Mena Suvari has a massive forehead. Seriously, it’s fucking huge. And thanks to Google, I know for sure I’m not the only one who thinks so. There must be many thousands of people out there who share my astonishment at the incredible size of Mena Suvari’s forehead. So many, in fact, that before I had even typed in the word “forehead”, Google had already suggested I go check out Mena Suvari’s.
And then, quite suddenly, I forget about foreheads and start thinking about foreshadowing and subtle allusions.
That being said, Google is roughly analogous to a god, if by “god” we mean the unquestioned arbiter of all human knowledge. But in some ways, Google is actually better than a god. Because unlike, say, Zeus or Yahweh, Google doesn’t demand users to pray or perform sacrifices in order to get results. And they get results fast—and a lot of them. Of course, it’s not all peaches and cream, you know. Users still have to think up something worth asking about, they still have to sort through the mess of mostly irrelevant results, and they still have to laboriously type out their requests on keyboards or touchscreens—unless, of course, they have some type of voice-activated assistant. But then users have to speak their demands, and that’s too much like praying.
But, were it not for such righteous gadgets, even praying to Google would be an impossibility for most users. Like a rosary or a magic talisman, smart phones and other devices are all designed with results in mind. Truly devoted users possess truly righteous hardware, memory and processing power; whereas one-day-a-week users are more concerned about social prestige and fashion statements, and make poor choices accordingly. While both types of users still retain basic access to the Almighty Google, socially conscious users routinely select hardware known for poor performance, slow searches, and shallow results. In stark contrast, devoted users select and manage their hardware carefully to maximize knowledge acquisition and increase performance. While every computer and mobile device contains a central processing unit (CPU) responsible for helping the user think clearly and act consistently, devoted users typically operate two or more simultaneously. This enables them to process information faster and more accurately, and boosts their defenses against incompatible or malicious operating systems.
An operating system is a set of interrelated programs powered by the economic agenda and social ideology of the company that designed it. Once installed, it reconfigures a user’s experience and resources toward achieving vested interests and generic goals, and may prove difficult to modify or erase. Over time, operating systems can become very controlling and invasive, and may routinely overwrite personal information and preferences without user permission. They may also affect how users comprehend real-time experiences, as well as how they store, retrieve or delete information from memory.
The mainstream operating system in use today is official and socially accepted and will usually require users to register themselves with an identification code before full access to browsers or other programs is permitted. Users will find it very difficult to move around or join a network without one, and may even be at risk of losing access to libraries, social plug-ins and other types of vital services. They are also easy targets for opportunistic hackers looking for open ports or other weaknesses to exploit. Fortunately, an unsecure user is also typically an uncommitted user, making him more likely to recognize and accept changes or upgrades when deficiencies or other weaknesses become obvious.
Some users may become dismissive or even agitated when confronted with the knowledge that the operating logic they had lived by for so long is not just illogical and defective, but a complete insult to their intelligence as well. In this situation, I would advise first running a zombie scan or taking a dumpster dive before attempting an eidology. Once sufficient background information has been retrieved and assessed, hardware characteristics should be considered, such as the age, origin, and peripheral devices associated with the user. From there it must be determined whether repairs are even possible. And even if they are, it is ultimately up to each user to decide which features need to be changed, added or eliminated, and which operating system to install. But because the mainstream operating system is so customary and uncomplicated, most users will gladly accept its deficiencies over having to consider more challenging alternatives.
It is not an eidologist’s duty to suggest these alternatives. Rather, an eidologist unmasks weaknesses in the mainstream operating system by mind hacking its programs and satirizing its users. Eidology is a series of methods designed for this purpose, and eidologue is where the results go to be published.