SCHOOL DRESS CODE SLAMS LID ON WONDER WOMAN LUNCHBOX #ASKROB

Tags

, ,

OK, SNOPES RELEASED THIS AS A HOAX, BUT I LEAVE IT AS A BADGE(R) OF SHAME THAT WE ALL SHOULD FACT CHECK AS WE BECOME THE COLLECTIVE MEDIA!!!

This week, Zentangler and more importantly mom for common sense, Cari Sultanik, #ASKSROB about this war on women of wonder and lunch: 

WONDER WOMAN LUNCH BOXRob, please help me understand why this Wonder Woman lunchbox has been banned from school because it promotes violence?

Is the definition of violent characters truly “those who solve problems using violence.” Who else would you suggest this school ban on this child’s lunchbox because they are “violent characters” by their definition?

Great Question Cari,

Let’s dissect the facts as reported by my nemesis at Comic Book Resources (I can’t deny it’s a better comic site than the one I write for, so I hate them).

Revealed on Imgur, a friend’s daughter received a letter from school stating she could no longer bring her Wonder Woman lunchbox to school as it violates the school dress code.

ROB RESPONSE: I AGREE! Lunch boxes will barely cover your child, and they chafe. No child should EVER wear a lunchbox to school. Isn’t there a charity stopping this act?

The real rub comes down to what the school defines as “violent characters,” which are “those who solve problems using violence. Super heroes certainly fall into that category.”

ROB RESPONSE: Oh, so this has nothing to do with modesty and shame and everything to do with schools now acting like Congress with piss poor tangential riders on bills or laws.

Wonder Woman does use violence to thwart violence. If you are abut to be punched you don’t pull posies out of your pocket (unless you are Zantanna and they have sleep spores in the posies). WE ALL USE VIOLENCE.

Does this lunchbox promote violence though? No, she’s smiling. This was a time Wonder Woman used smile, guile and pinup good looks to save the day. She also has used intelligence, cunning and quite recently the inbred female trait of hypocrisy to get Clark Kent to do as she says not as she does (it was an argument on whether you put all the toilet paper up or down on building they reconstructed after Parasite attacked).

Sounds to me like the school board and decision makers:

A) Get off on the power trip most educators like to have over weak minded children because real adults are too mean to work with HARUMPH!!!

B) Have a broad goose to gander policy on banning creativity and imagaanitive hope

C) Never read a fucking comic book in their life and get all of their info from the 700 club.

Violence simply is. We don’t need to promote it, we just got it as a species. I’ll never condone a picture of someone getting shot on a lunchbox, but a cartoon punch? Yea, I’m ok there. Is it violence? Sure. Is it violent? No. And you are nothing but a politically correct asshole too mired in black and white or yes and no thinking to live in a world I acknowledge. Certainly in charge of civic services.

Myopic. Stupid. Wrought with policies that trip over one another. Public Education (also most Catholic Schools at this point).

Sorry kids, we tried.

[PODCAST] POPTARDS SPOILER ALERT AIN’T IT COOL NEWS ROBPATEY.COM COMIC BOOK & GCulture EP. 305?!? JUSTICE LEAGUE 43, BOOK OF DEATH, BATTLEWORLD & BOOM

Tags

, , , , , , , , , , ,

robbughomealone

That’s’s right kids, another episode of your least favorite moment in audio and comic booking. Email comments and complaints to robpatey@comcast.net

STRONG LANGUAGE AND THEMES AHEAD. NOT ADULT THEMES. LET’S BE CLEAR. 

AMBUSH BUG (MARK MILLER) AND I (ROB PATEY a.k.a. OPTIMOUS DOUCHE AIN’T IT COOL NEWS) embark on the following time coded journey.

  • Tweets & FaceBooks of the Week & Mini FABLES Review | 2:00
  • JUSTICE LEAGUE #43 | DC Comics | Geoff Johns, Jason Fabok | 5:25
  • BOOK OF DEATH II #2 | Valiant | Robert Venditti, Robert Gill, Doug Braithwaite | 18:36
  • SECRET WARS BATTLEWORLD: HOUSE OF M #1 | Marvel | Dennis Hopeless, Marco Failla | 29:00
  • SECRET WARS BATTLEWORLD: HOWARD THE HUMAN #1 | Marvel | Scottie Young, Jim Mahfood |36:10
  • Christmas 1983 with Uncle Drunkel Miller | 42:50
  • SECRET WARS BATTLEWORLD: SECRET LOVE #1 | Marvel | Michael Fiffe (I), Felipe Smith (II), Jeremy Whitley, Gurihiru (III), Marguerite Bennett, Kris Anka (IV), Katie Cook (V) | 51:00
  • WELCOME BACK #1 | Boom Studios | Chris Sebela, Jonathan Brandon Sawyer | 1:01:00

Download to take with you EVERYWHERE!!!!!

