Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

We Bet that You Can’t Read Every Word of This Article [VIDEO]

b2ap3_thumbnail_scatterbrain_400.jpgThe Internet is full of challenges. YouTube has a multitude of annoying 10 hour-long videos of irritating noises and sounds alone. But, this CollegeHumor video might just top them all. It challenges its viewers to finish a three-minute video, and to make it worse, the video is boring.

 

It’s a look into the human psyche and the impact that the Internet has had on the way our attention spans work. This video argues that the Internet has made the human mind weak and saturated with entertainment. We surf the Internet for hours on end to put an end to the tedious boredom of everyday life. A decade of a world taken over by the Internet has brought about a generation of weak-willed people who can’t even find the time to finish reading an article.

We Dare You
We dare you to finish this article. We know most of you probably won’t. Slate performed a study of how many people actually read their articles, and the results weren’t particularly promising: About 5 percent of people who landed on Slate pages were engaged with the page in some way, but never scrolled down the page. Typically, this means that they didn’t see anything at all about the article, and opted to visit another web page.

Most visitors scroll to at least the 50 percent mark, but that doesn’t mean that they’ve read the article. People could just be skimming and then sharing the information online via Facebook or Twitter. Then, other people can share the article without reading it, too, and it will create a chain reaction of misinformed individuals who can’t pay attention long enough to understand the premise of the article.

Finally, the only way to get most people to scroll through the entire article is to embed pictures or videos into it, which causes readers to scroll through the entire article, then go elsewhere or share/comment on it. These trends use the assumption that the web article is roughly 2000 pixels long (the length of a typical web article, roughly two pages of text or 1,000 words single-spaced).

Still With Us?
Good. You’re among the minority of readers. Most of you wouldn’t have read this far. It’s almost as if the seemingly limitless number of screens and tabs that can be open at one time make us feel like we never need to be bored. If something isn’t working for you, all you need to do is search for something else to appease your hunger for content.

The unfortunate side effect of this is that it wastes a lot of time, especially from a business standpoint. Unless you are entirely engulfed in your work, you will be browsing the Internet. Take advantage of productivity-increasing tips from Total Tech Care today by calling 866-348-2602. And remember the obnoxious man-in-the-suit’s words; “If you watch this entire video, if you make the choice to sit and be bored for these 180 seconds, you will have finally taken the first step in regaining control over the one truly renewable resource in life: your time.”

