Sunday, July 19, 2020


The plot is simplicity itself. It’s the Spring of 1917 and two English tommies are assigned to cross no man’s land in search of a unit preparing to launch a disastrous attack on the German trenches. The two soldiers must deliver orders calling off the attack in order to save the lives of 1600 men. To make matters even more imperative, one of the messengers has a brother in the regiment due to storm into a Heinie trap.
What do we have here, at its heart? It’s the last ten minutes of Gallipoli stretched to over two hours. And, trust me, you’ll wish you’d simply re-watched Peter Weir’s superior film rather than this poke in the eye .
This is director Sam Mendes first screenplay and it shows. Typical of Dreamworks productions, it’s all hollow emotions, contrivance and gimmickry. It’s a “a show.” This is the horrors of war as a theme park attraction. From the conceit of shooting the entire film in one “continuous” shot to the utter lack of any effort to give the lead character a personality.
First off, the idea of making this an uninterrupted experience in real time (except where it’s inconvenient) may be a terrific technical achievement but, mostly, it only serves to remind us that we’re watching a movie. And, as the film goes on, the events portrayed have an increasing condensed feel to them as if the filmmakers were trying to cram more elements than the running time would allow. If you’ve ever wondered what a film editor does, the lack of one here should be an epiphany for you.
In the extras, I watched as they showed how they had dry runs with the characters walking the ground as they read their lines in order to time each scene in order to make certain they didn’t run out of set before the scene was over. Does that strike anyone else as a wrongheaded approach to cinematography? It brought to mind the Monty Python bit where the actor judges the difficulty of each Shakespeare role by how many words he has to speak.

And there’s the lead character. I understand that the character is meant to be an everyman. But that doesn’t mean he needs to be written as a cipher. The character comes off as an empty vessel with none of the elements needed to make him an individual. Yes, he represents all soldiers and any soldier. But he fails to have any life beyond what we see in the running time. There’s passing mention that he was at the Somme and impacted by that horrific experience. The only other reference to his life beyond this story comes at the very end in the film’s most effective scene. Like I said, I get why they approached the character this way, but they needed to put more thought into building this guy into someone memorable.
That brings me to the dialogue which is, except for one sequence, uniformly awful. Much like that other over-rated war movie travesty, Saving Private Ryan, the characters in this movie cannot stop reminding us of the plot. Is it really that hard to remember? Find the Yorks or they’re all gonna die. But the dialogue reminds us over and over again of the mission, the stakes and the ticking clock. And when the dialogue does depart from exposition it’s all vapid exchanges where silence might have served better. Most ludicrous is the less-experienced of the pair telling an involved anecdote while the two wander through no man’s land fully exposed from all directions. More disappointing is the supposedly war-weary and enemy-wary of the two doesn’t tell him to shut the hell up and watch their sight lines for movement. In that way, this dialogue might have a served a purpose. Instead, it’s just tiresome.
And, the dialogue itself needed a serious write-through by someone more interested in the richness of period dialogue. The anachronisms in the phrasing and word usage are constant. People simply did not drop F-bombs with the frequency and application that these characters use. A serious, “is there a better way to say this?” session should have been held to try and breathe some life into the exchanges here. But I guess the script doctor was out. Or perhaps there aren’t any good fixers left in Hollywood.

In addition to tedium, clichés populate the film, multiplying like rabbits as the story grinds on. Of course, the soldier runs into a pretty French girl about his age. How else are they going to get a female into the trailer? And how about a few touches of diversity to please the media critics? So we see a solitary Indian soldier and a solitary black soldier serving with otherwise all-white units. This is something that would never have happened in the Great War where regiments were comprised by men all form the same town, often from the same factory or coal mine. The Indian is even wearing a turban! Why not just have the soldier run into an Indian unit? Now that would have been interesting.
Further tired bits include having the character jump into a fast-moving stream to separate him from pursuit. This was a hoary gag long before Butch and Sundance jumped from that cliff to escape a posse. But William Goldman knew that and used it as the basis of one of that movie’s most memorable, and funny, scenes. Here, it serves as a convenience only and moves the film from the contrived to the ludicrous.
Also, in order to serve the stream-of-consciousness conceit of the film, the main character fails to hear an entire convoy of trucks pulling up within fifty yards of him. And, in the height of preposterousness, the entire column just so happens to come to a halt right where he is apparently ignoring them in a French farmyard.
In the end, it all kind of, literally, limps along until the have-your-cake-and-eat-it-too climax.
All of that said, it is worth seeing once as a triumph of set design and costuming. You know, all those things you’re not supposed to notice while watching a movie. It really is an astounding achievement mercifully free of any CGI for the large part. The cinematography is marvelous as well and required quite a feat of engineering to accomplish in places. But, again, the kind of thing you pick up on in a second or third viewing. But here I was distracted from the story by the details. I was looking at the frame rather than the picture.


