Mac Attack, By Seth Stevenson Essay

1262 words - 5 pages

Slate magazine published, “Mac attack”, “Apple’s mean-spirited new ad campaign”. This article was posted in Slate magazine, on Monday, June 19, 2006, at 6:2 9 AM ET. The article was written by Seth Stevenson an analytical writer who’s, work is periodically published in Slate magazine. The article summarizes Stevenson’s view of Apple Computers advertising campaign.
Seth Stevenson has written an exemplary article denoting his opinion of Apple’s advertising campaign using PC man, actor John Hodgman, versus Mac boy, actor Justin Long. The commentary is well documented with examples and opinions generated from Stevenson’s experience and knowledge. He generates a sense of belonging, to some of the audience by appealing to the experienced PC user’s knowledge of PC functionality. This inclusion may be lost on those not well versed in PC usage, or those whose only knowledge is that of a Macintosh.
Stevenson places himself in the midst of the targeted demographic in paragraph three, where he states, he is a PC user that has envisioned moving to the Mac realm. He goes on in paragraph 3 to say that the advertisements, while wonderful, have not made him want to switch to a Mac. This information, along with the description of the actors involved, gives us the ability to recognize Stevenson’s grade for the advertisement campaign as being accurate, or inaccurate.

The Advertising campaign focuses on multiple video ads depicted during a period of time; the name of each advertisement is given within the article. Stevenson gives some detail on each of the advertisements by depicting verbally the content of the ad as well as a verbal depiction of the visual content. Stevenson starts the article, with an informative verbal depiction of the first ad’s content, explaining the positioning of the actors, the scene background, and the dress of the two actors. This information is enhanced with a photograph of the opening scene of the advertisement. There is also a link placed within the text to be able to access the ad campaign, unfortunately the link takes the reader to a simple webpage of the products, not the advertisements being graded. To access the real advertisements being graded the reader must research the ad campaign via You Tube.
The visual depiction mentioned above, has the director Phil Morrison as being “good news” (Stevenson) for the campaign, and to whom credit was given for his accomplishments. His use of material, or lack thereof, was given accolades for being “clean” and not “jam-packed” (Stevenson) with unnecessary, unneeded screen filling garbage. The emphasis is placed on the actors involved in the spots, and the stereotypes depicted, not on the product itself. Mention is made, of the effectiveness, of the Macintosh product versus the lacking capabilities of the PC. Throughout all the ads viewed, not one product was depicted: we as an audience were left to make a decision based on the perceived stereotypes shown, and the...

Find Another Essay On Mac Attack, by Seth Stevenson

The Representation of Evil in Stevenson's Dr. Jekyll and Mr. Hyde

1724 words - 7 pages of science and believed that it was in effect 'playing God' which was very wrong to them. This may in turn be a sign of Dr. Jekyll's ultimate fate because he was doing something so wrong and not taking responsibility for it that in the end it would catch up with him and he would be punished by God. In the description of the attack on the girl Stevenson has also used a certain amount of pathetic falacey as he writes

Sorry Wrong Number Essay

649 words - 3 pages Sorry, Wrong Number By: Carlo Curia A young rich invalid lady Mrs. Leona Stevenson is waiting in her home impatiently for her husband to return from work. She hates to be home alone at night; She calls Henry's work repeatedly to see if he had left. This time when she phoned Murray hill 35097 her wires get crossed. She overhears two men plotting the murder of an unidentified lady. The criminal's conversation ended. She called the operator and the

Evil in William Shakespeare's Macbeth

1629 words - 7 pages and lightning indicated by the stage directions represent the confusion of the heavens, and linking the evil theme. The unnatural events as seen as a result of evil. In scene two as a result of MacBeths fearlessness and his ability to do great harm on to others in battle King Duncan confirms on him the title Thane of Cawdor. The opening of act one scene 3 is an invocation of evil by the witches. Mac Beths first

Is Compassion Really a Crime? Analysis of "A Crime of Compassion" by Barbara Huttmann

913 words - 4 pages if they aspire to do so. Using various rhetorical devices, Huttmann portrays her message by first introducing Mac to the reader, then illustrating his suffering and finally letting him die.Huttmann opens her essay by introducing Mac, a young police officer who is diagnosed with lung cancer. She uses imagery to recall the day that Mac first "walked into the hospital with 32 pounds of attack equipment, looking as if he could singlehandedly protect

network security

667 words - 3 pages and tagging. Firewalls can also be placed between all segments of the network. With each segment blocked off from the others using a firewall, you can limit access to the network as a whole by limiting access on a segment-by-segment basis. In addition, each firewall can be programmed for various levels of access, allowing for the creation of multiple security levels in different segments (Simmons & Media, n.d.). MAC spoofing and flooding attacks

