Free Essay

Stealth

In: Film and Music

Submitted By cadams7301
Words 2644
Pages 11
Film Critique: STEALTH
Cheri Adams
ENG225
Instructor: Matthew Norsworthy
May 15, 2011

Film Critique: Stealth Stealth was made in 2005 and is presented by Columbia Pictures, directed by Rob Cohen, Produced by Mike Medavoy. The Executive Producer was Arnold Messer. The movie starts out with wording and music, similar to Star Wars, giving the prologue of the movie. I feel that the Director’s vision is that he is trying to warn us about what the future is capable of happening, if we put “brains” in computers. In this thesis I will be telling you about the movie so you will be able to understand what is happening. I will also be telling you who is in the movie and what their roles are, the style and directing of the movie. I will also Critique the film regarding the flaws that was done, the editing to the style and the acting. The Original music was done by BT. Music plays throughout the movie; the colors are neutral at the beginning of the movie with certain key items showing full color, in one scene a United States flag is flying on a building. Dean Semler does the Cinematography’s work. His work includes Secretariat (2010) and Mad Max: Fury Road (pre-production) (2012). Stephen Rivhin did the film editing. His most recent work was Avatar (2009), Pirates of the Caribbean: At World’s End (2007) and Pirates of the Caribbean: Dead Man’s Chest (2006). Making a movie is a genuinely collaborative effort. Large films employ literally hundreds of people who work together to create the finished product. Yet as with any endeavor that enlists the labor of so many people, there must be one person with the power and the overall vision to make sure that all the pieces come together as they should (Goodykoontz & Jacobs, 2011). Rob Cohen has also directed XXX (2002) and the Fast and the Furious (2001), he was also producer of XXX: State of the Union (2005) and The Last Ride (2004). He is known for directing high-energy action films. Mike Medavoy has also produced Black Swan (2010), Shutter Island (2010) Zodiac (2007) and The 6th Day (2000) (Sony Pictures Digital Inc., 2007). Rob Cohen likes to direct Action movies, but he will not do sequels. He told the actor’s his point of view concerning what he wanted then he told the actor’s to go for it. The main actors are Josh Lucas, Jessica Biel and Jamie Foxx. The story is of the three best pilots, of 400 tested, was trained to operate the super Stealth warplane to fight the enemy whoever or wherever they are in the world. Then they are sent to a ship, the USS Abraham Lincoln, to meet their new member of the team, a state-of-the-art, fully automated, pilotless, super stealth warplane – inhuman and invincible, is called EDI – Extreme Deep Invader (Columbia Pictures Industries Inc., 2005). The plot of the movie is in chronological order and takes place mainly in the air while in the stealth planes. U.S. Navy pilots Ben Gannon (Josh Lucas), Henry Purcell (Jamie Foxx), and Kara Wade (Jessica Biel) are the best of the best. Captain George Cummings (Sam Shepard) chose them out of 400 pilots to fly the next generation of stealth fighter jets called Talons. After their flight training in the Talons, they have become a cohesive unit and a highly efficient fighting team. Captain Cummings adds a new "wingman" to the team, an Unmanned Combat Aerial Vehicle (UCAV) that is being flown by "EDI", a computer with an artificial intelligence brain mounted in a ball inside the cockpit. On their first mission, EDI begins to learn the skills and attitudes of the other pilots, and quickly understands that he can fly the plane better and faster than men. EDI has the capability to process data faster, and under extreme speeds will not blackout. Returning to the aircraft carrier, EDI is struck by lightning, which begins to change the computer's circuits. On the next flight, EDI refuses to scrub a mission despite the potential for massive civilian casualties. Upon return to base, Ben implores Captain Cummings to remove EDI from duty for further testing; Cummings ignores Ben's objections, and EDI's computer tech (who was beginning to suspect EDI was going rogue) is mysteriously replaced by much more docile techs. EDI begins to think for itself, and assigns itself a mission to take out a radical element in China. EDI cuts his link with the flight controller on the carrier, and he will not take a direct order from Ben. Henry locates and chases EDI, and gives it an ultimatum: return to base, or he will take it out. EDI declines to return to base. Henry fires his missiles, misses EDI, and is him self killed by the explosions. There are a