  1. I had my concerns. It looks better than Dunkirk, but just like that film this is a privileged director who has never know or bothered to research war beyond the aesthetics and considers it all pointless anyway but cannot entirely decry it so it ends up like pretty looking lukewarm slush.

    1. Better than Dunkirk. That praise is faint it's transparent!

    High prolific information and Priviledges comes rare as i would be sharing with you magnificent insight you wish you heard years before now. As it's been understood that what people don't see, they will never know.
    When you wonder “which hacking company should I hire, the first aspect that should concern you is quality. Clearly, you want to embark for services that povides swift response, Thanks to our talented and Astonish Hackers , you are rest assured that your expectations will always be met. You’ll be glad to find out that our services Implies precisions and actions.
    This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
    Welcome to the Global KOS hacking agency where every request on hacking related issues are met within a short period of time.
    If your shoe fits in any of the required services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
    The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers and various type of database system to meet your request.
    Penetration of computing systems are achieved using core software tools like Ransomeware, SQL/Keylogger injection. botnet, trojan and DDOS attacks.
    Providing value added services to clients as a hacker has been our sustaining goal.
    Are you faced with cyber challenges like
    ��Recovery of lost funds:✅It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database, every requested information required by the Global KOS would be used to tracking every transaction, time and location of the scammer using this systematic courier tracking base method.
    �� Hacking into the mobile phone of a cheating spouse.✅ This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc. This spy processing is used via an HDSI folder which synchronizes the target mobile operating system into a clone S-Drive unit.
    ��Credit Score Upgrade:✅Due to our transformed changes on Equifax tracking , upgrading of credit score are backed by our cyber tech breaching licence, This hacking process drastically generates you an undestructive higher credit score which correlates to a higher level of creditworthiness. The time frame for upgrading a credit score requires eighteen(18) hours
    ��️ BITCOIN GENERATOR:✅ (Higher job profile). This involves using the ANTPOOL Sysytem drifting a specialized hardware and software implementing tool in slot even-algorithms to incentivize more coins into your wallet which in turn generates more coins exponentially like a dream at specified intervals.
    The company is large enough to provide comprehensive range of services such as.
    • Email hacks��
    • Hacking of websites.��
    • Uber free payment hacks.��
    • website hack.��
    Our strength is based on the ability to help you fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
    ✉️Email: clarksoncoleman(at)gmail • com.
    Theglobalkos(at)gmail •com.
    ®Global KOS™
    Copyright © 2020.•

  3. Yeah, I must agree the movie was utter garbage. I wish they'd gone for a more nuanced approach then just copy and pasting Saving Private Ryan's general plot and setting it in WW1v


    Asore Corp is a Russian based group of multinational Hacker's, an affiliate of Evil Corp. We have mutual interests obliged to fight online scam and scammers in general. In doing this, we make sure by all means necessary that our clients get the best of services on a🔐PAYMENT AFTER JOB IS DONE BASIS✔️. Rather than send money and trust a criminal to fulfill your deal, you can make sure the job is done before WORKMANSHIP is paid for. You'll get excellent customer service.
    That's a 100% guarantee.

    if you have been a VICTIM, contact :
    ✅ for directives.
    Here, it's always a win for you.

