ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

Use Your Smartphone Incorrectly and Risk Going Temporarily Blind

It’s no secret that the screens of devices like smartphones, laptops, desktop monitors, and tablets, can contribute to eye pain and what’s called “digital eye strain.” In fact, in some extraordinary cases of prolonged screen use, smartphone use has even led to temporary blindness.

First, let’s take a step back and look at what screens as a whole can do to your eyes when stared at for too long. TechInsider reports that:

  • 10 percent of users spend three-quarters of their waking hours looking at screens.
  • 40 percent of users spending more than five hours a day looking at screens.
  • 95 percent of users spend more than two hours a day looking at screens.

Granted, in the office setting, it’s difficult to avoid this situation, as you need a workstation in order to do your job. On a more fundamental level, it’s tempting to just kick back and relax with some television when you get home, which can lead to spending more time in front of a screen than you might prefer.

In particular, you want to avoid looking at your devices at night, and with only one eye. According to two recent cases, doing so could potentially be linked to temporary blindness. The two women involved in the cases, aged at 22 and 40, both experienced temporary blindness in one eye after checking their device, while laying on their side, with the pillow covering one eye, and in the dark. After going through several tests and determining that there was nothing physically wrong with them, the optometrist managed to diagnose the problem.

Professionals believe that the temporary blindness is a result of the other eye catching up and adapting to the dark. In this situation, one eye moved to accommodate the light from the smartphone screen, while the other was still blocked by the pillow. Therefore, once the light from the smartphone goes out, the open eye tries to adapt to its surroundings again and the user is plunged into darkness until the other eye catches up. Some doctors believe that these two cases aren’t quite enough to link one-eyed smartphone use in the dark to temporary blindness, and as a result, they feel that the cases are extraordinary enough to write off as circumstantial.

However, while the temporary blindness may be rare, you should still try to keep your eyes healthy, especially if you’re in front of a screen all day. Continuous absorption of blue light can cause damage to your eyes and produce cataracts, among many other problems. In order to reduce the amount of eye strain you experience, here are a few suggestions for how to conduct yourself while in and out of the office:

Blink Occasionally
Staring at screens can dry out your eyes, so it’s important that you blink to relieve them.

Increase the Size of the Text
If the text you’re reading is small, it’ll cause you to squint and move closer to the screen, which can lead to headaches and eye strain. Increase the size of the text to avoid this.

Use the 20-20-20 Rule
Every 20 minutes, take 20 seconds to look away from the screen and look at something 20 feet away from you. This keeps the muscles in your eyes moving so that they’re not sedentary throughout the workday.

Reduce Blue-Light Exposure
For office workers, this might be difficult. It can be helpful to take small breaks here and there from looking at the screen, or using what are called “computer glass” to block some of the blue light emitted by screens.