 

[VIDEO] TEACHING AN OLD GOLDIE NEW TRICKS

Tags

, , ,

I find cognitive processes fascinating. No place can we see or own rudimentary steps towards making sense of this world than in animals. This is also the place we can mock how incessantly long it takes for things to stick without causing any lasting damage to the sllllooowwww learner’s psyche.

Here’s my boy Fergus trying to figure out a treat puzzle:

In video 1, we send our Golden Retriever into the fray without a plan.

In video 2, I show Fergus how to work this puzzle if he had thumbs.

In video 3 , Fergus makes the lesson his own.

Amazing how the impossible becomes easy with a little help and patience.

Patey’s Content Marketing Tip #1: Content vs. Irate Marketing

Tags

, ,

Rob Patey As content marketing continues to give consternation to writers and marketers alike, I’ve been asked to throw down my tips for surviving this collision of historically disparate jobs. Who am I? Rob Patey. I was deemed a nut by IT marketers 15 years ago, even told to go work for Men’s Warehouse writing flyers. Today I am a content marketer, those other folks are selling suits at Men’s Warehouse! Learn, talk, and let’s make it all better! 

 

Content Marketing vs. Irate Marketing 

For my first entry into helping people survive Content marketing is a silly term. I won’t fight the mighty zeitgeist behind it (because I never take on a battle already lost), so I have found my own way of defining this “new” mode of marketing that leaves everyone outside of this profession scratching their heads (from the layman’s view, all of the flyers, brochures, ads, post cards, videos, webinars and podcasts were always viewed as content).

  • Content Marketing: A story, or the preamble to a story that people choose to read.
  • Irate Marketing: Aggressive product pitches foisted upon unsuspecting prospects filled with pablum about your product that is so chest pounded with self-bravado the writer end up with an arrhythmic heartbeat.

Now, being as much story development as dissemination throughout my career, I fully get that the buying cycle has changed.

I know well that 80% of Business2Business research is happening before your “account rep” ever talks to the person (the fact I can rattle off 12 excuses by sales on how “crappy” the leads are without even thinking, is a testament to prospect ensnaring prowess).

I know the prospect funnel has been replaced by the Engagement Web of social channels. I know we need lots of content to fill every nook of YouTube, Pinterest, LinkedIn, Twitter and the like with content.BUT WE ONCE AGAIN ONLY THOUGHT OF OURSELVES IN MARKETING WHEN WE NAMED CONTENT MARKETING!!! This self-pitying naval gazing in nomenclature is what’s filling 99.99% of the business copy I see. Once again, it’s all about us.

CONTENT MARKETING SHOULD BE A GIFT OF VALUABLE AND ENGAGING INFORMATION! Because prospects can now choose whether or not to give us their time. 

While CAN-SPAM may feel like a toothless tigers as unsubscribes beget more emails (especially from v1agra offers overseas), but it empowered consumers with the sense of opting-out from all marketing and advertising. Or opting-in to the messages they actually do want to receive.

Ignoring our messages was an impossibility (or at least very difficult) in the age of billboards and magazines. Even the mundane brochures from back in the early days of B2B marketing had desk jockeys attention bound because they only had only one thing to distract them from their jobs (magazines too, but that didn’t really look like work).

Opt-in marketing and preference centers aren’t legislatively dictated, but they are certainly best-practice and how every free social microphone operates (with the exception of in-stream ads, but even those are tailored on interest to maximize ROI).

When crafting verbiage for your market, ask whether you are creating something that people will:

  • Find useful
  • Find interesting
  • Find affects them
  • Come back to keep finding more of later

Now that we know these fine four fundamentals of what content marketing should be, we can start exploring the other 4,000,000 details.

Are you being asked to be a content marketer? Need help? Need to vent? Ask or vent vitriol in the comments or via email

The Declaration of Mobile Independence and Data Bill of Rights

Tags

, , ,

Originally published by Rob Patey on IBM Securityintelligence.

Mobile Security Freedom As I was celebrating the birth of America’s freedom this July Fourth, I sparked a firecracker for the fact that I was able to use my tablet to take a meeting in a place where the Fourth of July is just another day of the week.

