Lessons From The Hobbit: Cloud Computing Education

Lessons from the Hobbit for Cloud Computing Education

Though he penned it in 1937, J.R.R. Tolkien had much coming for the writer on cloud computing topics of this time and age, in the twenty first century. The Hobbit movie, a Middle earth tale of the coming-out-of-the-hole, fear and snugness of a hobbit which leads to far-reaching exploits that cut across dangerous and fantastic lands, has come out. One can trace parallels between the production and cloud computing, key among these including the following, according to a Windows IT Pro article.

Okay, in the beginning “there lived a hobbit in a hole.” This is the opening line of the tale, but to some, it might mean the closed-in world of Information Technology where company executives are satisfied with their computer technicians. However, Bilbo soon leaves the hole, hankering after treasure after persuasion by a horde of thirteen dwarves plus a wizard. On the way to the Desolation of Smaug, they have to improvise answers far away from any brick-and-mortar computer shop. This is where cloud computing education comes in.

After desertion by Gandalf, the Wizard, who is after his own grand plans of overcoming the force in the universe called the Necromancer, Bilbo and company, is left to improvise roles. He saves the skin of all his companions, who are frequently at a fix in the hands of goblins, spiders, and finally Gollum. Indeed, the ring he gets from Gollum forms the infrastructure of the cloud education in the story because without it, he would not be ubiquitous and invisible to foes. Thus, in a situation where the wizard who has disappeared has been the Chief Information Officer, then Bilbo settles down into becoming a guide who does not have any especial knowledge about IT, per se, but uses the cloud (the ring) to learn more about how to overcome hurdles.

Sometimes he has to troubleshoot in the following symbolic encounters:

The walk in Spider land: If Chief Information Officers want to bring their staff to understand the cloud better, they need to help them seek solutions rather than be baby fed. Though it is mandatory for a firm to join the pay-as-you-earn infrastructure these days if it wants to survive, it can, however, only select apps that suit it through the collective IT team and staff. This is why Biblo’s invisibility helps him to use special weapons, including stones (apps) that he has chosen, to troubleshoot the spiders’ cobwebs and thus rescue his entrapped team.

The Barrel Ride: Another important lesson for company executives who want to educate staff about the cloud is that of using in-house cloud understanding before imposing cloud jargon on them. The end-user cannot fully appreciate terms like sharing resources, if he or she does not benefit from it. By taking his prying powers in a cave where they were held hostage, Bilbo used his understanding of the use of barrels that promoted barter trade between Middle- earth communities, down the river, to rescue his compatriots by this means. Indeed, sharing of resources could not be clearer to him than using barrels and hiding each of the dwarves in each to reach the other end, unharmed, as was customary of river trading in the Hobbit.

The Long road to Dragon Encounter: It took years of toil to make it to the dragon’s lair for the Hobbit team. Similarly, CIOs should look ahead, like the crew in the book and movie did, to reach their destination and back without hurt. In the present context of many applications and infrastructures, like EC2, Windows 8 and others, it is impossible to know which to incorporate as a cloud education program with success.

This is why one can contextualize all the many challenges in a fantasy novel, review the unknown challenges one has to face, but in the end, use the One Ring as one’s cloud infrastructure to the Promised Land or corporate success. At the end, the hobbit team avails what every enterprise needs, with as few bucks spent as possible, on the way: treasure.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

What’s On The Horizon For Cloud Computing

What’s On The Horizon For Cloud Computing

Cloud Computing Trends Now that we are a little more than halfway through 2016, many experts are beginning to make their predictions about cloud computing for the rest of the year and beyond. While many of the trends aren’t too unexpected (the ever increasing acceptance of cloud solutions by businesses, for instance) other trends are…

Tesla Solar Plan Would Cost Billions To Implement

Tesla Solar Plan Would Cost Billions To Implement

A 1,500-word manifesto that Elon Musk unveiled last week, outlining his plan to expand Tesla Motors Inc.’s electric-vehicle line and to build “stunning solar roofs,” may end up costing the company tens of billions of dollars to carry out. Musk, Tesla’s chairman and chief executive officer, gave the estimate on Tuesday after a tour of the…

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security It’s obvious that IoT can make the entire healthcare industry more efficient. The kind of data involved can be used to save time, physical energy and operating costs. Because of this, devices that facilitate medical data are becoming more commonplace in the industry. This includes things such as wearables that can track…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Shaking Up The Cloud Technology Marketplace

Shaking Up The Cloud Technology Marketplace

Cloud Technology Marketplace Cloud continues its devastating rearrangement of the technology marketplace. As legacy vendors struggle to compete many deck chairs are getting moved about – some pretty spectacularly. In the meantime, the boat is still sinking. We have seen how SaaS (Software as a Service) is tearing up traditional software firms who must adapt…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…