lot of criticisms regarding this scene. “This is a film so deeply wedded to cliché that it kills off its leading black character simply to give the white male lead a free shot at the female lead. It even establishes Jaime Foxx's character beforehand as a stud and yet has him express no interest in the gorgeous female pilot played by Jessica Biel.” (IMDb, 2011b) According to Jamie Foxx “We actually shot - movies come out [out of sequence].” Back on the carrier, Captain Cummings, is in cahoots with his political advisor, decides to destroy EDI, the pilots, and Dr. Orbit, the creator of the plane's AI, to cover up the fiasco. Kara's plane was damaged in the explosion, and she must return to the carrier; en route, her engines fail, she ejects and is injured on her descent, crashing in North Korea. Pursued by N. Korean soldiers, Kara struggles toward the S. Korean border, which is an ally. Meanwhile, Ben chases EDI and manages to talk it back under control. Cummings tells Ben to head to a remote Alaskan base "not on any map" for repairs, EDI in tow. He comes in hot and survives a crash landing. Cummings has had Dr. Orbit brought there, and orders him to wipe EDI's memory. The base personnel turn out to be under Cumming's thumb. Ben survives an attempt on his life by the "medic" tending his injuries, makes his way to the hangar, and in a blaze of gunfire, stops the EDI memory-wipe. He goes inside EDI, blows open the hangar doors with a missile, and flies off in EDI to rescue Kara while Dr. Orbit also escapes. The explosives that it took to blow this up took over 500 gallons of gasoline in an Alaska airfield. NASA had to be notified of it in advance because it was so big. (Columbia Pictures Industries Inc., 2005) Kara has made it to no-man's land on the Korean border, but it looks like her luck has run out as she is pinned down by enemy fire. Ben and EDI arrive just in time; Ben exits EDI to kiss Kara; EDI, out of missiles, launches itself into a North Korean helicopter gunship to save the lovers, and they make their way to safety. The message that I believe that this movie is trying to send is that the near future, there’s a faction in the Navy that’s pushing for an entire Artificial Intelligence Air Force. That it is more cost-effective, it doesn’t take seven years to train, and they think that it goes down more easily – a bunch of smashed-up plane parts don’t have the same heart tug as body bags. What the military is doing is that this is their job and that’s what this movie says. The Clip that I chose to describe for the lighting was “Lightning Strike” (2011). This is shown when lightning strikes EDI and Ben’s plane. This is happening when there is a storm all around Ben’s and EDI’s plane, they are trying to land the planes on the Ship. It is dark for the most part except when they made certain colors stand out. There were both long shots and medium shots. I would classify this film as a Fast-Action Thriller. Because of the fast flying and fast action fighting. It does not fit any of the genres from the book but if there were a fast action genre then this would be in that genre. The movie company does classify this film as in the Action, Adventure, Sci-Fi & Thriller Genre. The protagonists are the three human pilots and the antagonist is the EDI. (About.com, 2011) The satire throughout the film is military uniform; in some of the short scenes they are wearing civilian clothes. The sound that you hear in this clip is: thunder, dialogue, lightning striking the plane and the sound of going through the circuit boards of the UCAV’s brain, music is playing in the background and the screeching of the tires on the plane as it hits the deck of the ship. You can hear Ben talking to the guy on the Ship and the men as they are putting the net up for the UCAV to land. I thought that during one scene of the movie they are flying so close (15 feet in altitude to be precise) to the rice patties and water at very high speeds. The force of the air being compressed under the jet would have made some major disturbances in the water and yet nothing happened. A few seconds later, they flew a building and ripped the roof tiles off. I would classify this as a big goof. Another goof would be when they are fighting the Russians fighter jet, they could not get away from it. How is that possible when they were earlier going to Mach 5 speed? Why couldn’t they just go into to Mach speed and get away from them? Roger Ebert said, “The pilot ejects. The plane explodes, and flaming debris falls out of the sky and threatens to hit the pilot and the parachute. If the plane is going at Mach 1, 2 or 3, wouldn't the debris be falling miles away from the descent path of the pilot?” (Ebert, R., 2005) When the Unmanned Combat Aerial Vehicle is first taken for a test run, Lt. Ben Gannon is heard to say “Let the schoolin’ begin!” right before the fighters break formation, yet on the screens in the command center showing the facial shots of each pilot you can clearly see his mouth is not moving. During the scene in which the plane flies directly toward the ground at a speed of 2070 knots to deliver the bomb, after dropping the bomb and pulling up to fly horizontally through the city streets, there is no damage or anything created from a sonic boom. At that level and speed, the sonic boom would have been tremendous on the ground, even if the plane were designed to minimize the shock wave. The critic’s reviews were severely critical. In the Yahoo Movie critic’s review they gave the movie an average grade of a D+. 'Stealth' has got the right stuff -- guns, guts and good looks. But instead of flying high, it sputters to get off the ground. The only highlight is a backstabbing computer named Eddie. July 29, 2005 By Mick LaSalle, Chronicle Movie Critic. Chris Barsanti of filmcritic.com states,” Almost apocalyptic in its stupidity, Stealth would have us believe that Navy fighter pilots can rampage through foreign countries destroying enemy combatants at will, with nary a repercussion to show for it. By the end of this film, the principals have been responsible for such a wide swath of destruction that even the densest of viewers is quite aware that the United States would have been at war with Myanmar, Tajikistan, Russia, and North Korea.” (Yahoo.com, 2011) Josh Lucas said, “You’ve got to remember, too, this movie - there is a chemistry that happens in this movie which is really created by the director in the sense that we’re all working on different sound stages at the same time. We’re not together. It looks like we’re together, but there are three planes on three different sound stages and they’re all being videoed in the same way, so it looks like we’re working. But really everyone’s half a mile apart. It was difficult.” (Columbia Pictures Industries Inc., 2005) What did the actor’s bring to the character? Jamie Foxx brought humor to his character. Jessica Biel, brought her sexiness and strong attitude. According to Jessica Biel “ This character is definitely me” (IMDb, 2011b). Josh Lucas brought his seriousness and knowledge. Josh Lucas went to Flight survival training school to really get into his character (IMDb, 2011b). Rob Cohen told the Actor’s “Here’s your character, here are some things that you may be able to enhance it. Make it different, use your talent and idea and come with your thing”. This was definitely not these actor’s best movie they have ever been in. For Josh Lucas, his best movie was “A Beautiful Mind”. For Jessica Biel it was “I Now Pronounce You Chuck and Larry” and for Jamie Foxx it was “Rio”. Rob Cohen’s best movie he ever made was “Fast and the Furious”. (IMDb, 2011a) This film cost $138 million to make, but was panned by the critics. It was the biggest Box Office bomb making only $76,932,872 worldwide, of which $44,816,126 was of foreign, one of the biggest losses in cinematic history. This film only ran 5 weeks before it was taken out of the Theaters. (IMDb, 2011b) For most of the flight scenes, the artists at Digital Domain used "EnGen" (Environment Generator) to create the virtual landscapes, also used on The Time Machine (2002) & Star Trek: Nemesis (2002). An earlier version of the program, called "Terragen", is on-line available for free. (IMDb, 2011b) In conclusion, Stealth is not talking about politics; it just questions the how, the why and the use of technology. This film had its flaws but it also had some interesting things that make you think about what could happen if machines did have a brain. If you did not have any knowledge of planes or ships you most likely would not notice the mistakes that was made. I actually thought that this movie was good. I heard/read some reviews before seeing this movie, and most of them gave it a bad critique, but I usually find myself disagreeing with most critics out there so I saw it. The action/special effects were really good if you don’t know what you are looking at. The story line may be unbelievable, but that is what fiction is for. I doubt that something like this will happen in real life (I'm referring to the Navy’s lack of regard for collateral damage in this movie). Over all, I'm glad I got to see this on the big screen and again on video and viewed all the effects there. Sometimes you just got to let loose and enjoy the show and not over analyze movies, otherwise it looses its entertainment value.

References
About.com Lightning Strike (2011) Retrieved from http://movies.about.com/od/stealth/a/stealth022205.htm
Box Office Mojo, IMDb Company (2011a) Retrieved from http://www.boxofficemojo.com/movies/?page=main&id=stealth.htm
Columbia Pictures Industries Inc. Retrieved from DVD Case (2005)
Ebert, R. (July 28, 2005) Retrieved from http://rogerebert.suntimes.com/apps/pbcs.dll/article?AID=/20050727/REVIEWS/50713001/1023
Goodykoontz, B., & Jacobs, C. P. (2011). Film: From Watching to Seeing. San Diego, CA: Bridgepoint Education, Inc. Retrieved from http://content.ashford.edu
IMDb.Company (2011b) Lightning Strike Retrieved from http://www.imdb.com/title/tt0382992
Sony Pictures Digital Inc. (2007) Retrieved from http://trailers.apple.com/trailers/sony_pictures/stealth/high.html Yahoo Movies (2011) Retrieved from http://movies.yahoo.com/movie/1808589476/critic…...

Similar Documents

Free Essay

Environmental Scan

...chance through the development of other aerospace programs. NG has recognized a demand in this particular market and has ramped up its infrastructure and ability level to accommodate this new demand whereas most other traditional aerospace companies, such as Boeing and Lockheed Martin have not. Additionally NG is the largest ship building company in the United States and is responsible for the construction of all Navy ships currently being built. Completive advantage In the aerospace field NG has created an advantage with its stealth technology. NG capability and development of stealth technologies are second to none in the world. Although other aerospace companies have closed the gap somewhat and do produce products with stealth technologies NG is the industry leader. The development and production of the B-2 Stealth Bomber set the bench mark in stealth technology. NG has not rested on this advantage and has continued to test and develop new stealth technologies which have helped to maintain a competitive advantage within the aerospace defense market. Information systems and information security is a fairly new market to NG, but that hasn’t stopped the corporation from separating itself from the other industry competitors. Specifically NG has used its development of secure communication systems to advance technologies in other fields outside of aerospace in which they were originally intended. This diversification has opened the door into a completely new market for NG.......

Words: 1121 - Pages: 5

Free Essay

F-117

...Force has produced 59 Nighthawks with the help of Lockheed "Skunkworks." Stealth Technology. What makes the Nighthawk so stealthy are Radar Absorbent Materials or RAMs for short. The primary RAM for the Nighthawk is Dow Chemical s Fibaloy.(Jones, 1989, p.45+77) Fibaloy is black and has great radar-energy absorbency.(Jones, 1989, p.45) Fibaloy is made by inserting glass fibers into plastic. (Jones, 1989, p.45) Another RAM is Reinforced Carbon Fiber. Reinforced Carbon Fiber absorbs and diminishes radar-energy. It also helps reduce the Nighthawk s infrared signature.(Jones, 1989, p.77) The shape of the Nighthawk also contributes to the stealth. The Nighthawk has rounded surfaces so radar waves bounce off in different directions. All of these surfaces are bent in different angles so one surface does not share a common reflective angle with another surface. There are also other modifications to help the Nighthawk s stealth abilities. For example, a special modified exhaust system decreases the amount of heat from the Nighthawk s turbofan engines. Also, the interior is classified because it is believed that RAM is also used internally. The Nighthawk is not really a fighter. The Nighthawk does not have the ability to fight air to air combat. There are at least two reasons for this. One, the Nighthawk has absolutely no defenses like chaff, flare, pensers, etc. Two, the Nighthawk relies completely on its stealth abilities and the night to avoid hostile measures and......

Words: 734 - Pages: 3

Free Essay

Research Paper, Journalism, Mass Media and Communication

...leaders may cause a war or displacements of certain groups like the gay, Jews, among others. Stealth marketing A successful marketing campaign must be able to induce a change in behavior in the people it is intended for. These induced changes may be in terms of voting preferences personal value, buying behavior since any advertisement should be objected at changing the current behavior. In the recent past, most advertisements have made people to act in a skeptical manner due to the credibility of the advertisements. Most advertisements are not sincere or credible. Further, research has shown that the word of mouth marketing is the most effective advertising method. As such, many companies are devising means through which people will talk good about their products. A good example of this form of advertising is through stealth marketing. Advertising firms have divided stealth marketing into three distinctive subsets namely, video news releases, Product placement, and Guerilla Marketing. In these three subsets, the issue of ethics has emerged with most consumers arguing the deceiving concept through stealth marketing. The consumers find themselves coursed to buying products that are substandard, or do not match their status. For instance, stealth marketing is designed to catch consumers at their most vulnerable times by capitalizing on their weak spots. Evidently, the ethicality of stealth marketing is not as clear as it may seem. Even when assessing the phenomenon by means......

