Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

We Bet that You Can’t Read Every Word of This Article [VIDEO]

b2ap3_thumbnail_scatterbrain_400.jpgThe Internet is full of challenges. YouTube has a multitude of annoying 10 hour-long videos of irritating noises and sounds alone. But, this CollegeHumor video might just top them all. It challenges its viewers to finish a three-minute video, and to make it worse, the video is boring.

 

It’s a look into the human psyche and the impact that the Internet has had on the way our attention spans work. This video argues that the Internet has made the human mind weak and saturated with entertainment. We surf the Internet for hours on end to put an end to the tedious boredom of everyday life. A decade of a world taken over by the Internet has brought about a generation of weak-willed people who can’t even find the time to finish reading an article.

We Dare You
We dare you to finish this article. We know most of you probably won’t. Slate performed a study of how many people actually read their articles, and the results weren’t particularly promising: About 5 percent of people who landed on Slate pages were engaged with the page in some way, but never scrolled down the page. Typically, this means that they didn’t see anything at all about the article, and opted to visit another web page.

Most visitors scroll to at least the 50 percent mark, but that doesn’t mean that they’ve read the article. People could just be skimming and then sharing the information online via Facebook or Twitter. Then, other people can share the article without reading it, too, and it will create a chain reaction of misinformed individuals who can’t pay attention long enough to understand the premise of the article.

Finally, the only way to get most people to scroll through the entire article is to embed pictures or videos into it, which causes readers to scroll through the entire article, then go elsewhere or share/comment on it. These trends use the assumption that the web article is roughly 2000 pixels long (the length of a typical web article, roughly two pages of text or 1,000 words single-spaced).

Still With Us?
Good. You’re among the minority of readers. Most of you wouldn’t have read this far. It’s almost as if the seemingly limitless number of screens and tabs that can be open at one time make us feel like we never need to be bored. If something isn’t working for you, all you need to do is search for something else to appease your hunger for content.

The unfortunate side effect of this is that it wastes a lot of time, especially from a business standpoint. Unless you are entirely engulfed in your work, you will be browsing the Internet. Take advantage of productivity-increasing tips from Total Tech Care today by calling 866-348-2602. And remember the obnoxious man-in-the-suit’s words; “If you watch this entire video, if you make the choice to sit and be bored for these 180 seconds, you will have finally taken the first step in regaining control over the one truly renewable resource in life: your time.”

