Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET
The Friday Funny

The Friday Funny: Tech Timeout

Do your friends and family spend more time staring at smartphone and tablet screens than they do talking to each other? We’ve all been guilty of tech obsession at times, and now Foresters — a life insurance provider based in Canada — has started a “TechTimeout” campaign that tries to get people to put down their gadgets and behave like the social animals we are. By like, you know, talking to other people in person and stuff.
Foresters Tech Timeout

Gadget addiction taken to the water-logged extreme. (Hat tip to J. Peter Bruzzese for the link.)

The company has produced a humorous YouTube video (embedded below) that shows gadget-addicted people blundering into lampposts, pouring scalding coffee on the privates of loved ones while texting a BFF, and participating in water sports while listening to an iPod or saving a virtual world via Gameboy.

Sponsored Content

Say Goodbye to Traditional PC Lifecycle Management

Traditional IT tools, including Microsoft SCCM, Ghost Solution Suite, and KACE, often require considerable custom configurations by T3 technicians (an expensive and often elusive IT resource) to enable management of a hybrid onsite + remote workforce. In many cases, even with the best resources, organizations are finding that these on-premise tools simply cannot support remote endpoints consistently and reliably due to infrastructure limitations.

Have any funny stories of tech-obsessed co-workers or friends to share? Drop me an email with your thoughts.

Related Topics:

BECOME A PETRI MEMBER:

Don't have a login but want to join the conversation? Sign up for a Petri Account

Register
Comments (0)

Leave a Reply

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: