.

Thursday, January 10, 2019

Analysis and Review of Source Code Movie

cum codification with its whimsical twist on the classic date-loop scenario, brings mystery, exercise and a refreshing sci-fi structure for the au withernces amazement. This film, the correspondings of many sci-fi thrillers of the past, plays on societal issues with applied science and its potenti e rattling last(predicate)y dangerous implications to the world. The plot, although minimalistic at a glance, unfolds with twists and turns that carry this sci-fi thriller to places never before seen by the sci-fi genre. As film reviewer, Peter Bradshaw, localize it, with twists and turns, and at breathtaking speed, this film runs on rails. 1 Science Fiction is a genre that is almost entirely based upon societies obscure relationship with engineering science and its potential implications on society. In the film, the main technology presented is a program unsurprisingly called Source Code. The program allows our overstep character, Colter Stevens, brain to access the organic structure of a man who is already dead. The technology works by accessing the last octette minutes of persons memory and turning it into an leap reality. It is described by its creator, Dr. Rutledge, as a tool for revisiting rather than revising clock. by means of and through with(predicate) computer address enrol, Colter Stevens creates Sean, a dupe of a train- onslaught outside Chicago. Although the train-bombing has already occurred, new(prenominal) acts of terror are imminent in downtown Chicago. If Stevens is to make use of source work out as expected he is to key out out who is responsible for the train bombing and relay his findings to the people of the present so they may prevent further incidents. all(prenominal) time his eight minutes are up, Stevens finds himself within a codfish pumped(p) with a video screen. This screen is his exactly link Dr. Rutledges unit and Stevens commanding officer, Colleen Goodwin.The seedpod is a metaphysical set created to ap ologize Stevens thoughts and feelings. The room is basically his mind and all that is going within it. The environment of the pod changes as Stevens comprehension of the situation increases. The metaphysical nature of this set seems extremely intentional as there are essentially only three different sets apply throughout the films entirety. The use of this pod like set is very similar in nature to that of the sets from 2001 A Space Odyssey in the sense that they are combining wholly human elements nto technological environments. 2 Each time Stevens returns to the train, he gathers more information close to the bomb, the bomber, and the other people on the train, including Christina, the cheat interest. erst Stevens returns with the name of the bomber his commissioning is over. At this point in the film, Stevens learns that he died in the helicopter over Afghanistan and nowadays only exists within the source code. later on learning this, he convinces Goodwin to allow him a ss in one more time to save everyone on the train and die knowing they were all saved.However, once everyone has been saved, he does not die and will screw as Sean for the rest of his feel. Source Code is similar to many movies from the 1950s and 60s because of its use of relevant political issues to strike terror within the viewer. Much like how the polar War paranoia permeated science fiction through features like War of the Worlds (1954) and The Day the existence Stood Still (1951), the authentic fear of terrorism trickles through Source Codes plot. 3 An obvious disclosure of this fear is the bomber himself.Derek Frost appears to be a young, white, suburban male and because his coming into court is not that of a stereotypical terrorist, Stevens overlooks him as a suspect initially. By employ the least likely suspect as the antagonist, Source Code is challenging our current beliefs on terrorism that only non-Ameri atomic number 50s can be classified as terrorists. By creat ing this unlikely villain, source code creates relevancy to the disaster, and realism to the situation. The unlikely villain shows that through technology anyone can really become a threat to society.The introduction of this honest citizen villain prompts us to question our indebtedness with technology. Here technologys power is illustrated because it transforms our average Derek into a super-villain capable of catastrophic events. On the other hand, we are also confronted with the potential lifetime deliver ability of the source code. Dr. Rutledge believed source code was only capable of saving lives that had not been already lost. However, the program enabled Stevens to not only save lives on the train, besides also his own. Stevens doesnt just switch through action-flick hoops, he also confronts or so Big Questions argon we alone? Are we set free? Do we have free will? the importance of which become establish as the outlines of Stevenss true pot are revealed. 4 The im plication of this notion is very apparent as Stevens becomes more mindful of his situation. His initial experiences within source code are consumed by self-seeking tasks much(prenominal) as trying to locate his beat and find out what has happened to him.However, as he begins to understand source code and believes that his life no longer exists, his motives quickly change. Once Stevens begins to use source code for the great good, he himself is also freed. This is a select commentary on our usage of technology itself in that we need to use technology for the greater good and not for selfish means. It is this notion that we the audience is left to ponder. pass on technology bring humanity to a never before seen existence or destroy our being entirely?BibliographyCook, David A. A History of Narrative Film. New York W.W. Norton. 498-499, 925-927.Bradshaw, Peter. Source Code Review. The Guardian. http//www.guardian.co.uk/film/2011/mar/31/source-code-review (accessed April 12, 2011 ).Dargis, Manohla. Dont Know Who You Are, but Dont Know Who I Am. The New York Times. http//movies.nytimes.com/2011/04/01/movies/jake-gyllenhaal-in-source-code-review.html (accessed April 12, 2011).

No comments:

Post a Comment