Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

We Bet that You Can’t Read Every Word of This Article [VIDEO]

b2ap3_thumbnail_scatterbrain_400.jpgThe Internet is full of challenges. YouTube has a multitude of annoying 10 hour-long videos of irritating noises and sounds alone. But, this CollegeHumor video might just top them all. It challenges its viewers to finish a three-minute video, and to make it worse, the video is boring.

 

It’s a look into the human psyche and the impact that the Internet has had on the way our attention spans work. This video argues that the Internet has made the human mind weak and saturated with entertainment. We surf the Internet for hours on end to put an end to the tedious boredom of everyday life. A decade of a world taken over by the Internet has brought about a generation of weak-willed people who can’t even find the time to finish reading an article.

We Dare You
We dare you to finish this article. We know most of you probably won’t. Slate performed a study of how many people actually read their articles, and the results weren’t particularly promising: About 5 percent of people who landed on Slate pages were engaged with the page in some way, but never scrolled down the page. Typically, this means that they didn’t see anything at all about the article, and opted to visit another web page.

Most visitors scroll to at least the 50 percent mark, but that doesn’t mean that they’ve read the article. People could just be skimming and then sharing the information online via Facebook or Twitter. Then, other people can share the article without reading it, too, and it will create a chain reaction of misinformed individuals who can’t pay attention long enough to understand the premise of the article.

Finally, the only way to get most people to scroll through the entire article is to embed pictures or videos into it, which causes readers to scroll through the entire article, then go elsewhere or share/comment on it. These trends use the assumption that the web article is roughly 2000 pixels long (the length of a typical web article, roughly two pages of text or 1,000 words single-spaced).

Still With Us?
Good. You’re among the minority of readers. Most of you wouldn’t have read this far. It’s almost as if the seemingly limitless number of screens and tabs that can be open at one time make us feel like we never need to be bored. If something isn’t working for you, all you need to do is search for something else to appease your hunger for content.

The unfortunate side effect of this is that it wastes a lot of time, especially from a business standpoint. Unless you are entirely engulfed in your work, you will be browsing the Internet. Take advantage of productivity-increasing tips from Total Tech Care today by calling 866-348-2602. And remember the obnoxious man-in-the-suit’s words; “If you watch this entire video, if you make the choice to sit and be bored for these 180 seconds, you will have finally taken the first step in regaining control over the one truly renewable resource in life: your time.”

