Cloud College: Room Still Smells Like Grapes

Cloud College: Room Still Smells Like Grapes

Cloud College: Room Stills Smells Like Grapes

In light of recent college graduates leaving the fake world of percentages labeled on their work letting you know just how hard you tried, compared to, “Do it again or your fired.” I am thinking stress levels maybe a bit high. I certainly remember after I graduated I would sleep under my bed with all text books because the bed was not a futon. I also bought a thousand scratch and sniff good job stickers too, and I put them on everything I did. My room still smells like grapes. Of course I ran out of these stickers and I was forced to become an adult when I didn’t have the money to pay for more stickers. So I got a job and now I repress my wants to live like a college student with yard work and vacuuming my house. Anyways, if you are a recent graduate with a degree in computer science you are probably working. Of course you can still send this to your liberal arts major friend, because what I am about to offer is valuable information for cloud networking classes at an imaginary school that is designed specifically for their liberal arts major.scratachandsniff

  1. Networking 103 for English Majors.

Yes before you come to class make sure you have drunk a stones weight in absinthe and pick a daisy for the teacher because this class is for the poets. You will learn the finer basics of what a network is, without the scary concept of numbers and computers muddling up your whimsical mind. This class will still allow for your creativity to flourish with the colors of an ether frolic after a reading of the Myth of Lycurgus. You may ask our professor such questions like, “Doth the red blinking light on the triumphant tower of cloud networks show the same anger from Aries’ rage or is it soft and joyous color rejoicing in its abilities liken to the redden cheeks of a cherubim?” Once you graduate from this class you will be ready to teach your fellow IT co-workers about the literary comparisons of storing your files on a network and Chaucer’s intent of the Canterbury’s Tales. Here at Networking for English majors you will learn that the cloud is not just a metaphor for sadness.

  1. Security Protocols for Criminal Justice Majors

Listen up maggots you are the last line of defense between order and UTTER CHAOS! What you will learn from this class will be used out in the real world to provide those working with the cloud the security to sleep at night knowing their files are safe in your trusted gaze. Do you want to disappoint those people sleeping so soundly like babies? I don’t think so. You will learn about deterrent, preventative, corrective, and detective controls to keep little Susie’s My Little Pony box set collection safe from any adult male who is otherwise known as a Brony. Those sickos are not getting by us because we hold the keys tonight. You want to ask questions? Well you can’t I tell you what security is, and then you make it happen.

  1. Cloud Theory for Philosophy Majors

What is a cloud? Can we begin with that first? Yes the outside world of philistines and troglodytes may view it as a machine, a machine that holds abstract numbers strung together to make something digital known in the technological realms as code. This code creates the ability to hold onto other coded items and distribute them according to the will of the person, be it determined or free. Then again is any of that real? What can we say about the cloud?

1. The cloud was created by man.

2. All men are mortal with a finite lifespan.

3. Therefore, the cloud network is mortal.

That seems like a misstep in logic but for all we know our logic is misled! Why if men are moral and clouds cannot work without men do they not feel the stinging coldness of mortality as they watch as wither away? This is why we need you to ask . . . the . . . QUESTIONS!

  1. Files on the Go 101 for Anthropologist

Are you the kind of person who is on the go? Someone who feels they are not content until they have hiked every mountain range in Sub-Saharan Africa with nothing but a back pack and a friendly disposition to cultural relativism? Well if that is you have you also ever wondered how all your curry recipes and pictures at waterfalls were sent to all your devices without you manually doing it? No it wasn’t a blessing from the Goddess Willow of the Black Forest. It is actually from this new culture of IT personnel that you can learn about. This aloof group of people’s way of life has never been studied but they do so much for you. Soon you will realize just how the cloud distributes your files throughout your network so you can never go without the music you need for the harvest dance of the full moon.

  1. Painting Clouds for Art Majors

We aren’t kidding anyone here we know you guys were art students so we are just going to give you some paint to make the cloud network hardware look appealing.

By Chris Kenealy

(Image Source: http://www.foodiggity.com)

About Chris Kenealy

Chris Kenealy is a 26 year old graduate of Georgia State University, and he is a professional freelance writer for both online and print content. Known for his written work with local non-profit organizations and his highly sarcastic jorunalism ;) work on pop culture he is happy letting his writing make others laugh, think, or both. Chris is also currently a freelance writer for CloudTweaks.

View All Articles

Sorry, comments are closed for this post.

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…