Promising Practices Promising PracticesPromising Practices
A forum for government's best ideas and most innovative leaders.

The Company That Wants Your To-Do List to Be Fun

Scott Bedford/

6Wunderkinder is built on the philosophy of GTD: Getting Things Done.

The company is founded on the belief that we need to free our minds of all distractions, no matter how minor. The philosophy, originally made popular by productivity guru David Allenattracted a cult following and influenced the design of several productivity tools today, including 6Wunderkinder’s app Wunderlist.

“What we’ve figured out is the only key for becoming really productive is simplicity and focus,” says CEO Christian Reber, who co-founded the Berlin-based company in 2011 with five other people. His team came up with the idea while they were working at the digital design agency they’d founded and couldn’t find a project management tool that they liked.

Wunderlist 3

They’ve integrated the GTD ethos into their product, which at its core is a system where users write down tasks and cross them off as they go. “You don’t have to think about the context of your ideas, just write them in,” he says. “That frees your memory which is very rewarding.” Wunderlist uses a freemium model and offers additional features for $4.99 a month or $49.99 a year with Wunderlist Pro for Business.

What differentiates Wunderlist from the many other productivity apps is its design and cloud-based flexibility. The platform is structured so that users can click onto any number of separate lists (work, private, etc.) and add tasks, subtasks, due dates, reminders, files and notes. It syncs on Windows and iOS, and Android devices.

A 65-person team is currently focused on pushing out its 3rd major product release this month, which involves a complete re-engineering and redesign of the platform. With the upgrade, Wunderlist 3 will look more like a fusion of a task manager with social sites like Twitter and Facebook because of its new notifications system and messaging features, which doesn’t make it quite as minimalist as it once was.

But there’s a lot of pressure to stand out. It’s competing in a productivity app market that grew by 150% last year with no clear winner yet.

Wunderlist has grown from 6 to 8 million downloads in the past year (though Reber won’t disclose the number of active users). The company attracted $19 million in investment led by Sequoia Capital in late 2013. “We see it [Wunderlist] as the third leg of the stool of a series investments we’ve made in cloud based productivity operations,” Sequoia Chairman Michael Moritz told Forbes, citing previous investments in Dropbox and Evernote. “Wunderlist is obviously tackling personal organization compared to file syncing or note taking and it’s a different application, and one where the ceiling is very high.”

While modern productivity hacks are designed to help us operate more like seamless iOS operating systems, it’s important that its hackers understand precisely what makes us human. Reber says, “As human beings we all lose focus and in turn become less productive when we are stressed. The feeling that something is ‘fun’ to do reduces stress and creates motivation, and priorities create focus. In our team we have the saying, ‘fun isn’t the enemy of work.’”

Reprinted with permission from Quartz. The original story can be found here

(Image via Scott Bedford/

Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.