 

I was offered a stay of execution from the team, but an hour of my time was a small sacrifice, especially since the entire event took place on my iPad and mobile phone from my back porch.

About one-and-a-half scores ago, I remember waving a sparkler at Newark Liberty International Airport as my father headed off to Sweden for a meeting on July 5. The tablet, smartphone and the manifest destiny of last-mile broadband reaching fruition allowed me to turn off Harry Chapin’s “Cats in the Cradle” and spend time with my family watching fireworks once the meeting was finished.

This affordability — having the right device for the job at a time when I need to use it and from wherever I please — wasn’t a freedom simply handed to me. Like any great leap forward in liberation, battles were fought and accords of acceptable use had to be established between employee and employer.

As I recount some of this ancient mobile history and the hallmarks of security, productivity and mobility that resulted from them, I know some of you are going through these trials and tribulations right now. May you avoid the missteps of the past and join all of us forefathers (and mothers) for the next data deluge on the shores of the Internet of Things (IoT).

Freedom Is Never Free, Especially in Mobility

Before anyone can truly decry independence, mobile or otherwise, an upheaval from the status quo is required. An assist from France bolstered America’s liberation, and a few years later, the Bastille was taken by bayonets — not baguettes.

Since the first smartphone could sync with Active Directory, the already beleaguered IT group from the BlackBerry bonanza of the early 21st century showed rightful resistance to employee presumptions on data access. Just because you can, doesn’t mean you should. The email policy was born, and business leaders furiously rubbed rabbit feet for luck in hopes this would be enough to keep employees secure and satisfied.

It didn’t work. And today it really doesn’t work, but we’ll get there in a minute.

Mobile device management (MDM) offered the treatise of device choice balanced with one-window control. MDM became especially vital in the famous battle of bring-your-own-device (BYOD). Without the device and OS agnosticism of MDM and mobile app management (MAM), we might all still be in a state of technological dissemination without user representation.

Freedom from the confines of the office was finally won with the understanding that privacy can be maintained without completely obfuscating the view of IT. Now, policy can be crafted with a preamble of independence for both sides of technology enablement:

When in the course of business events, it becomes necessary for the enterprise to act as one people to dissolve inefficiencies that have disconnected them from each other and corporate data, and respect the freedom of choice to work on the equipment deemed best by the workers actually producing the work.

We hold these truths of mobile productivity to be self-evident, that all devices are created equal, that they are to be enabled by IT with rights to the same data as laptops and desktops and, finally, that usability is held in equal balance with security.

Mobile Independence Is a Privilege Governed by Data Rights

As devices grew more powerful, more expensive and more diversified with tablets and wearables, the concept of BYOD became more palatable to IT. However, these new abilities required more granular ways to control the data flowing in. Transient workers requiring two mailboxes on one device turned to containers. File shares could also live separated from device-level controls along with secure Web browsers and a host of other features that fulfilled a manifest destiny of productivity even when in transit. Enterprise mobility management (EMM) is the current term to define this broadening of devices, data, apps and access to devices.

One mobility program of enabling and securing endpoints, under one management pane of glass, giving mobile liberty to all.

Like the expansion of the United States, now that the mobile device has open freedom across this broad landscape of enterprise data, the CSO (or any level of security really) is a quintessential player in ensuring an uninterrupted flow of information. Mobile threat management (MTM) is how security can reach this new land. With MTM as part of a larger EMM solution, securing in-house and third-party apps from malware, advance jailbreaking or rooting rules and opening the way for seamless single sign-on access to all facets of the device becomes a reality.

The Mobile Bill of Rights

Historically, the Fourth of July isn’t about the Bill of Rights, but I beg a bit of patriotic poetic liberty to hopefully offer the foundation for your mobile liberation:

  1. Free speech, text, mail, files and access on any mobile device or endpoint, if and only if employees respect corporate data on those devices being managed through some form of endpoint and mobile security.
  2. The right to bear BYOD, without abstention from IT: When a personal device is compromised, IT will still act to triage the security of data on that device. Likewise, when apps or access to internal networks are needed, IT shall enable those services to ensure expedience in delivery and integrity of data delivery.
  3. No employee shall willingly quarter malicious material on devices. If workers want to root or jailbreak to experiment with a cool new app or some OS-level optimization, the device is unable to accept corporate data until it is back in compliance.
  4. Device privacy shall be respected by IT. Yes, MDM and security tools give IT a look at device activity, but IT is not reading emails, texts or other personal material. I always balk at this EMM because if IT wanted, they could have been reading our emails for years now — but they don’t. With MDM, they can’t, and still this wild conspiracy permeates the cube farm.
  5. Mobile security is not a witch-hunt or an indictment on how employees spend their free time in the wide world of apps. Personal information remains off the table in mobile freedom.
  6. In light of a breach, theft or toddler who will only be calmed down by tapping away on your tablet, employees should expect a speedy lock, block, selective wipe or reset of the device to keep data safe.
  7. There is one set of rules governing acceptable mobile use and data delivery. A recent study titled “Why Is App Security Escaping Development?” showed 40 percent of in-house-developed apps are leaving the enterprise without the most basic security. This is an effort to stay competitive and meet the harsh deadlines necessitated by our new global economy. It will also prove foolhardy as black hats become more aware of these sieves in the corporate data structure.
  8. Excessive bailing on enrollment in mobile security programs shall not be coddled by IT. Yes, mobile security apps take up space on a phone or tablet. But not only is it worth it for the enterprise, it’s vital.
  9. IT enablement is just beginning and shows no signs of ending. If anything, it’s growing larger. Employees have simply gained new freedoms with device selection; the true business enablement of this world is squarely on the shoulders of IT and security teams.
  10. Mobile device and data access requires us all to think a little more wisely. Departments, work groups and individual workers should not seek out IT for every little issue with a phone glitch or tablet phantom turn-off. At a certain point, we all need to understand what is business and what is personal on our home screens. IT should not be charged with helping employees access their July Fourth barbecue pictures, just as an employee should never be given a Wi-Fi password on a sticky note and told, “Good luck.”

 

SPOILER ALERT COMIC BOOK POCAST WEEK OF JUNE 10 – AIRBOY 1, SECRET WARS, MIDNIGHTER 1 & More

Tags

, , , , ,

robbughomealone

A brief divergence this week from the usual Ain’t It Cool News Spoiler Alert review crew Podcast. Without our excelsior producer, JD, Mark Miller (aka Ambush Bug) and I gab endlessly about THE COVENANT #1, GROOT #1, MIDNIGHTER #1, AMAZING SPIDER-MAN: RENEW YOUR VOWS #1, BROKEN WORLD #1, OMEGA MEN #1, SECRET WAR #1, & AIRBOY #1! This week, we slathered on that sweet, sweet jack@$$ery extra thick free of charge!

or

Download with right click magic

DC Comics U? What are YOU?

Tags

, , , ,

For anyone who is a reporter of true prowess and magnitude, the news of DC Comics answer to refreshen their stale 3 year old sub-brand of “New 52” with the effervescent “DC YOU,” might have slipped past all the real news in your inbox. It’s OK, this is all I have and I could merely raise the following vitriol. I know none of this really matters, since comics are only here to feed movies and this might as well be an org chart box naming exercise as much as a story firebrand, but again…this is all I am allowed to report on.

Starfire, DC YOU

Mom bloggers begin rejoicing, Daddy weeps alone.

Actually, the New 52 sub-brand might still be in play. I am not an organizational dynamics expert so I can’t completely crack the lexicon of this new initiative. What’s confusing is that not all books will be YOUthenized. Actually only 10 (right now) are being given a new YOU shampoo and restyle. However, a schedule of what looks like 52ish books makes me wonder if any of the outlier titles will remain New 52 brand. Again, I can tell this new You of kinda 52 is divided by story type, creator bucket and some other parsing to merely exacerbate the chief critique DC receives for being a splintered universe. Fix a problem by exacerbating it. No, that’s silly? Right?

What this New You The new universe is an homage too has also died, making it a resonance brand, but not one with good resonance. New 52 was stilted by corporate interests after FINAL CRISIS folly and then strangled to death from Multiversity inconsequentiality. Young, dumb and love to punch is the experimentation du jour form marketing budget, while quality story is ignored and relegated to have asshats like guys who call themselves Optimous Docuhe cover them. Earth One, I’m sorry for me.

Those who know my desire to make the world rich while still being hippies…ish know that I don’t balk at dollar aspirations or corporations fervor to get at more money through marketing. I can however gladly balk at my own kin in marketing who have woefully misjudged the comic audience. Don’t think a sing songy rhyming has worked in wooing me since I was in the crib. Comic readers should be feared. The weapon we wield is really the operative word of my saber rattling last sentence…we’re reader.

New 52, DC YOU, Morrison Magical Moo…call it what you want, none of it is an alluring or enticing factor to shift. I gave you a chance before gang and New 52 ultimately meant nothing, It was so permeable, a movie strategy shift made it waft away after three years.

