Lessons From The Hobbit: Cloud Computing Education

Lessons from the Hobbit for Cloud Computing Education

Though he penned it in 1937, J.R.R. Tolkien had much coming for the writer on cloud computing topics of this time and age, in the twenty first century. The Hobbit movie, a Middle earth tale of the coming-out-of-the-hole, fear and snugness of a hobbit which leads to far-reaching exploits that cut across dangerous and fantastic lands, has come out. One can trace parallels between the production and cloud computing, key among these including the following, according to a Windows IT Pro article.

Okay, in the beginning “there lived a hobbit in a hole.” This is the opening line of the tale, but to some, it might mean the closed-in world of Information Technology where company executives are satisfied with their computer technicians. However, Bilbo soon leaves the hole, hankering after treasure after persuasion by a horde of thirteen dwarves plus a wizard. On the way to the Desolation of Smaug, they have to improvise answers far away from any brick-and-mortar computer shop. This is where cloud computing education comes in.

After desertion by Gandalf, the Wizard, who is after his own grand plans of overcoming the force in the universe called the Necromancer, Bilbo and company, is left to improvise roles. He saves the skin of all his companions, who are frequently at a fix in the hands of goblins, spiders, and finally Gollum. Indeed, the ring he gets from Gollum forms the infrastructure of the cloud education in the story because without it, he would not be ubiquitous and invisible to foes. Thus, in a situation where the wizard who has disappeared has been the Chief Information Officer, then Bilbo settles down into becoming a guide who does not have any especial knowledge about IT, per se, but uses the cloud (the ring) to learn more about how to overcome hurdles.

Sometimes he has to troubleshoot in the following symbolic encounters:

The walk in Spider land: If Chief Information Officers want to bring their staff to understand the cloud better, they need to help them seek solutions rather than be baby fed. Though it is mandatory for a firm to join the pay-as-you-earn infrastructure these days if it wants to survive, it can, however, only select apps that suit it through the collective IT team and staff. This is why Biblo’s invisibility helps him to use special weapons, including stones (apps) that he has chosen, to troubleshoot the spiders’ cobwebs and thus rescue his entrapped team.

The Barrel Ride: Another important lesson for company executives who want to educate staff about the cloud is that of using in-house cloud understanding before imposing cloud jargon on them. The end-user cannot fully appreciate terms like sharing resources, if he or she does not benefit from it. By taking his prying powers in a cave where they were held hostage, Bilbo used his understanding of the use of barrels that promoted barter trade between Middle- earth communities, down the river, to rescue his compatriots by this means. Indeed, sharing of resources could not be clearer to him than using barrels and hiding each of the dwarves in each to reach the other end, unharmed, as was customary of river trading in the Hobbit.

The Long road to Dragon Encounter: It took years of toil to make it to the dragon’s lair for the Hobbit team. Similarly, CIOs should look ahead, like the crew in the book and movie did, to reach their destination and back without hurt. In the present context of many applications and infrastructures, like EC2, Windows 8 and others, it is impossible to know which to incorporate as a cloud education program with success.

This is why one can contextualize all the many challenges in a fantasy novel, review the unknown challenges one has to face, but in the end, use the One Ring as one’s cloud infrastructure to the Promised Land or corporate success. At the end, the hobbit team avails what every enterprise needs, with as few bucks spent as possible, on the way: treasure.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…