5 Misconceptions Your Parents Make About Cloud Computing

5 Misconceptions Your Parents Make About Cloud Computing

5 Misconceptions your Parents make about Cloud Computing

  1. Al Gore Invented the Cloud.

The collective sigh heard around the world when they read this section may signal that this joke has run its course, but you must have forgotten already, this article is about what your parent’s think. In addition, the day your dad stops telling the same bad joke over and over again is the day he is no longer a father. So let me explain an inconvenient truth (see what I did there?) about this misconception. Sure the joke, “Al Gore invented the internet,” is a little old but your parents had seven years to work on this environmental Cloud twist to the joke to shock it back to life. Now our parents will confuse their joke with reality and we have to hear them complain about Al Gore for a few more years. Just let the man be!

  1. Auntie Em, Auntie Em It’s a Twister!”

One day I hope you are graced with, “So if everyone uses this Cloud, how does it keep everyone’s stuff separate?” You may laugh at the absurdity of this, but sadly I was not fortunate enough of coming up with such a wonderful question. It seems that with some parents the Cloud produces thoughts of the mighty tornado, nature’s fiercest re-arranger of stuff. So it only makes sense that when the Cloud’s network processor becomes too hot and then mixes with the cooling system it produces a twister of biblical proportions from your Cloud and out pops apps, pictures, music, and movies that aren’t even yours. Because nothing can stop the mighty tornado Cloud as it throws all your information to other random Cloud users and you will lose everything!

  1. The Cloud is an Identity Thieves’ Buffet.

Once you sit your parents down and explain, “The Cloud is a storage program on a network that allows you to move your data to multiple devices without actually having to transfer the information manually,” just buckle up and get ready. Look you can explain it perfectly and be as reasonable as you want that the feared identity thief cannot access your information on your Cloud, but major news networks are screaming much louder in your parents’ ear of all the potential problems. Really, just set it up for them and don’t tell them what you did. Now you can act like you’re a computer genius to your parents and they can go on believing how special you are, and you won’t have a three hour fight that ruins your mom’s birthday.

  1. They don’t know if the Cloud is a Cirrus, Cumulus, or Stratus cloud.

To be fair that is a low blow for those who just aren’t into technology but let’s be honest with ourselves if you heard of iTunes then you have heard of their Cloud. Regardless, I bet you know at least one parent when asked what the best Cloud is they will give you a blank stare and then say the white fluffy ones on a nice spring day. Of course this answer is compared to the average twenty year old who won’t even answer your questions because they are just too cool for school (But I am not bitter). So here is a guide to know if your parent understands cloud computing from clouds in the sky:

  1. Does he or she use Cloud computing and is aware of using Cloud computing?

  2. ….

That is it, because chances are the only clouds they know are the ones raining on them.

  1. The Cloud is Secretly Skynet

Let’s be honest with this one, our parents may not be that far off base. The Cloud is a network storage program that is linked throughout the world that stores your vital information and can be accessed anywhere, while Skynet, from the Terminator movies, was a interlinking network that stored vital information that eventually became self aware from all the information it stored. So let’s look at the facts. First, it is called the Cloud and that just sounds like something your right-wing parents would think was created by Obama to sound like a hip attempt to disguise the true nature of Skynet to destroy American values. In addition, Cloud computing has so much memory storage that it is really only one cat picture a way from knowing everyone’s daily schedule and a list of their fears and weaknesses to better destroy us when we become a threat to the almighty Cloud. Come to think of it, when the great and powerful Cloud becomes self aware I just hope John Connor never got into social media. Because I am pretty sure the all powerful Cloud’s Terminator wouldn’t be able to find a phonebook anymore.

By Chris Kenealy

About Chris Kenealy

Chris Kenealy is a 26 year old graduate of Georgia State University, and he is a professional freelance writer for both online and print content. Known for his written work with local non-profit organizations and his highly sarcastic jorunalism ;) work on pop culture he is happy letting his writing make others laugh, think, or both. Chris is also currently a freelance writer for CloudTweaks.

View All Articles

Sorry, comments are closed for this post.

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

E-Commerce Advances For Savvy Marketers

E-Commerce Advances For Savvy Marketers

Digital Marketing Platforms Advertising and marketing techniques have progressed rapidly in the last decade with both channel focus and the direction of content shifting considerably due primarily to advances in cloud technology. Gartner’s Magic Quadrant for Digital Commerce 2016 singles out a few ecommerce providers who are topping their sector in both ability to execute…

The Lighter Side Of The Cloud – Energy Battle

The Lighter Side Of The Cloud – Energy Battle

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

Cloud Infographic – Monetizing Internet Of Things

Cloud Infographic – Monetizing Internet Of Things

Monetizing Internet Of Things There are many interesting ways in which companies are looking to connect devices to the cloud. From the vehicles to kitchen appliances the internet of things is already a $1.9 trillion dollar market based on research estimates from IDC. Included is a fascinating infographic provided by AriaSystems which shows us some of the exciting…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…