Your Business and Mac: A Very Beneficial Relationship

2576 words - 10 pages think?” “You had me at GarageBand,” she said (true story). She already had a successful business and learned the Mac could help her save time and money by bringing in house some of the marketing she was paying for. In Good to Great, author Jim Collins says the correct view of using any technologies, including Apple’s, is “technology becomes an accelerator of momentum, not a creator of it.” Macs are just tools to help you with your business. And

Head To Head

978 words - 4 pages Head to Head: A World of Computers The world has come a long way with its development of technology. Day-by-day the people who are using and relying on technology have dramatically increased. But out of all these new technologies, the computer is probably one of the most important, if not the most. And two operating systems have been competing with each other from the beginning. These two companies are Apple with their Mac and Microsoft with

The Significance of Edward Hyde's Character in The Strange Case of Dr. Jekyll and Mr. Hyde

2015 words - 8 pages The Strange Case of Dr Jekyll and Mr. Hyde is a novel written by Scottish author Robert Louis Stevenson and published in 1886. It concerns a lawyer, Gabriel Utterson, who investigates the strange occurrences between his old friend, Dr. Henry Jekyll, and the reclusive Mr. Edward Hyde. This novel represents an ideology in Western culture; the perpetual conflict between humanity’s virtuosity and immorality. It is interpreted as an accurate

The Way Robert Louis Stevenson Uses Literary Techniques in Dr Jekyll and Mr Hyde

1651 words - 7 pages at the hour of birth or death.' The story was enormously popular with its Victorian audience showing a fascination with the 'other side ' of life. Stevenson reflects on this 'expectation of respectability' in the text, a lot of the characters have professions that were seen by society to be significant and dominating such as a Doctor and a Politician. This shows us that he was saying to the reader that the upper

Repressed Personality and Sexual Subtleties in Robert Louis Stevenson Dr. Jekyll and Mr. Hyde

1450 words - 6 pages learning of the secrets behind them (110). Utterson's visions also include the idea of Hyde "stealing to [Jeykyll's] bedside" (Stevenson, 11), which undoubtedly has homosexual connotations. Finally, we have the description of the back door that Hyde enters into and leaves by. On page113 Showalter notes that Hyde enters Jekyll's house only through the back door, which is scarred. The door is described very physically, comparable to the

White Cottage

2200 words - 9 pages improving. But that didn’t happen. Instead, things got worse, much worse. Looking eastwards she could see Pauper’s Field where Seth and Mary lay side by side. When she imagined them she saw them comfortable in their graves, very much alive and enjoying talking to each other. Mary was not locked inside the pale body that she tended as it lay on her bed, and Seth’s throttled face on the body his friends bore home from York was restored to the

Similar Essays

Attitudes Towards The Religion Of Islam

678 words - 3 pages for Christians. The Koran discusses a man named Mohammed who is looked at by Muslims as the perfect follower of the Islam faith. His role in the Koran parallels that of Jesus in the Bible. The difference between Mohammed and Jesus, though, is that Jesus lives a passive and merciful life in the Bible while Mohammed comes to power in the Koran by, as Seth Stevenson explains, “killing and slaying unbelievers with harshness and without mercy

How Was The Carew Murder Case Described As Horrifying?

670 words - 3 pages of evasion, and how this novel allowed them to venture into the unknown. This passage vividly describes Hyde's attack on his victim, witnessed and retold by a maid-servant.Firstly, Stevenson uses many techniques of emphasis to exaggerate upon this violent and uncanny event. He uses contrast to juxtapose the sudden attack, and to deliberately create a sudden, horrifying attack:"And then all of a sudden he broke out in a great flame of anger

Comparing Dr. Jekyll And Mr. Hyde

1497 words - 6 pages his body jumped upon the roadway.” (Stevenson, 21-22) Again the evilness of the attack is contrasted by the description of the “good” victim: “an aged and beautiful gentleman with white hair” who approached Hyde with “a very pretty manner of politeness.” (Stevenson, 21) Hyde is the personification of evil, becoming increasingly more dominant and acting aggressively outside the law. Conversely, Dr. Jekyll is a well-thought of member of society

Detecting Wireless Lan Mac Address Spoofing

4074 words - 16 pages . This presents unique opportunities for attacks against wireless networks that are difficult to detect, since the attacker can present himself as an authorized client by using an altered MAC address. As nearly all wireless NICs permit changing their MAC address to an arbitrary value – through vendor-supplied drivers, open-source drivers or various application programming frameworks – it is trivial for an attacker to wreak havoc on a target