Thank you for being one of the few readers to finish this article. Now, don’t waste any more time. Put your time to good use and leave a comment expressing your thoughts.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Smartphones Communication IT Support Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Quick Tips Cybersecurity Users Business Management Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Data Recovery Server Save Money Cloud Computing Office Windows 10 Passwords Chrome Tech Term Virtualization Gadgets Social Media Saving Money Holiday Managed Service Microsoft Office Managed IT Services Automation Operating System Facebook Computers Artificial Intelligence Cybercrime IT Support Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking Remote Spam Managed Service Provider Information Office 365 Telephone Systems Covid-19 Alert Information Technology Router Social Engineering Mobility BDR Recovery Employer-Employee Relationship Bandwidth Applications Remote Monitoring Big Data Law Enforcement App History Mobile Computing Password Application Money Data Breach Human Resources Encryption Blockchain Paperless Office Mobile Office Government How To Private Cloud Office Tips Training Data Storage Managed IT Patch Management VPN Apps Remote Computing Google Drive Mouse HaaS Data Security Avoiding Downtime Infrastructure Voice over Internet Protocol Flexibility Wireless Marketing WiFi Gmail IT solutions Vulnerability Bring Your Own Device Entertainment Data Management Website Work/Life Balance Windows 7 Settings Budget Word Servers Two-factor Authentication Safety Social HIPAA Sports Telephone System Redundancy Staff Software as a Service User Error Keyboard Machine Learning Meetings Connectivity Remote Work Vendor Risk Management Managed Services Display Hacker Save Time The Internet of Things Lithium-ion battery Employee/Employer Relationship Conferencing Data Protection RMM Cleaning Scam USB Firewall End of Support Vendor Management Virtual Reality Education Physical Security Apple Network Congestion Charger Virtual Assistant eWaste Authentication Procurement Net Neutrality PDF Workplace Strategy Compliance Computer Care OneNote Help Desk Current Events Printing Telephony Proactive IT Samsung Update Wearable Technology Best Practice Hard Drives YouTube Retail Black Market Value Instant Messaging Google Docs Managed Services Provider Robot Identity Theft Excel Database Virus Spam Blocking Electronic Medical Records Biometrics Document Management Unified Threat Management Virtual Desktop Remote Workers Hiring/Firing Computer Accessories Solid State Drive Wireless Technology Augmented Reality Downtime Processor How to DDoS Fraud Remote Worker Data storage SharePoint Hard Drive Automobile Printer Cryptocurrency Business Intelligence Bluetooth Computing Infrastructure Customer Service Computing Worker Environment Audit Going Green IT Management Comparison Fax Server CES Botnet Battery IT Plan IT Consultant Digital Signage SaaS Shadow IT Content Management Legal Business Technology Unsupported Software Access Control Humor Internet Exlporer AI Bloatware IT Infrastructure Software Tips Virtual Private Network Supercomputer FinTech Notifications Workforce Bing Social Network Tablets Consultant Sync Emails Cables Entrepreneur Investment Analytics Project Management Relocation Nanotechnology Employees Telecommuting Employee/Employer Relationships Cortana Best Available ISP Netflix Windows 365 Shortcut Two Factor Authentication Digital Signature Video Conferencing Cost Management WIndows 7 ROI Video Games Root Cause Analysis Shortcuts Worker Commute HBO Warranty Knowledge Sales Social Networking Music Bitcoin Google Apps Personal Cryptomining Experience Skype HVAC Point of Sale Analysis Supply Chain Management Scalability Data loss Business Owner Outlook Administrator Running Cable Leadership Devices Monitoring Troubleshooting Batteries Digitize Memory Start Menu Enterprise Content Management Windows 8.1 NarrowBand Screen Mirroring Windows Media Player MSP Loyalty Accountants User Windows Server 2008 R2 PowerPoint Search Frequently Asked Questions Microchip iPhone Thought Leadership Customer relationships Books Credit Cards Password Manager IT Assessment Manufacturing Mobile Windows 10s Password Management Email Best Practices Cast Managing Stress Multi-Factor Security Security Cameras Tip of the week Search Engine Files webinar Twitter Computer Tips Emergency Managed IT Service Science Employer Employee Relationship Business Mangement OneDrive Biometric Security Professional Services Cameras Public Cloud NIST Virtual CIO Chromecast Assessment Smart Tech Peripheral Trending Windows Server 2008 Colocation Distributed Denial of Service Addiction Digital Security Cameras Uninterrupted Power Supply Customer Relationship Management Amazon Using Data Recycling Copiers Analyitcs 5G Tools Wiring Monitor Television Practices Quick Tip Programming Smartwatch Cache Ergonomics Amazon Web Services Criminal Development OLED Printer Server Safe Mode GDPR Reputation Antivirus Public Computer Hosted Computing PCI DSS Streaming Media Virtual Machine Windows 8 Employee Content Regulations Wireless Internet 2FA Tech Support Transportation Online Shopping Fiber Optics Laptop IT service Rootkit Messaging Cabling Techology Computer Fan File Sharing Camera Customers Inventory Policy Specifications Hypervisor Tablet Audiobook Workers Wire Dark mode Benefits Evernote Trend Micro Touchpad Domains SMS Travel Default App FENG Printers IBM Procedure Millennials Saving Time Google Search Politics Flash Advertising IaaS Smart Office dark theme Maintenance Smart Technology Wireless Charging Shopping

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code