Feeds

Punters take tech to bed, breakfast

Studies state the bleedin' obvious

High performance access to file storage

There are two winners of the Sybil Fawlty "bleedin' obvious" award this week.

First, let's give a round of applause to IPTV company SeeSaw which managed to identify a new social trend: 'TV Dinners' have become 'PC Dinners'.

The on-demand TV service SeeSaw interviewed 2000 Brits and found that over half of them "confessed" to eating dinner in front of a computer. OMG right? But that's not all. A fifth of them do it on a regular basis. Shock, shock horror.

The computer is apparently used in other "unlikely" places too. A third of us, use them while on the loo, while two thirds of us surf the net sat in bed. And I thought I was the only one...

Disney Pixar's Wall-E

YOUR TECH FUTURE
Source: Disney Pixar

Moving on, our next winner is the Washington DC-based National Sleep Foundation (NSF) for conducting a study that shows those who stay up late using electronics don't get enough sleep, Reuters reports.

Experts suggest teenagers should get over nine hours of sleep a night, but with more than a third of them watching TV or downloading pr0n before bed, that figure is cut to just seven or so hours.

Biology boffin Charles Czeisler says exposure to artificial light can suppress the release of melatonin, the body's natural hormone for inducing sleep.

"Kids today are getting an hour-and-a-half to two hours less sleep per night than they did a century ago. That means that they are losing about 50 hours of sleep per month," said Czeisler.

But it isn't just children who are affected by technology. Many of us watch TV into the twilight hours and almost a third of young adults stay up late to play videogames. Some 60 per cent of us use computers before bedtime too, all of which causes us to lose valuable kippage.

According to the NSF, that can have a negative impact on work, mood, family relationships, driving ability, sexual energy and, of course, health.

So there you have it: we now know lots of us watch computers over dinner, and don't get enough sleep because we spend too much time fiddling with technology. Great work, chaps.

At least those who read such studies won't have any problems dozing off. ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.