Words: 1188 - Pages: 5

Free Essay

Test

...P a g e |1 BackTrack 5 guide 4: How to perform stealth actions Karthik R, Contributor You can read the original story here, on SearchSecurity.in. In previous installments of this BackTrack 5 how to tutorial, we have discussed information gathering and vulnerability assessment of the target system; explored network assessment, scanning and gaining access into the target; and, delved into privilege escalation tools. In this installment of the tutorial on BackTrack 5, how to perform stealth actions will be discussed. Why stealth? The objective of penetration testing is to replicate the actions of a malicious attacker. No attacker desires discovery of surreptitious entry into the network, and hence employs stealth techniques to remain unnoticed. The penetration tester needs to adopt the same stealth methods, in order to honestly assess the target network. http://searchsecurity.techtarget.in/tip/BackTrack-5-guide-4-How-to-perform-stealth-actions P a g e |2 Figure 1. The ‘maintaining access’ category in BackTrack 5, with a focus on OS backdoors. This installment of the BackTrack 5 how to tutorial deals with the “Maintaining Access” feature, within which are options for OS backdoors, tunneling and Web backdoors, as shown in Figure 1. OS backdoors > Cymothoa: Cymothoa is a stealth backdooring tool on BackTrack 5 that injects backdoor shell code into an existing process. This tool has been developed by codewizard and crossbower from ElectronicSouls. The......

Words: 1111 - Pages: 5

Premium Essay

Cox Case

...4………………………………………………………………………………………………......6 Question 5…………………………………………………………………………….……………………..7 Appendix………………………………………………………………………………………………………8 Bibliography…………………………………………………………………………………………………10 Executive summary Laura Martin is a reputable equity analyst, who currently deals with the sell-side of equity analysis primarily in the cable industry. Equity analysts are divided into two categories, the buy-side and the sell-side and their main task is to compile financial information of companies along with market information and consult their clients about their investment options. Martin wanted to prove that the stock price of Cox was undervalued because the company was not operating in its full capacity. Martin called the 102 MHz of unused capacity the ‘stealth tier’ as the potential revenue streams from its usage were invisible but not valueless. In order to prove her point Martin used 3 methods: the EBITDA multiple analysis, Discounted Cash flow analysis, and real options Valuation analysis. The main assumptions used for all three methods are; that the revenue growth of the company would accelerate and diversify in the period 1998-2003, that the capital spending would also slow and the nature of investments would change, and that the digital revenue streams would yield higher returns on invested capital. With each analysis Martin tried to forecast the value of Cox stock in the year 2000 by making certain assumptions. With EBITDA multiple analysis and target......

Words: 3845 - Pages: 16

Free Essay

Stealth Technology

...IMPACT OF STEALTH TECHNOLOGY ON AIR DEFENCE “Stealth refers to a wide range of steps that can be taken to make aircraft harder to detect. There is a payoff and a price.” - Jay H Goldberg [i] CHAPTER I INTRODUCTION 1. The latest trends in military aircraft manufacturing are towards development and incorporation of technology which can provide with means to avoid detection. This enhances its survivability by reducing its radar signature and hence reducing the possibility of being detected by enemy radars. The degree to which this is achieved differs from aircraft to aircraft. Certain aircraft like the B-2 and F-117 have been manufactured with this technology as the basis and are thus referred to as Stealth Aircraft. In other aircraft, stealth is achieved to a lesser degree but it nevertheless helps them in enhancing their survivability against enemy air defence. The day is not far when this technology is likely to find wide spread use in the field of aviation. 2. The dictionary defines stealth as "evasion of notice". Applied to Aerial Warfare, it implies the ability of an aircraft, or platform, to carry out its mission without being detected. Other terms such as "LO" - low observables, or "RO"- reduced observables, have also been used which imply the same thing. The very concept of 'Stealth' conjures up an image of something moving in secretly without being detected. 'Stealth' technology actually is all about the art of making aircraft, missiles and...

