Lessons From The Hobbit: Cloud Computing Education

Lessons from the Hobbit for Cloud Computing Education

Though he penned it in 1937, J.R.R. Tolkien had much coming for the writer on cloud computing topics of this time and age, in the twenty first century. The Hobbit movie, a Middle earth tale of the coming-out-of-the-hole, fear and snugness of a hobbit which leads to far-reaching exploits that cut across dangerous and fantastic lands, has come out. One can trace parallels between the production and cloud computing, key among these including the following, according to a Windows IT Pro article.

Okay, in the beginning “there lived a hobbit in a hole.” This is the opening line of the tale, but to some, it might mean the closed-in world of Information Technology where company executives are satisfied with their computer technicians. However, Bilbo soon leaves the hole, hankering after treasure after persuasion by a horde of thirteen dwarves plus a wizard. On the way to the Desolation of Smaug, they have to improvise answers far away from any brick-and-mortar computer shop. This is where cloud computing education comes in.

After desertion by Gandalf, the Wizard, who is after his own grand plans of overcoming the force in the universe called the Necromancer, Bilbo and company, is left to improvise roles. He saves the skin of all his companions, who are frequently at a fix in the hands of goblins, spiders, and finally Gollum. Indeed, the ring he gets from Gollum forms the infrastructure of the cloud education in the story because without it, he would not be ubiquitous and invisible to foes. Thus, in a situation where the wizard who has disappeared has been the Chief Information Officer, then Bilbo settles down into becoming a guide who does not have any especial knowledge about IT, per se, but uses the cloud (the ring) to learn more about how to overcome hurdles.

Sometimes he has to troubleshoot in the following symbolic encounters:

The walk in Spider land: If Chief Information Officers want to bring their staff to understand the cloud better, they need to help them seek solutions rather than be baby fed. Though it is mandatory for a firm to join the pay-as-you-earn infrastructure these days if it wants to survive, it can, however, only select apps that suit it through the collective IT team and staff. This is why Biblo’s invisibility helps him to use special weapons, including stones (apps) that he has chosen, to troubleshoot the spiders’ cobwebs and thus rescue his entrapped team.

The Barrel Ride: Another important lesson for company executives who want to educate staff about the cloud is that of using in-house cloud understanding before imposing cloud jargon on them. The end-user cannot fully appreciate terms like sharing resources, if he or she does not benefit from it. By taking his prying powers in a cave where they were held hostage, Bilbo used his understanding of the use of barrels that promoted barter trade between Middle- earth communities, down the river, to rescue his compatriots by this means. Indeed, sharing of resources could not be clearer to him than using barrels and hiding each of the dwarves in each to reach the other end, unharmed, as was customary of river trading in the Hobbit.

The Long road to Dragon Encounter: It took years of toil to make it to the dragon’s lair for the Hobbit team. Similarly, CIOs should look ahead, like the crew in the book and movie did, to reach their destination and back without hurt. In the present context of many applications and infrastructures, like EC2, Windows 8 and others, it is impossible to know which to incorporate as a cloud education program with success.

This is why one can contextualize all the many challenges in a fantasy novel, review the unknown challenges one has to face, but in the end, use the One Ring as one’s cloud infrastructure to the Promised Land or corporate success. At the end, the hobbit team avails what every enterprise needs, with as few bucks spent as possible, on the way: treasure.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…