    Having been on various headlines since 2004 hitherto, Asore Corp hosted a conference in August 2006 tagged "The Hacker's profile", which was anchored by Morgan Marquis Boire a then Hacker at Microsoft. Also, Asore Corp have acquired a hall of fame well deserved for solving tedious puzzles shocking the internet countless times. We possess highly qualified hackers recruited and registered under the right agencies. 
    Without any reasonable doubts, it is no news that Asore Corp offer one of the best Hacking services world wide. 
    Amongst others, services we offer are listed 📌as follows :
    [ ] BinaryOption funds recovery
    [ ] Social media hack
    [ ] Recovery of loan scam
    [ ] Recovery of dating scam
    [ ] E mail hack
    [ ] College score upgrade
    [ ] Android & iPhone Hack
    [ ] Website design
    [ ] Website hack

    ▪︎︎ WHATSAPP: +1 (512) 601-0445

    Copyright ©️
    Asore Cyber Corp 2020.
    All rights reserved.

  5. I am so delighted I found your weblog, I really found you by accident,
    And would just like to say thank you for a fantastic post and a all round entertaining blog (I also love the theme/design), NEW TIPS TO IDENTIFY A FAKE DRIVERS LICENSE I don't have time to go through it all at the minute but I have bookmarked it and also added your RSS feeds, so when I have time I will be back to read a lot more, Please do keep up the excellent job.

    (High Quality, Genuine Seller)

    =>Contact 24/7<=
    Telegram> @leadsupplier
    ICQ> 752822040
    Skype> Peeterhacks

    Fullz info included
    Employee & Bank details included
    High credit fullz with DL 700+
    (bulk order preferrable)
    **Payment in all crypto currencies will be accepted**

    ->You can buy few for testing
    ->Invalid or wrong info will be replaced
    ->Serious buyers needed for long term




    ->US CC Fullz
    ->Ethical Hacking Tools & Tutorials
    ->Kali Linux
    ->Keylogger & Keystroke Logger
    ->Facebook & Google Hacking
    ->Bitcoin Flasher
    ->SQL Injector
    ->Paypal Logins/Amazon Logins/Coinbase Logins
    ->Bitcoin Cracker
    ->SMTP Linux Root
    ->Shell Scripting
    ->DUMPS with pins track 1 and 2 with & without pin
    ->SMTP's, Safe Socks, Rdp's brute
    ->Php mailer
    ->SMS Sender & Email Blaster
    ->Server I.P's & Proxies
    ->Viruses & VPN's
    ->Premium Accounts (netflix cracker, paypal logins, pornhub, amazon)
    ->HQ Email Combo

    If you are searching for a valid vendor, I'm here for you.
    You'll never be disappointed.
    **You should try at least once**

    Contact 24/7
    Telegram> @leadsupplier
    ICQ> 752822040
    Skype> Peeterhacks

  7. Are you looking for ways to hit the lottery jackpot? Search no more for Dr Amber can help you win the lottery you want with his powerful lottery spell. Visit: or WhatsApp +1 318 306 5044 or email: for his spells are real.

  8. Fake-birth-certificate

    A birth authentication is an essential record that archives the introduction of an individual. The expression "birth authentication" can allude to either the first archive ensuring the conditions of the birth or to a confirmed duplicate of or portrayal of the following enrollment of that birth
    Much obliged for being honest, I will quickly share your blog on my Facebook and Instagram stage to numerous different individuals from my gathering and furthermore exploit to impart to you the new

    UNDETECTED FAKE BIRTH CERTIFICATE FOREIGNER USE TO OBTAIN PASSPORTS ABROAD FREELY which many are ignorant of at the moment, it is also the easiest way to obtain dual nationality through this birth certificate in any country. I request your permission to join our 379.3k members TELEGRAM GROUP
    to share with us your daily post for it to also reach my audience. Thanks, I am Scott from Globex, we await you on our platform to.
    You can call me Scott.

  9. I made a decision to contact CYBERPUNK PROGRAMMERS after seeing tons of recommendations online about their hacking services. Their website is cyberpunkers dot org. No marriage is perfect all the time but I thought we were happy and had something special between us. Yet I had a nagging concern as I had seen signs of my husband changing towards me over the past year. He seemed to be withdrawing from me. He spent most of his spare time at the gym or working late. When he finally came home, he absorbed himself with the television telling me he was too tired to talk. Seeing that he was so tired led me to believe that he was mentally exhausted from working in our business. I felt guilty that he had to work so hard and was so worn out. Sadly I didn't know the truth about why he was so tired. Nor did I understand why he was withdrawing his love from me.