Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

We Bet that You Can’t Read Every Word of This Article [VIDEO]

b2ap3_thumbnail_scatterbrain_400.jpgThe Internet is full of challenges. YouTube has a multitude of annoying 10 hour-long videos of irritating noises and sounds alone. But, this CollegeHumor video might just top them all. It challenges its viewers to finish a three-minute video, and to make it worse, the video is boring.

 

It’s a look into the human psyche and the impact that the Internet has had on the way our attention spans work. This video argues that the Internet has made the human mind weak and saturated with entertainment. We surf the Internet for hours on end to put an end to the tedious boredom of everyday life. A decade of a world taken over by the Internet has brought about a generation of weak-willed people who can’t even find the time to finish reading an article.

We Dare You
We dare you to finish this article. We know most of you probably won’t. Slate performed a study of how many people actually read their articles, and the results weren’t particularly promising: About 5 percent of people who landed on Slate pages were engaged with the page in some way, but never scrolled down the page. Typically, this means that they didn’t see anything at all about the article, and opted to visit another web page.

Most visitors scroll to at least the 50 percent mark, but that doesn’t mean that they’ve read the article. People could just be skimming and then sharing the information online via Facebook or Twitter. Then, other people can share the article without reading it, too, and it will create a chain reaction of misinformed individuals who can’t pay attention long enough to understand the premise of the article.

Finally, the only way to get most people to scroll through the entire article is to embed pictures or videos into it, which causes readers to scroll through the entire article, then go elsewhere or share/comment on it. These trends use the assumption that the web article is roughly 2000 pixels long (the length of a typical web article, roughly two pages of text or 1,000 words single-spaced).

Still With Us?
Good. You’re among the minority of readers. Most of you wouldn’t have read this far. It’s almost as if the seemingly limitless number of screens and tabs that can be open at one time make us feel like we never need to be bored. If something isn’t working for you, all you need to do is search for something else to appease your hunger for content.

The unfortunate side effect of this is that it wastes a lot of time, especially from a business standpoint. Unless you are entirely engulfed in your work, you will be browsing the Internet. Take advantage of productivity-increasing tips from Total Tech Care today by calling 866-348-2602. And remember the obnoxious man-in-the-suit’s words; “If you watch this entire video, if you make the choice to sit and be bored for these 180 seconds, you will have finally taken the first step in regaining control over the one truly renewable resource in life: your time.”