Thank you for being one of the few readers to finish this article. Now, don’t waste any more time. Put your time to good use and leave a comment expressing your thoughts.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 27 April 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Internet Microsoft Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Phishing Managed IT Services Upgrade Windows Outsourced IT Ransomware Data Backup Windows 10 Save Money Cloud Computing Office Data Recovery Server Passwords Windows 10 Gadgets Chrome Virtualization Tech Term Social Media Saving Money Holiday Microsoft Office Managed Service Automation Managed IT Services Operating System Artificial Intelligence Computers Facebook Cybercrime Hacking Wi-Fi BYOD Mobile Device Management Health Networking IT Support Internet of Things Managed Service Provider Spam Covid-19 Alert Information Office 365 Telephone Systems Information Technology Remote Social Engineering Mobility Recovery Employer-Employee Relationship Router Bandwidth BDR Remote Monitoring Big Data Password Money App History Mobile Computing Encryption Applications Data Breach Application Human Resources Law Enforcement Paperless Office Mobile Office How To Managed IT Apps Office Tips Data Storage Patch Management Training VPN Government Remote Computing Blockchain Private Cloud HaaS Bring Your Own Device Data Management Work/Life Balance Infrastructure Flexibility Voice over Internet Protocol Marketing Wireless Vulnerability WiFi IT solutions Windows 7 Entertainment Word Website Gmail Google Drive Budget Settings Servers Two-factor Authentication Avoiding Downtime Data Security Mouse Managed Services Staff Software as a Service Telephone System Display User Error Save Time Machine Learning Meetings Connectivity Remote Work Employee/Employer Relationship Cleaning RMM Risk Management Hacker Conferencing End of Support The Internet of Things Physical Security Lithium-ion battery Scam Education Safety Data Protection HIPAA USB Sports Redundancy Firewall Keyboard Vendor Management Virtual Reality Apple Vendor Social Solid State Drive Wireless Technology Samsung Downtime Remote Workers How to Processor Value Data storage Update Wearable Technology Automobile Spam Blocking Electronic Medical Records Hard Drive Retail Hard Drives Instant Messaging Google Docs Virus Robot Computing Infrastructure Excel Hiring/Firing Identity Theft Unified Threat Management Going Green Biometrics Computer Accessories Computing Virtual Desktop Battery Augmented Reality DDoS Shadow IT Fraud Legal Business Intelligence Digital Signage Printer SharePoint Remote Worker Audit Bluetooth Internet Exlporer Worker IT Management Cryptocurrency Botnet Customer Service PDF Environment Procurement IT Plan Net Neutrality Comparison Workplace Strategy Fax Server IT Consultant Proactive IT CES Unsupported Software Help Desk Best Practice Printing SaaS YouTube Charger Humor Black Market Content Management Business Technology Access Control Compliance Managed Services Provider OneNote Computer Care Current Events Network Congestion Virtual Assistant eWaste Document Management Telephony Database Authentication Windows Server 2008 R2 Root Cause Analysis Tablets Cables Entrepreneur Knowledge Best Available Music Customer relationships HBO Skype Project Management Manufacturing Files Nanotechnology WIndows 7 Telecommuting Email Best Practices IT Assessment Shortcut Data loss Chromecast Cortana Cost Management Leadership Digital Signature Troubleshooting Computer Tips Managed IT Service Outlook Security Cameras Start Menu Warranty Biometric Security Social Networking Colocation Uninterrupted Power Supply Virtual CIO OneDrive Peripheral Screen Mirroring HVAC Loyalty Google Apps Monitor Analysis Books Digital Security Cameras Using Data Frequently Asked Questions Copiers Windows Media Player Running Cable Mobile Administrator 5G Windows 10s Devices User PowerPoint Quick Tip Cast Enterprise Content Management Memory Smartwatch Reputation webinar Accountants Streaming Media Emergency Ergonomics Tip of the week MSP Development Content Professional Services Microchip OLED Public Cloud Thought Leadership Managing Stress Tech Support Employer Employee Relationship Credit Cards PCI DSS Virtual Machine Techology Password Management Laptop Assessment Password Manager Employee Customers Multi-Factor Security 2FA Cameras Fiber Optics Windows Server 2008 Messaging Audiobook Tools Search Engine Cabling Twitter Science Policy Hypervisor NIST Touchpad Television Business Mangement Smart Tech Trending Dark mode Trend Micro SMS Distributed Denial of Service Politics Default App Customer Relationship Management Advertising Addiction Amazon Procedure Saving Time Analyitcs Public Computer Recycling Regulations Wiring Google Search Programming Practices Notifications Transportation dark theme Printer Server Shopping AI IT Infrastructure Computer Fan Cache Rootkit Amazon Web Services Criminal FinTech Safe Mode Bing Antivirus GDPR Relocation Workers Hosted Computing Benefits Social Network Investment FENG Wireless Internet Windows 8 Online Shopping IBM Employees Employee/Employer Relationships IT service Video Games File Sharing Worker Commute Flash Camera ISP Inventory Smart Technology Specifications Windows 365 Video Conferencing Experience ROI Wire Tablet Evernote Supercomputer Travel Sales Bitcoin Domains Scalability Software Tips Shortcuts Business Owner Sync Printers Cryptomining Emails Millennials Point of Sale Personal Supply Chain Management IaaS Maintenance Smart Office NarrowBand Wireless Charging Bloatware Consultant Monitoring Batteries Search Virtual Private Network iPhone Netflix Two Factor Authentication Workforce Windows 8.1 Analytics Digitize

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code