If 20 Famous Movie Quotes Were About Cloud Computing

If 20 Famous Movie Quotes Were About Cloud Computing

If 20 Famous Movie Quotes Were About Cloud Computing

With a world dominated by mass and social media it is no surprise that pop culture arises from common trends that are marketed with these outlets. This makes me wonder how cloud computing may have looked different if famous movies quotes were about cloud computing. I think the world would be an artistically better place. Don’t you?

1. The Wizard of Oz:

Toto, I’ve got a feeling we aren’t using a USB jump drive to share our files anymore.” – Dorothy

2. Love Story

Cloud computing means never having to say I lost those pictures of your cat that you sent me.” – Jennifer Cavaalleri

3. Field of Dreams:

If you build a cloud network, people will share.” – Ray Kinsella

4. The Sixth Sense:

 “I see a network that stores all my files . . . and dead people.”  – Cole Sear

sixth-sense

5. Jerry Maguire: 

You had me at secure storage.” – Dorothy Boyd

6. A Streetcar Named Desire:

 I have always depended on the kindness of a shared network.” – Blanche

7. Titanic: 

“I’m the king of the world’s cloud networking system!” – Jack Dawson

8. Dirty Dancing:

 “Nobody puts all my files in the corner.” – Johnny Castle

9. The Terminator:

 “I’ll be back . . . with greater security features.” – Terminator

10. Chicago: 

Pop! Six! Squish! Uh Oh! Cicero! Cloud Computing! Pop! Six! Squish! Uh Oh! Cicero! Cloud Computing! Pop! Six! Squish! Uh Oh! Cicero! Cloud Computing!” – Cell House Tango

11. The Princess Bride:  

“Cwoud computing, Cwoud computing is what bwings us togethwaa.” – Clergyman

12. Animal House

“Nothing is lost from our cloud until we decide it is. Were all our files lost when the Germans bombed Pearl Harbor? No!” – John Blutarsky

13. Mommie Dearest

“NO . . . MORE . . . TRANSFERS! What are wired transfers doing on this computer when I told you NO WIRED TRANSFERS EVERRRR!!!!”: – Joan Crawford (As a character in the story)

14. Inglourious Bastards:

“Now if one were to determine what attribute the German people share with a cloud network router, it would be the cunning and the predatory instinct of a D-Link DIR-865L.”
– Col. Hans Landa

Hans_Landa

15. Harry Potter and the Sorcerer’s Stone:

You’re a cloud computing network Harry.” – Rubeus Hagrid

16. Evil Dead 2: 

“There’s some cloud network out there. That… that witch in the cellar is only part of it. It lives… out in the internet, in the dark… something… something that’s come back from the dead.” – Ash

17. The Dark Knight: 

All you care about is money. This city deserves a better class of free cloud computing. And I’m gonna give it to them!” – The Joker

18. Gone With the Wind:

 Frankly my dear I don’t give a damn . . . about your external hard drive.” -Rhett Butler

19. Dumb & Dumber:

Lloyd Christmas: “What do you think the chances are of a guy like you and a girl like me sharing a cloud network together?”

Mary Swanson: “Well Lloyd that is difficult to say, we really don’t”

Lloyd Christmas: “Hit me with it! Just give it to me straight. It took some time to set this cloud network up Mary the least you can do is level with me. What are my chances?”

Mary Swanson: “Not good.”

-Lloyd Christmas: “You mean not good like 1/100”

Mary Swanson: “I’d say more like 1/1000000”

Lloyd Christmas: “So you’re telling me there’s a chance, YAAAH!”

20. The Empire Strikes Back:

 –Darth Vader: “Luke, I am your cloud networking partner.”

-Luke Skywalker: “No that’s true that is impossible!”

-Darth Vader: “Search your feelings; you know it to be true.”

-Luke: “Noooooooooooooooooo nooooooo”

-Darth Vader: “Luke we can destroy USB jump drives together . . . it is your destiny.”

. . . And the Academy Award goes to . . . Leave your favorite in the comments section, or another that you came up with!

 

By Chris Kenealy

About Chris Kenealy

Chris Kenealy is a 26 year old graduate of Georgia State University, and he is a professional freelance writer for both online and print content. Known for his written work with local non-profit organizations and his highly sarcastic jorunalism ;) work on pop culture he is happy letting his writing make others laugh, think, or both. Chris is also currently a freelance writer for CloudTweaks.

View All Articles

9 Responses to If 20 Famous Movie Quotes Were About Cloud Computing

  1. “..was it 6GB or only 5GB.  Well, I don’t rightly know myself.  What you got to ask yourself is, do you feel lucky?”  Harry Callahan (Clint Eastwood as Dirty Harry)

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

5 Things To Consider About Your Next Enterprise File Sharing Solution

5 Things To Consider About Your Next Enterprise File Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…