Thank you for being one of the few readers to finish this article. Now, don’t waste any more time. Put your time to good use and leave a comment expressing your thoughts.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones IT Support Communication Business Continuity Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Phishing Upgrade Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Cloud Computing Server Save Money Data Recovery Passwords Windows 10 Saving Money Holiday Chrome Social Media Virtualization Gadgets Tech Term Microsoft Office Automation Managed IT Services Managed Service Artificial Intelligence Operating System Facebook Computers Cybercrime Mobile Device Management Wi-Fi Networking IT Support Hacking Internet of Things Health BYOD Spam Office 365 Remote Managed Service Provider Telephone Systems Information Technology Covid-19 Information Alert Bandwidth Social Engineering Mobility Router Recovery BDR Employer-Employee Relationship Remote Monitoring Password Money Encryption Big Data App Applications History Data Breach Law Enforcement Human Resources Mobile Computing Application Mobile Office Apps Data Storage Patch Management Office Tips Training Blockchain Paperless Office VPN Government Private Cloud Remote Computing Managed IT How To HaaS Bring Your Own Device Data Management Work/Life Balance Vulnerability Windows 7 Word Wireless Google Drive Servers Gmail Avoiding Downtime Flexibility Settings Marketing WiFi Infrastructure Data Security Two-factor Authentication IT solutions Voice over Internet Protocol Entertainment Website Budget Mouse Cleaning User Error Data Protection Meetings End of Support Conferencing Education Risk Management Physical Security Hacker Safety Scam Sports Vendor HIPAA Redundancy The Internet of Things Lithium-ion battery Managed Services Telephone System Staff Software as a Service Display Keyboard Vendor Management Machine Learning Connectivity Remote Work Firewall Employee/Employer Relationship RMM Virtual Reality Save Time Apple USB Social Remote Worker Digital Signage IT Consultant Electronic Medical Records Spam Blocking Computing Infrastructure Cryptocurrency Going Green Hiring/Firing Humor Procurement Wearable Technology Workplace Strategy Retail Hard Drives Comparison Net Neutrality Battery Instant Messaging Robot Shadow IT CES Excel Help Desk Legal Printing Biometrics Business Intelligence Business Technology Virtual Desktop Internet Exlporer Content Management Access Control Worker Managed Services Provider Audit PDF IT Management Virtual Assistant DDoS Authentication Database Botnet SharePoint IT Plan Proactive IT Remote Workers Virus Best Practice Processor Unified Threat Management Unsupported Software Customer Service YouTube Update Computer Accessories Black Market Environment Charger Hard Drive Fax Server Google Docs Compliance Identity Theft Computer Care Document Management OneNote SaaS Solid State Drive Wireless Technology Current Events Computing Printer How to Telephony Downtime Bluetooth Samsung Augmented Reality Fraud Network Congestion Data storage Value Automobile eWaste Outlook Dark mode Leadership Smart Tech Trend Micro Tablets Troubleshooting Trending Amazon Default App Start Menu Monitor Addiction SMS Entrepreneur Screen Mirroring Procedure Loyalty Recycling Saving Time Frequently Asked Questions Wiring dark theme Shortcut Practices Shopping Books Google Search Streaming Media Amazon Web Services IT Infrastructure Mobile Reputation Windows 10s Cache AI Cost Management Cast Safe Mode FinTech Social Networking Tech Support Criminal Bing Content Techology Tip of the week GDPR Laptop webinar Hosted Computing Social Network Emergency Employer Employee Relationship Online Shopping Investment Professional Services Customers Public Cloud Wireless Internet File Sharing Employees Assessment Employee/Employer Relationships Consultant Audiobook Running Cable Analytics Windows Server 2008 Camera Windows 365 Touchpad Inventory Memory Specifications ISP Evernote ROI Tools Wire Video Conferencing Advertising Sales Television Bitcoin Best Available Travel Shortcuts Politics Printers Point of Sale Personal WIndows 7 Millennials Cryptomining Notifications Wireless Charging Smart Office Supply Chain Management Monitoring Public Computer Batteries Science Regulations Virtual Private Network Windows 8.1 Digitize Transportation Workforce Rootkit Cables Windows Server 2008 R2 Relocation Computer Fan Customer relationships Customer Relationship Management Distributed Denial of Service PowerPoint Windows Media Player Video Games Project Management Email Best Practices Workers Nanotechnology IT Assessment Analyitcs User Benefits Telecommuting Manufacturing Cortana Worker Commute FENG Programming Computer Tips IBM Digital Signature Managed IT Service Security Cameras Experience Scalability Flash Warranty Virtual CIO OneDrive Managing Stress Smart Technology Biometric Security Google Apps Business Owner Antivirus HVAC Peripheral Software Tips Digital Security Cameras NarrowBand Supercomputer Analysis Using Data Windows 8 Cameras Search Sync Administrator IT service Emails Devices Copiers 5G iPhone Enterprise Content Management Quick Tip MSP Ergonomics Accountants Tablet Smartwatch Microchip Domains Netflix Thought Leadership Development Two Factor Authentication Credit Cards OLED Root Cause Analysis Password Management PCI DSS Password Manager Virtual Machine Files IaaS HBO 2FA Maintenance Chromecast Knowledge Fiber Optics Music Multi-Factor Security Employee Printer Server Cabling Skype Search Engine Twitter Messaging Bloatware Data loss NIST Policy Uninterrupted Power Supply Business Mangement Hypervisor Colocation

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code