Words: 15633 - Pages: 63

Free Essay

The Study on Stealth Design Technology

...The Study on Stealth Design Technology Abstract—In this report we study some basic ideas on stealth technology. Loosely speaking, the stealth technology can be divided into two categories: the study on target shape design and the study on radar absorbing materials. In this report, we explain the basic principles of these two categories, and give some simulations by CST Microwave Studio and Feko to show the effects of stealth technology. I. I NTRODUCTION The purpose of stealth design is to protect the target from being detected by the enemy’s radar and to increase the target survivability. Ideally, for an object to be ”stealth”, it needs to have a low optical visibility in addition to being low observable in the infrared spectrum and at all radar frequency bands, also the emission of acoustic noise should be low. However, this goal is difficult to achieve, and the recent research is mainly focus on the low observability in a certain radar bandwidth. In some degree, the term ”stealth design” is equivalent to the technology of reducing target’s the Radar Cross Section (RCS). RCS is the parameter to characterize the strength of backward scattering of the target, the formal definition is σ = lim 4πR2 R−>∞ Fig. 1: B-2 stealth bomber |Es |2 , |Ei |2 (1) Fig. 2: F117 stealth fighter plane where, R is the distance from target to radar, |Es | is the scattered electric field intensity and |Ei | is the incident electric field intensity. Radar equation can be used to......

Words: 1551 - Pages: 7

Free Essay

Stealth

...Три елегантни млади жени вървят зад чужденка с раница на гърба си по бул. “Мария Луиза” в София. Едната разпъва голям шал и се опитва да го омотае около врата си, спътничките  помагат. За секунди раницата на чужденката е отворена, портмонето  измъкнато, а ципът закопчан. Столичани виждат кражбата, задържат джебчийките и звънят в полицията. Чужденката дори не разбира, че току-що е била обрана. Това е един от десетките начини, по които действат изобретателните крадли, плъзнали по молове, пазари, градския транспорт и заведенията.  Празниците активизират джебчийките и домовите крадци, предупредиха вчера от МВР. Те посъветваха хората да внимават, защото  често с  разсеяността  си улесняват  апашите  469 са заловените джебчийки от началото на годината. За първите 11 месеца са регистирани 2390 подобни кражби, а през 2013 г. - 2460. Намалението се дължи на това, че страната ни е мощен износител на крадли в Западна Европа, казват криминалистите.  Около 90% от джебчийките у нас са жени. Мъжете, които действат в тази сфера, са предимно чужденци - алжирци, мароканци, дори чилийци. Те са се спациализирали в кражбите по заведения. Влизат в ресторанта под предтекст, че търсят свободна маса или познат. Насочват се към оставени без надзор палта и чанти до масите. Не оставяйте  портмонето си  в джоба на дреха,  която закачате на закачалка или мятате на облегалка на стола, съветват полицаите. Новата реколта джебчийки не се отличава от младите момичета в моловете, казват криминалисти...

Words: 390 - Pages: 2

Free Essay

Radar Cross Section

...The two components of the RCS relates to the two scattering phenomena that takes place at the antenna. When an electromagnetic signal falls on an antenna surface, some part of the electromagnetic energy is scattered back to the space. This is called structural mode scattering. The remaining part of the energy is absorbed due to the antenna effect. Some part of the absorbed energy is again scattered back into the space due to the impedance mismatches, called antenna mode scattering. RCS is used to detect planes in a wide variation of ranges. For example, a stealth aircraft (which is designed to have low detectability) will have design features that give it a low RCS (such as absorbent paint, smooth surfaces, surfaces specifically angled to reflect signal somewhere other than towards the source), as opposed to a passenger airliner that will have a high RCS. RCS is integral to the development of radar stealth technology, particularly in applications involving aircraft and ballistic missiles. RCS data for current military aircraft is most highly classified. Typical RCS diagram (A-26 Invader) Techniques to reduce Radar Cross Section Active Cancellation With active cancellation, the target generates a radar signal equal in intensity but opposite in phase to the predicted reflection of an incident radar signal(similarly to noise cancelling ear phones). This creates destructive interference between the reflected and generated signals, resulting in......

