against any non-work-related activity.
Evolving Forms of Workplace Diversion
Traditional methods of time-wasting, like aimless fidgeting or playing card games, are becoming outdated.
The rise of the internet has introduced new terminology, such as cyberslacking, to describe the act of procrastinating online.
Other terms used to describe this behavior include goldbricking and simply avoiding work responsibilities.
The Persistence of Procrastination
Despite evolving workplace dynamics, unproductive time spent at work is likely to remain a common occurrence, second only to casual conversations near the water cooler.
Therefore, it is advantageous to focus on two key strategies in today's digital environment.
Strategies for the Discerning Procrastinator
Firstly, cultivating a positive relationship with the IT administrator responsible for monitoring internet usage is advisable.
Secondly, mastering the art of efficient time-wasting through the utilization of online tools can be highly effective.
While assistance with the former is beyond the scope of this discussion, the following eight tools are presented to enhance your skills as a workplace procrastination expert.
- These resources are designed to optimize your downtime.
- They can help you become a true procrastination ninja.
Rapidly Conceal Active Applications
Employing the Alt-Tab key combination with swiftness represents the most straightforward method for transitioning between open windows. This is particularly crucial when time is being spent on a non-work-related application and a supervisor is drawing near.
However, should accidental key presses occur, a free and lightweight application known as OuttaSight can be utilized. It facilitates the complete concealment of open windows or their reduction to icons within the system tray. Its designated hotkey is appropriately termed the "Boss Key." We previously provided a more comprehensive review of this free software.
Additional Tools Suggested by Readers
Valuable contributions from our readership have led us to discover further helpful tools. Among these are Mr. Hyde and Hocus Pocus.
Browser Tab Management for Firefox
For those seeking to discreetly manage browser tabs within Firefox, the hideBad and Panic Firefox add-ons were previously available. However, please note that these add-ons are no longer functional.
These tools offer a quick means of minimizing distractions and maintaining a professional appearance when unexpected interruptions occur. Rapid application concealment can be a valuable asset in a work environment.
Utilizing these methods allows for a seamless transition to work-related tasks, ensuring productivity and a focused demeanor. The system tray provides a convenient location for minimized applications.
Enjoy Downtime Through Proxy Browsing
Previously, we’ve extensively discussed proxy servers and methods for accessing blocked websites in environments like schools or workplaces.
This provides a comprehensive compilation of articles focused on circumventing workplace firewalls.
Further Resources on Digital Privacy
An additional, valuable resource detailing various privacy tools can be found at the EPIC Online Guide to Practical Privacy Tools.
This guide offers a broad overview of technologies designed to enhance your online security and anonymity.
It serves as a useful complement to the information presented regarding proxy browsing and unblocking content.
Exploring these tools can empower you to maintain greater control over your digital footprint.
Maintaining Online Privacy with VANISHD
A key concern for many users is the ability to browse the internet discreetly, shielding their online activity from prying eyes. VANISHD offers a solution to reclaim privacy within the workplace.
How VANISHD Works
This tool functions by overlaying a benign webpage or application – such as a company intranet page or an active Microsoft Office document – over your actual browsing window. This creates a deceptive "disguise" for your activity.
Effectively, it presents a harmless facade while allowing you to continue browsing as usual. The original window remains accessible.
Accessing the Hidden Window
A unique feature of VANISHD is its ability to provide a smaller, movable viewing window. This allows users to observe the content of the concealed browsing window by simply dragging it across the covering application.
This method provides a convenient way to monitor the hidden window without fully revealing it. A demonstration video illustrating this functionality is available for review.
By utilizing this technique, individuals can maintain a degree of confidentiality regarding their internet usage.
Utilizing Twitter During Work Hours
Employing Twitter on your mobile phone represents the most straightforward method. However, for those preferring browser-based access, alternative solutions are available.

SpreadTweet functions as a web application, presenting your Twitter feed in a spreadsheet-like format. A desktop application, built on Adobe Air, is also offered. Users can customize its appearance to resemble various Microsoft Office versions, including Office OS X, Office 2003, and Office 2007.
TweetSwitch, previously an online application, enabled users to interact with Twitter through instant messaging platforms or email. Account login and the addition of desired notification accounts were required for functionality.
Circumventing workplace restrictions on Twitter usage is facilitated by the abundance of available third-party applications. Only two such tools have been highlighted here.
Enjoying Online Videos Alongside Your Work: Double Vision
Double Vision Lite presents a solution for those who wish to view online videos – such as those found on YouTube, Hulu, and Netflix – concurrently with other tasks.
This browser, offered at no cost but supported by advertisements, utilizes a unique feature: a customizable transparency setting.
How Double Vision Lite Works
The core functionality revolves around the ability to adjust the opacity of the Double Vision window.
This allows users to fade the video in or out, enabling them to monitor content while simultaneously working on applications situated beneath the browser window.
Beyond its video-watching capabilities, Double Vision operates as a standard web browser.
- Browser-based video conferencing is readily supported.
- Other typical browsing activities can be performed without interruption.
A convenient shortcut, CTRL+ESC, is implemented for quickly concealing the browser when needed.
Installation Considerations
It's important to note that installing Double Vision Lite may necessitate administrative privileges on your computer.
This can often present a challenge within a corporate office environment.
A Dedicated Resource: Can't You See I'm Busy
Can't You See I'm Busy represents a particularly inventive online resource, previously featured in our coverage. However, its unique functionality warrants a dedicated discussion.
The site offers three distinct games designed to convincingly simulate productive work activities.
Simulated Work Environments
These games are crafted to mimic tasks commonly associated with professional settings. Users can engage in activities that appear as if they are manipulating Excel spreadsheets, composing detailed reports, or analyzing a company’s developmental trajectory.
The intention is to provide a plausible illusion of work, potentially useful for discreet moments of downtime.
Beyond Focused Productivity
It's worth noting that Google Search itself provides a wealth of opportunities for casual gaming experiences.
These readily accessible games offer a quick diversion without requiring a dedicated website visit.
Utilizing MS Word and Email for Blog Post Creation
The presence of Microsoft Word on a desktop is generally unremarkable and unlikely to draw attention. Conversely, specialized blogging software may be more conspicuous.
Therefore, leveraging MS Word as a platform for drafting and preparing blog posts, even while in an office environment, can be a discreet approach.
Posting via Email
Employing email offers a convenient method for publishing content to blogs. Platforms like Posterous and Tumblr previously facilitated exceptionally simple microblogging through email.
While WordPress requires some initial setup, it also supports blog posting via email, providing another viable option.
Key takeaway: Both MS Word and email present practical alternatives for blog content creation and dissemination, particularly when seeking a less noticeable workflow.
A Regular Reading Habit
DailyLit provides a unique service by sending short, sequential excerpts from a book you select directly to your email, mobile device, or RSS feed.
This allows you to receive a single passage each day until you've completed the entire book. Further details about the service can be found here.
Acknowledging the Temptation to Procrastinate
The extent to which we understand the challenges of avoiding distractions during work hours is highlighted by the following resources.
- How to Quickly Hide Your Web Surfing From The Boss! This article offers methods for discreetly browsing the internet at work.
- 5 Cool Websites To Procrastinate At Work Like a PRO Discover five websites designed for effective time-wasting during office hours.
- 6 Fun Websites to Waste Time On Explore six entertaining websites to help you pass the time.
A petition advocating for the acceptance of cyberslacking is currently being drafted.
In the meantime, we invite you to share your preferred strategies for subtly avoiding detection while engaging in non-work-related activities.
Image source: L-T-L