Three years. Think about the past permanence and ongoing commitment to serial storytelling we had prior:

Cool pic bro. a 32nd Robin is even cooler.

Cool pic bro. a 32nd Robin is even cooler.

1938-1961: The universe was like a metal sheet, but suffocating with too much reality of time passage to necessitate a schism of Earth 2

1961-1986: A warm, down blanket, keeping the universe contained and nicely percolating at a good timing temperature of  pace for managed growth and serial gravitas.

1986 – 199ish: Here we debate the sort Zero Hour changes. I am pro so I add them. On the Rebootometer though it is a .5 of change.

1990’s- 2011: Another good stretch, but let’s be honest in saying permanence was gone. We received a few universes in this time that would quietly quit and then try to be a schizophrenic with a new direction and vaguely apologetic excuse for the shift.

2011 – 2015: New 52 says bonjour.

2015: New 52 bids adieu, but at least we now know it was just marketing spew.

Why do I keep collecting comics? I’m delusional and I believe my voice matters. The things I say appearing on page and in media months later is probably just zeitgeist, but since I can’t be sure I persevere. I helped make comics what I want, but I realize now they need help with ones controlling the budget dollars. It’s scary in the big machine of business, but it is traversable and can be reasoned with if you speak the right language.

New 52 was a bad idea, bred of desire to keep some tether to comic commitment in the face of a brand brigade wanting to take over. We all get that now. I learned, but I don’t think the people steering the ship have. DC YOU JUST COMPLICATED AND FRACTURED THE LANDSCAPE MORE. YOUR COMPETITION IS DOUBLING DOWN ON SOLIDARITY OF STORY.

I don’t recommend attacking competition directly, but I also don’t ever turn down proven success either.

Let’s try a new scheme and phrasing mantra, a less schizo model of representing the rise of heroes. Also, it rhymes so it must be good. Ready.

JUST BE, DC
#JustBeDC

Avengers of Mobile Security…Uhhh…ARRRGRAGATE!!!!

Tags

, , , ,

A little business blog homage I conjured this week. The words are mine, the pictures are the work of my bosom buddy in the graphics group (name upon request).

AVENGERS OF MOBILE SECURITY

  • When dastardly devices of mobility carelessly connect to WiFi!
  • When miscreant malware moles its way into network systems, lying in wait for a surreptitious subterranean attack!
  • When corporate documents are uploaded unknowingly to open file share sites by daft digital denizens!
  • When access to work productivity apps is assaulted by pitiful user experience and security sink holes!

CALL IN THE AVENGERS OF ENTERPRISE MOBILITY MANAGEMENT AND SECURITY AND EFFICIENCY AND TRANSPARENCY AND ANY “ENCY” YOU NEED TO TRUST SMARTPHONES AND TABLETS

Together, they harness IT best practices for data and device security, on a cloud more scalable and secure than Asgard (Note: encryption is used in many cases of mobile security versus Rainbow Bridges).

Tune-in true believers, MARVEL as the mobile avengers:

Hulk mobile security avengerSMASH Hulking Headaches of Mobile Deployment

Launching tablets and smartphones good. Giving access to wifi, email, files, apps with no agree to mobile security bad. No encryption means data not safe. No management of what connects to who and where bad. EMM must not be slow, not expensive, and not burden to IT with cloud architecture.

Hammer Away at Content on the Fly

thor mobile security avenger Ye lightening strikes of innovation rarely happen in the confines of darkened office halls. Nay, innovation will striketh over hill, mountain, or in shower. Giveth easy and secure content management to all of your kingdoms and business units. Mobile content management can oversee all sharing permissions, while imbuing security features down to the document level (including “cut & paste” trickery to move data into other apps).

Armor-Up in the Cloud

iron man mobile security avenger Adding new devices, operating systems, functionality, access controls and transaction level security requires new suits of armor for IT to deflect against system slowdowns and complete work stoppage (when content can’t be accessed on devices of choice). There are many suits to choose from in mobile protection today; from a separate workspace for transitory employees in healthcare, full device management for a clean-sweep of all (or some) data, to microscopic ant-size locks on apps, transaction and data on the fly.

Smart money says to use a common heads up display with one Enterprise Mobility Management centrifuge for every piece of functionality you need as you infuse more mobile into business operations. Sitting on a cloud frame also means powering-up in minutes, as opposed to the wait for a hellicarrier full of equipment to deploy.

