Feeds

Misheard song lyrics blamed on technology

"Oooo-oooooh my ears are alight"

Security for virtualized datacentres

If you don’t know the words to your favourite songs, then don’t blame your hearing because a survey’s found that music download sites and declining CD sales could actually be the cause.

The National Year of Reading, a group created to celebrate reading, recently surveyed 4000 Brits aged between 18 and 65. It found that 62 per cent claimed not to know the words to their favourite tunes because the lyrics were inaccessible online.

Although many websites exist where music fans can download the lyrics to tracks, many respondents said that such sites were “unreliable and often incorrect”.

Half of those questioned said lyrics were less accessible than they were five years ago, with one of the most popular excuses being that lyrics aren’t printed in CD covers anymore.

One website that’s dedicated to song lyrics has also printed a list of some of the most commonly misheard lyrics. For example, Robert Palmer apparently sang that “You might as well face it, you’re a d**k with a glove”. Whilst some seem to believe that REM suggested “Let’s pee in the corner”.

But, if you’re not willing to admit to being a Spice Girls fan then we’ll tell you now, they aren’t singing “If you wanna do my mother, you gotta get her a Benz”.

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.