Thank you for being one of the few readers to finish this article. Now, don’t waste any more time. Put your time to good use and leave a comment expressing your thoughts.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 25 December 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity IT Support Smartphones Communication Miscellaneous Smartphone Mobile Device Small Business Network Browser Collaboration Productivity Cybersecurity Quick Tips Users Business Management Phishing Windows Managed IT Services Upgrade Outsourced IT Ransomware Data Backup Windows 10 Cloud Computing Data Recovery Office Server Save Money Passwords Windows 10 Virtualization Saving Money Holiday Tech Term Gadgets Chrome Social Media Managed Service Managed IT Services Microsoft Office Automation Computers Cybercrime Operating System Facebook Artificial Intelligence Health BYOD Mobile Device Management Networking IT Support Internet of Things Hacking Wi-Fi Covid-19 Information Spam Office 365 Managed Service Provider Telephone Systems Remote Alert Information Technology Recovery Employer-Employee Relationship Bandwidth Router BDR Social Engineering Mobility Password Money Mobile Computing Human Resources Encryption Application Applications Remote Monitoring Data Breach Law Enforcement Big Data App History Apps Blockchain Paperless Office Data Storage Patch Management Remote Computing Mobile Office Government Private Cloud Office Tips Training How To Managed IT VPN Work/Life Balance Flexibility Settings Marketing WiFi IT solutions Two-factor Authentication Entertainment Website Vulnerability Budget Windows 7 Word Google Drive Mouse HaaS Infrastructure Voice over Internet Protocol Servers Avoiding Downtime Data Security Wireless Gmail Bring Your Own Device Data Management Vendor Cleaning Managed Services Firewall Display End of Support Software as a Service Telephone System Staff Virtual Reality Conferencing Physical Security Education Apple Machine Learning Employee/Employer Relationship Scam USB Safety RMM Connectivity Social Remote Work HIPAA Sports Redundancy User Error Keyboard Meetings Vendor Management Risk Management Hacker Data Protection Save Time The Internet of Things Lithium-ion battery Computing Infrastructure Customer Service Computer Accessories Business Technology Database Going Green Content Management Environment Access Control Hiring/Firing Remote Workers Fax Server Virtual Assistant Processor Authentication Battery SaaS Shadow IT Printer Legal Bluetooth Hard Drive Business Intelligence Internet Exlporer Update Network Congestion Audit Worker eWaste Computing PDF IT Management Google Docs IT Consultant Botnet Identity Theft IT Plan Proactive IT Humor Best Practice Wearable Technology Retail Unsupported Software Digital Signage YouTube Hard Drives Augmented Reality Black Market Instant Messaging Robot Fraud Excel Charger Compliance Remote Worker Biometrics Procurement Virtual Desktop OneNote Computer Care Document Management Workplace Strategy Solid State Drive Cryptocurrency Net Neutrality Wireless Technology Current Events How to Telephony Downtime DDoS Help Desk Samsung Printing Comparison SharePoint Data storage Automobile Virus Value CES Spam Blocking Unified Threat Management Electronic Medical Records Managed Services Provider Monitoring Batteries Wire Screen Mirroring Evernote Loyalty Travel Books Windows 8.1 Digitize Managing Stress Frequently Asked Questions Windows Server 2008 R2 Reputation Windows 10s Streaming Media Millennials Printers Antivirus Mobile Customer relationships Content Smart Office Cast Tech Support Wireless Charging Cameras Windows 8 Emergency Email Best Practices IT Assessment Techology IT service Tip of the week Manufacturing Laptop webinar Customers Public Cloud Workforce Employer Employee Relationship Virtual Private Network Professional Services Computer Tips Audiobook Managed IT Service Security Cameras Cables Tablet Assessment Virtual CIO OneDrive Domains Windows Server 2008 Biometric Security Touchpad Nanotechnology Telecommuting Peripheral Project Management Tools Digital Security Cameras Politics IaaS Using Data Advertising Maintenance Cortana Printer Server Television Copiers 5G Digital Signature Bloatware Notifications Quick Tip Warranty Ergonomics HVAC Smartwatch Google Apps Tablets Public Computer Transportation Development Regulations OLED Analysis Entrepreneur Virtual Machine Relocation Devices Computer Fan Rootkit PCI DSS Administrator 2FA Fiber Optics Enterprise Content Management Shortcut Employee Workers Benefits Messaging Video Games MSP Cabling Accountants Cost Management Hypervisor Thought Leadership Social Networking FENG Credit Cards Policy Worker Commute Microchip Dark mode Experience Trend Micro Password Management Password Manager IBM Multi-Factor Security Smart Technology SMS Scalability Flash Default App Saving Time Twitter Consultant Procedure Business Owner Search Engine Running Cable dark theme Shopping NIST Software Tips Google Search NarrowBand Business Mangement Analytics Memory Supercomputer Emails Trending AI Search Sync IT Infrastructure Smart Tech iPhone Addiction Best Available Bing Amazon FinTech Social Network WIndows 7 Recycling Netflix Two Factor Authentication Wiring Investment Practices Employee/Employer Relationships Files Cache Root Cause Analysis Amazon Web Services Science Employees Music Windows 365 Safe Mode HBO ISP Chromecast Criminal Knowledge Hosted Computing Video Conferencing GDPR Skype ROI Distributed Denial of Service Bitcoin Colocation Wireless Internet Customer Relationship Management Data loss Shortcuts Uninterrupted Power Supply Online Shopping Sales Windows Media Player Troubleshooting Point of Sale Personal File Sharing User Outlook Cryptomining PowerPoint Analyitcs Leadership Monitor Inventory Programming Specifications Supply Chain Management Camera Start Menu

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code