Words: 1638 - Pages: 7

Premium Essay

Internship Report

...AN ANALYSIS OF THE PRACTICE AND APPLICATION OF "STEALTH MARKETING” THROUGH CUSTOMER RELATIONSHIP MANAGEMENT & THE FRONTIER OF COMPETITIVE DIFFERENTIATION (GRAMEENPHONE PERSPECTIVE) By Tarannum Binte Shaheed ID: 081 044 030 An Internship Report Presented in Partial Fulfillment of the Requirements for the Degree Bachelor of Business Administration Fall 2012 NORTH SOUTH UNIVERSITY February 2013 1 AN ANALYSIS OF THE PRACTICE AND APPLICATION OF "STEALTH MARKETING” THROUGH CUSTOMER RELATIONSHIP MANAGEMENT & THE FRONTIER OF COMPETITIVE DIFFERENTIATION (GRAMEENPHONE PERSPECTIVE) Submitted to: Dr. Jashim Uddin Ahmed Internship Supervisor Director & Lecturer, School Of Business BUS 498: Internship Submitted By: Tarannum Binte Shaheed ID # 081 044 030 Bachelor of Business Administration (Fall 2012) NORTH SOUTH UNIVERSITY 2 LETTER OF TRANSMISSION February 15, 2013 To Dr. Jashim Uddin Ahmed Director & Lecturer School of Business North South University Bangladesh Subject: Submission of Internship Report Dear Sir, It is my great honor to submit the report of my 3 months long Internship Program in Grameenphone Ltd. The report titled ―An analysis of the practice and application of Stealth Marketing through Customer Relationship Management & The frontier of Competitive Differentiation (Grameephone‘s Perspective)‖ is the final outcome of successful completion of my internship program at the company. It has been a joyful and enlightening experience for me to work in an......

Words: 8251 - Pages: 34

Free Essay

Stealth Marketing

...explain the differences between buzz marketing, stealth marketing, viral marketing, and guerrilla marketing. If your students are having difficulty, this reply may help. The goal of buzz marketing (WofM) is to generate buzz or conversations about a brand. This can occur through a blog, emails, at a party, or numerous other ways. While the ideal is people talking about a brand because they really love it, buzz marketing by firms is through brand ambassadors. They are compensated in some way to generate buzz about the brand (blog, email, block party, etc). They are supposed to identify that they are being sponsored by the brand or compensated in some way. The goal of stealth marketing is the same, but ambassadors keep their identities secret and they hide the fact they are being paid or sponsored by a brand. The idea is that the recommendation is then more genuine, believable. Some consider it unethical, others do not. Brands know wofm recommendations carry far more weight than advertising and marketing or anything a brand can do. The ultimate goal is for a video or some other digital activity to go viral; that is to be spread to hundreds of thousands or millions of people. People pass it on because they think it is neat, novel, unique, funny, etc. It is like a wildfire out of control. While brands strive to produce videos or interesting games that attract attention, it is rare they go viral. While a buzz marketing campaign or stealth marketing campaign could go viral, it is......

Words: 381 - Pages: 2

Premium Essay

Break Free from the Product Life Cycle

...Company overview The Idea in Brief 1. Reverse positioning 2. Breakaway positioning 3. Stealth positioning Breakaway Positioning for Packaged Goods Stealth Positioning for Technologies 1. Difficult to use, unreliable, or threatening Reverse for Services Breakaway for Packaged Goods. Stealth for Technologies. Reverse Positioning 2. IKIA IKEA has long been celebrated in the business press for its innovative marketing and phenomenal growth Cheap and stylish inventory Top stores compete by carrying enormous and varied inventories Key factor in the stores high performance is its brilliant reverse positioning 3. Commerce Bank 4. JetBlue Breakaway Positioning 1. Swatch Swatch became the best –selling wristwatch of all time 2. The Simpsons The fox network has done a breakaway positioning when it launched its animated series The Simpsons in 1989. 3. EZ Squirt Ketchup Stealth Positioning 1. EyeToy: Play. 2. AIBO. 3. Mac Mini. Conclusion Short Summary In order to break out of the pack, you must shift mature products back and push new products forward to the growth phase of the product life cycle. Most firms build their marketing strategies around the concept of the product life cycle-the idea that after introduction. It doesn't always necessarily have to be that way. The case describes three positioning strategies that marketers use to shift consumers' thinking. Reverse positioning strips away......

