Feeds

Profs: Eating Belgian truffles will make you buy a Mac

Homemade meringues = Linux, presumably*

5 things you didn’t know about cloud backup

In a development whose majorness would be hard to overemphasise, research by topflight eggheads has revealed that eating just one Belgian truffle could turn you into a Mac fanboy, or indeed girl.

The news comes to us from the periodical read by all corporate spammers who are serious about their profession, The Journal of Consumer Research, publishing the results of an in-depth analysis by selling-people-stuff profs Juliano Laran (University of Miami) and Chris Janiszewski (University of Florida).

The two salesman-academics ran a study which involved giving one group of people a chocolate truffle, and asking another group to be strong and abstain. It appears that scoffing just one fancy choc, according to the profs, tends to unleash a "what the hell" syndrome. The truffle-gobblers then feel a strong desire for more treats - for instance ice cream, pizza, and potato chips - while the puritanical group found it easy to spurn any further delicious but possibly nutritionally unwise offerings.

If that was all, frankly we wouldn't have bothered you. But it's not.

"A second study again had people eat or resist a chocolate truffle and asked them to indicate how much they desired several products that are symbols of status [for example] an Apple computer... People who ate the truffle desired the status products significantly more than those who had to resist the truffle," write Laran and Janiszewski.

There you have it. Eating overpriced chocs which come in a pretty, wantable box will lead to the purchase of... well, you get the idea.

"Our research shows that small acts may lead people to unconsciously seek more indulgence," the authors conclude.

Their paper is called Behavioral Consistency and Inconsistency in the Resolution of Goal Conflict, and will be published in the April '09 edition of the The Journal of Consumer Research. ®

Bootnote

*Requires some skill to achieve at home; tends to make the achiever incomprehensibly smug. The natural Windows types would, by extension, tend to favour mainstream, occasionally faulty but accessible treats (doughnuts, perhaps) lying between the intuitive, gorgeous truffle and recondite delicacies fashioned from commonly available basic ingredients and open-source knowledge. Insert your alternative OS-as-confectionery analogies here.

Secure remote control for conventional and virtual desktops

More from The Register

next story
Boffins attempt to prove the UNIVERSE IS JUST A HOLOGRAM
Is this the real life? Is this just fantasy?
Our LOHAN spaceplane ballocket Kickstarter climbs through £8000
Through 25 per cent but more is needed: Get your UNIQUE rewards!
Software bug caught Galileo sats in landslide, no escape from reality
Life had just begun, code error means Russia's gone and thrown it all away
LOHAN tunes into ultra long range radio
And verily, Vultures shall speak status unto distant receivers
SpaceX prototype rocket EXPLODES over Texas. 'Tricky' biz, says Elon Musk
No injuries or near injuries. Flight stayed in designated area
Galileo, Galileo! Galileo, Galileo! Galileo fit to go. Magnifico
I'm just a poor boy, nobody loves me. But at least I can find my way with ESA GPS by 2017
EOS, Lockheed to track space junk from Oz
WA facility gets laser-eyes out of the fog
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.