Feeds

Microsoft: Vista desktop key to life fulfillment

Icons, wallpaper reveal your inner being. Apparently

High performance access to file storage

Forget rummaging through colleagues' drawers - if you really want to know what kind of person the man or woman you're working with is, just look at their desktop.

So claims psychologist Donna Dawson, who was this week called in by Microsoft to help promote Windows Vista. Her method: highlighting users' “desktop personality types” by analysing their chosen wallpapers and icon arrangements.

For example, if you’re desktop is splattered with icons then you’re likely to be disorganised and prone to losing focus easily, the specialist in "personality, behaviour and relationships" maintains.

However, a desktop with numerous neat rows of icons means you’re the sort of person who needs to have everything to hand and who likes to feel in control.

Windows_desktop_011

What does your desktop say about you?

Show-offs and those with big egos will have pictures of themselves, say, scoring a goal at five-a-side footie or on the verge of making a bungee jump.

Conversely, shy and retiring types are more likely to have plain blue wallpaper.

“You may not consciously be aware of it but once you know, then you may be able to manipulate how other people think of you," Dawson suggested. "Your desktop can be used to give off a positive message about who you are."

This is the same Donna Dawson who recently revealed, on behalf of HD broadcaster Sky, that watching TV programmes in HD makes you feel better.

Microsoft was quick to follow this insight up with some handy hints to help you take control of your Windows Vista desktop - and, by the above rationale, your personality. Presumably, the software giant hope that the Vista-less - for they are legion - will be eager to be thus empowered and so upgrade their operating system.

According to her website, "Donna advises large consumer-oriented companies on the creation of lifestyle surveys as well as analysing the results, producing reports, quotes, personality ‘types’, quizzes and convention speeches where required". ®

High performance access to file storage

More from The Register

next story
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.