Words: 287 - Pages: 2

Premium Essay

The Case for Stealth Innovation

...LIBRARY RESEARCH ASSIGNMENT Article review: The Case for Stealth Innovation – By Paddy Miller and Thomas Wedell-Wedellsborg AUGUST 22, 2015 VARUN SRIDHAR Library Research Assignment Varun Sridhar For organizations to survive and continue its constructive role, it needs ideas that are fresh and has got to have a new perspective to get new ideas based on field research and otherwise to ensure and understand the dynamics and destruction of decline are. Both articles talk about how the process of innovation takes place within an organization and how effectively can an innovator who is really trying to articulate ideas into effective and efficient processes or for his/her interests are aligned towards achieving the goals and objectives of the organization. The importance of this issue is due to the increasingly competitive environment among the various organizations and industrial centers. There is a need to provide and develop competitive environment and a creative environment if necessary and also provide recommendations at the end in order to achieve better results. Paddy Miller and Thomas Wedell talk about a concept called stealth innovation which is quite an interesting perspective. Because it is not easy to communicate ideas in a bureaucratic organization or through a hierarchical structure hence the two authors provide the readers with five key points in order to deliver to the top level management and these are as follows: Gathering allies......

Words: 609 - Pages: 3

Free Essay

Sony Aibo Case

...contrast, companies that use stealth positioning adopt a covert approach. They conceal the true nature of their products by affiliating them with a different category. This is a powerful strategy for marketers when a category is in some way tainted. Consumers may feel intimidated by products in the category (as can be the case with new technologies); they may be skeptical of the products because previous offerings have failed to live up to expectations; or they may have personal objections to products or companies in the category. By using stealth positioning, companies can, in effect, sneak products into the market and gain acceptance that might otherwise prove elusive. Although stealth positioning doesn't typically disrupt categories, it can give products a fresh run at the life cycle and keep them from languishing—or dying outright—in the introduction phase. One word of caution: There is an important difference between stealth positioning and deceit. The difference is both ethical and economic. When used thoughtfully, stealth positioning is a legitimate way to diffuse prejudice about a product or company, encourage acceptance, and deliver value to customers. But the strategy can backfire if consumers discover that a company used the technique to cheat them by exploiting their naïveté. The difference is evident in the following examples, where companies have thoughtfully adopted a stealth-positioning approach. AIBO. Sony exploited a similar stealth strategy to gain......

Words: 657 - Pages: 3

Free Essay

Stealth Technology Its Impact on Ariel Warefare

...CHAPTER 1 — BASIC RADAR PRINCIPLES AND GENERAL CHARACTERISTICS INTRODUCTION The word radar is an acronym derived from the phrase RAdio Detection And Ranging and applies to electronic equipment designed for detecting and tracking objects (targets) at considerable distances. The basic principle behind radar is simple - extremely short bursts of radio energy (traveling at the speed of light) are transmitted, reflected off a target and then returned as an echo. Radar makes use of a phenomenon we have all observed, that of the ECHO PRINCIPLE. To illustrate this principle, if a ship’s whistle were sounded in the middle of the ocean, the sound waves would dissipate their energy as they traveled outward and at some point would disappear entirely. If, however the whistle sounded near an object such as a cliff some of the radiated sound waves would be reflected back to the ship as an echo. The form of electromagnetic signal radiated by the radar depends upon the type of information needed about the target. Radar, as designed for marine navigation applications, is pulse modulated. Pulse-modulated radar can determine the distance to a target by measuring the time required for an extremely short burst of radio-frequency (r-f) energy to travel to the target and return to its source as a reflected echo. Directional antennas are used for transmitting the pulse and receiving the reflected echo, thereby allowing determination of the direction or bearing of the target......

Words: 14842 - Pages: 60