Do you have any tips or tricks for avoiding the eye strain that comes from constantly using a computer? Let us know in the comments, and subscribe to our blog for more tips.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 11 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Business Management Cybersecurity IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Communication Managed IT Services Data Recovery Quick Tips Productivity Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Apps Managed Service Windows 10 IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Remote Work Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Workplace Strategy Gadgets Networking Windows WiFi Server Information Remote Bandwidth Encryption Mobile Device Management Business Technology App Virtualization Blockchain Spam Employee/Employer Relationship Budget History Gmail Office Apple Two-factor Authentication Information Technology Office 365 Conferencing Access Control Data Security Cybercrime Wi-Fi BDR Health Big Data Analytics Document Management Hacker Save Money Patch Management Vendor Compliance Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Help Desk Hacking Cost Management IT Management Training Remote Computing Data storage Money Customer Service Unified Threat Management Firewall Applications Augmented Reality Word Search... Project Management BYOD Vulnerabilities Best Practice IBM Website Computing Retail Vendor Management Hard Drive Mobile Office Alert Managed Services Hiring/Firing Data loss Outlook Password Legal Chrome Update Sports Travel Social SaaS DDoS Virtual Reality Data Breach Mobile Computing Social Engineering Cryptocurrency Paperless Office Antivirus Black Market Marketing Maintenance iPhone Cleaning Running Cable Education Cortana Robot Windows 11 Content Filtering Monitoring Storage Healthcare Router Websites Remote Workers Mobility Meetings The Internet of Things Windows 7 YouTube Free Resource Google Maps Twitter Scam User Law Enforcement How To Laptop End of Support Printer VPN Downtime Tech Terms Images 101 Integration Hack Safety Identity Theft Display Notifications Managed IT Digital Unified Communications Virtual Assistant Virtual Desktop Google Docs PowerPoint Experience Employees Administration Bluetooth Taxes Avoiding Downtime Distributed Denial of Service Office Tips Holidays Presentation Specifications Private Cloud Processor Memory IT Consultant Cooperation Disaster Video Conferencing Physical Security Customer Relationship Management Co-Managed IT Virtual Machines Politics Entertainment Machine Learning Settings Computer Repair Lithium-ion battery Multi-factor Authentication Start Menu Professional Services Solid State Drive Downloads Computer Care Processors Vulnerability Saving Time Drones Managed Services Provider Chromebook Software as a Service Data Protection Computers Bitcoin Automobile Virtual Private Network HIPAA Telephone How To Current Events Wireless Technology Microchip Flexibility eWaste Excel Solutions Reliable Computing Fileless Malware Heating/Cooling Writing Tablet Smart Devices Environment G Suite Tip of the week Windows XP Mouse VoIP Gamification Remote Working Social Networking Tracking Company Culture Regulations Trend Micro Be Proactive Telephone System AI Inbound Marketing Scalability Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Web Server Transportation Administrator SharePoint Text Messaging Content Proactive IT Digital Payment Desktop Wasting Time Worker Accountants eCommerce Modem Workplace Strategies Bring Your Own Device Electronic Medical Records Videos Access Database Surveillance Electronic Payment Time Management Music Public Cloud Managing Costs Equifax SSID Staffing Health IT Audit Media IP Address Spyware Tactics Development Hard Drive Disposal Employer/Employee Relationships Botnet Phone System Username File Sharing Virtual Machine Micrsooft Startup Optimization Freedom of Information Smart Technology Rental Service Redundancy Reviews Navigation 2FA Flash Cache Addiction email scam Teamwork Telephone Systems Unified Threat Management Data Storage Business Growth Workers Mobile Security Hypervisor Competition Legislation News Medical IT Recovery User Tip Shopping Printing Evernote Paperless Computer Accessories Network Management CCTV SQL Server LiFi Banking Touchscreen PCI DSS Entrepreneur Google Wallet Licensing Documents Messenger Emergency Proxy Server Gig Economy Application Deep Learning Emails Humor Computer Malfunction Fake News Supply Chain Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Business Intelligence Computing Infrastructure Azure Hosted Solution Samsung Device security Managed IT Service Business Metrics Management Regulations Compliance Securty Books Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Tech Human Resources Domains Language Business Mangement Going Green Net Neutrality Society Business Cards Tablets Error Financial Data Troubleshooting Reading Bookmark Risk Management Monitors IT Visible Light Communication Scams Google Calendar Term Google Apps Download Windows 8 Supercomputer Piracy HTML Virus Telework Relocation Browsers Smartwatch Public Speaking Displays Nanotechnology Communitications Advertising Motion Sickness Microsoft 365 Cables Streaming Media Comparison Google Play Work/Life Balance Google Drive Upload Procurement Tech Support Software License Keyboard Social Network FinTech Business Owner Knowledge Data Analysis CES Hard Drives Corporate Profile Screen Reader IT Assessment Point of Sale In Internet of Things Television Security Cameras Telephony Trends Supply Chain Management intranet Employer Employee Relationship Mobile Technology Value Shortcut Network Congestion Cabling Devices Cyber security Shortcuts Wireless Hacks Customer Resource management Organization

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?