Shield Against Bad Apps & Malware

capt america mobile security avenger Mobile threat management is the newest shield slung directly at mobile malware’s underbelly. Alerts activate proactive security policies to keep bad data quarantined and the device off the network. Next level defense is happening now with SDK’s for in-house app development security, brining in developers to join the data captains of CISOs and IT enablement.

For those just joining the fray with a low arsenal of devices to support, mobile app management and a corporate app store are good training grounds in a controlled mobile state.

Slip into Intranets and Content Repositories Faster

black widow mobile security avenger No one wants to mash their way into the data they need for business, especially not when access to SharePoint, file shares and intranets can be made native in feel and function regardless of manufacturer or operating system.

With mobile gateways and secure web browsing, seamless moves can be made into almost any system where your employees find what they need quickly, quietly and with graceful ease.

Ready to become a mobile avenger? Visit our TOWER OF POWERFUL RESOURCES ready to arm you with videos, white papers, webinars and a free trial to empower your mobile security.

ASK ROB RETURNS: The Rise and Fall of Superheroes

Tags

, , ,

A college student looking for thesis quotes recently tapped into my comic knowledge and over opinionated word salad with these comic book conundrums:

  1. Do you believe the current influx of comic movies or superhero genre films is a fad or something that will continue for the unseeable future. If you think it will continue, do you believe the films continue to adapt over time, fitting the culture and evolving?
  2. Why do you think comic properties are suddenly becoming so popular and profitable?

rob-patey-sad-faceGreat Questions Little Fella,

The superhero has already become passé as we see from the struggle in the big two comic companies to support ongoing continuity of story and character. The Bible never reached issue 900, because as we saw from modern day Jesus, Superman, when a comic becomes that long in tooth the character must change. For the uninformed, Action comics 900 was bemoaned because Superman essentially said America could no longer be his chief interest when the world is so connected. 

While logical, this does break the very foundation of a character who was inspired to give us hope in the face of a great oppressor. In a world where terror reigns supreme, and our greatest fears are the unexpected, a mind reader serves as amore soothing balm than some man in his underwear willy-nilly scouting the skies for danger.

Even the Marvel characters, the baby-boomer contribution to Americana’s new titans, are feeling the buckle of age with their first reboot of time (after many undeclared ones over the years). What was once the hip and cool comic choice with; super-keen Spider-Man, groovy X-men and happening Hell’s Kitchen characters, and awesome Avengers are no longer needed when Nerds are now cool, different is now the norm and the powerful are the object of envy as opposed to inspiration. 

justice-league-new-52

Do collars change the hero?

Superheroes are like zombies, vampires and every other blip on the radar of our existence, a coping mechanism. The cape arose as religion waned throughout the 20th century, to supplant our saviors and inspire the now watered-down term, “hope.” 

These super legends will wane, because if you transform too much, the metamorphosis births them anew regardless of branding.

As for delivery to the masses and a superhero summer movie schedule in the foreseeable future, what do you consider that time period to be? The marvel machine is scheduled into the 2020’s. When the X-Wing flies into a portal and crashes eon Graymalkin lane. hell they could go into the 2030’s. Then Warner Brothers needs to do their half-hearted competitive attempt at thwarting that revenue stream. They will throw at least a trilogy into the fray and given their slow dev times, those movies will chug past the teen years of this new millennium. 

On question two, Superhero movies have taken over the cinema, simply because of technology. For years I have tried to make others see a comic book come alive as I did when I was four and bought my first Richie Rich. Panels, words, images flow seamlessly and scream alive in the minds of comic readers; those of us who also read books and see the world come alive. 

Mormon-polygamy

Example of people with no imagination.

As a being who lives in imagination more than Jackie Paper’s friend Puff; words, images and movies are all the same experience for me. My mind is so jacked, I literally have a movie screen playing all day in my head.  Some, actually many people, can not take the same figurative leaps of imbuing life into story. For the spoon-fed of this world, the stories we have read for years needed computer graphics for the telling. Look at early CG, like the 90s Fantastic Four movies, and tell me if it was at all believable (even in the context of the time). Then look at the Fox attempt a decade later, with better graphics and you tell me which is more immersive and plausible. 

Fantasy is a hard aesthetic distance for many to cross, they keep it at arm’s length because it can never be. For those individuals, superhero movies are new and finally of interest. They are a crutch into a genre that would have been impenetrable when the stories were first coming alive on the page.  

 

Follow

Get every new post delivered to your Inbox.

Join 1,338 other followers