Lessons From The Hobbit: Cloud Computing Education

Lessons from the Hobbit for Cloud Computing Education

Though he penned it in 1937, J.R.R. Tolkien had much coming for the writer on cloud computing topics of this time and age, in the twenty first century. The Hobbit movie, a Middle earth tale of the coming-out-of-the-hole, fear and snugness of a hobbit which leads to far-reaching exploits that cut across dangerous and fantastic lands, has come out. One can trace parallels between the production and cloud computing, key among these including the following, according to a Windows IT Pro article.

Okay, in the beginning “there lived a hobbit in a hole.” This is the opening line of the tale, but to some, it might mean the closed-in world of Information Technology where company executives are satisfied with their computer technicians. However, Bilbo soon leaves the hole, hankering after treasure after persuasion by a horde of thirteen dwarves plus a wizard. On the way to the Desolation of Smaug, they have to improvise answers far away from any brick-and-mortar computer shop. This is where cloud computing education comes in.

After desertion by Gandalf, the Wizard, who is after his own grand plans of overcoming the force in the universe called the Necromancer, Bilbo and company, is left to improvise roles. He saves the skin of all his companions, who are frequently at a fix in the hands of goblins, spiders, and finally Gollum. Indeed, the ring he gets from Gollum forms the infrastructure of the cloud education in the story because without it, he would not be ubiquitous and invisible to foes. Thus, in a situation where the wizard who has disappeared has been the Chief Information Officer, then Bilbo settles down into becoming a guide who does not have any especial knowledge about IT, per se, but uses the cloud (the ring) to learn more about how to overcome hurdles.

Sometimes he has to troubleshoot in the following symbolic encounters:

The walk in Spider land: If Chief Information Officers want to bring their staff to understand the cloud better, they need to help them seek solutions rather than be baby fed. Though it is mandatory for a firm to join the pay-as-you-earn infrastructure these days if it wants to survive, it can, however, only select apps that suit it through the collective IT team and staff. This is why Biblo’s invisibility helps him to use special weapons, including stones (apps) that he has chosen, to troubleshoot the spiders’ cobwebs and thus rescue his entrapped team.

The Barrel Ride: Another important lesson for company executives who want to educate staff about the cloud is that of using in-house cloud understanding before imposing cloud jargon on them. The end-user cannot fully appreciate terms like sharing resources, if he or she does not benefit from it. By taking his prying powers in a cave where they were held hostage, Bilbo used his understanding of the use of barrels that promoted barter trade between Middle- earth communities, down the river, to rescue his compatriots by this means. Indeed, sharing of resources could not be clearer to him than using barrels and hiding each of the dwarves in each to reach the other end, unharmed, as was customary of river trading in the Hobbit.

The Long road to Dragon Encounter: It took years of toil to make it to the dragon’s lair for the Hobbit team. Similarly, CIOs should look ahead, like the crew in the book and movie did, to reach their destination and back without hurt. In the present context of many applications and infrastructures, like EC2, Windows 8 and others, it is impossible to know which to incorporate as a cloud education program with success.

This is why one can contextualize all the many challenges in a fantasy novel, review the unknown challenges one has to face, but in the end, use the One Ring as one’s cloud infrastructure to the Promised Land or corporate success. At the end, the hobbit team avails what every enterprise needs, with as few bucks spent as possible, on the way: treasure.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud: A Smart Move Or Proceed With Caution?

Moving To The Cloud You hear it over and over again: The future of computing is in the cloud. Businesses should be moving to the cloud. If you’re not in the cloud, you’re behind the times. But trusting your essential data to a cloud may sound like a dubious proposition. Below are some of the…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…