Cloud College: Room Still Smells Like Grapes

Cloud College: Room Still Smells Like Grapes

Cloud College: Room Stills Smells Like Grapes

In light of recent college graduates leaving the fake world of percentages labeled on their work letting you know just how hard you tried, compared to, “Do it again or your fired.” I am thinking stress levels maybe a bit high. I certainly remember after I graduated I would sleep under my bed with all text books because the bed was not a futon. I also bought a thousand scratch and sniff good job stickers too, and I put them on everything I did. My room still smells like grapes. Of course I ran out of these stickers and I was forced to become an adult when I didn’t have the money to pay for more stickers. So I got a job and now I repress my wants to live like a college student with yard work and vacuuming my house. Anyways, if you are a recent graduate with a degree in computer science you are probably working. Of course you can still send this to your liberal arts major friend, because what I am about to offer is valuable information for cloud networking classes at an imaginary school that is designed specifically for their liberal arts major.scratachandsniff

  1. Networking 103 for English Majors.

Yes before you come to class make sure you have drunk a stones weight in absinthe and pick a daisy for the teacher because this class is for the poets. You will learn the finer basics of what a network is, without the scary concept of numbers and computers muddling up your whimsical mind. This class will still allow for your creativity to flourish with the colors of an ether frolic after a reading of the Myth of Lycurgus. You may ask our professor such questions like, “Doth the red blinking light on the triumphant tower of cloud networks show the same anger from Aries’ rage or is it soft and joyous color rejoicing in its abilities liken to the redden cheeks of a cherubim?” Once you graduate from this class you will be ready to teach your fellow IT co-workers about the literary comparisons of storing your files on a network and Chaucer’s intent of the Canterbury’s Tales. Here at Networking for English majors you will learn that the cloud is not just a metaphor for sadness.

  1. Security Protocols for Criminal Justice Majors

Listen up maggots you are the last line of defense between order and UTTER CHAOS! What you will learn from this class will be used out in the real world to provide those working with the cloud the security to sleep at night knowing their files are safe in your trusted gaze. Do you want to disappoint those people sleeping so soundly like babies? I don’t think so. You will learn about deterrent, preventative, corrective, and detective controls to keep little Susie’s My Little Pony box set collection safe from any adult male who is otherwise known as a Brony. Those sickos are not getting by us because we hold the keys tonight. You want to ask questions? Well you can’t I tell you what security is, and then you make it happen.

  1. Cloud Theory for Philosophy Majors

What is a cloud? Can we begin with that first? Yes the outside world of philistines and troglodytes may view it as a machine, a machine that holds abstract numbers strung together to make something digital known in the technological realms as code. This code creates the ability to hold onto other coded items and distribute them according to the will of the person, be it determined or free. Then again is any of that real? What can we say about the cloud?

1. The cloud was created by man.

2. All men are mortal with a finite lifespan.

3. Therefore, the cloud network is mortal.

That seems like a misstep in logic but for all we know our logic is misled! Why if men are moral and clouds cannot work without men do they not feel the stinging coldness of mortality as they watch as wither away? This is why we need you to ask . . . the . . . QUESTIONS!

  1. Files on the Go 101 for Anthropologist

Are you the kind of person who is on the go? Someone who feels they are not content until they have hiked every mountain range in Sub-Saharan Africa with nothing but a back pack and a friendly disposition to cultural relativism? Well if that is you have you also ever wondered how all your curry recipes and pictures at waterfalls were sent to all your devices without you manually doing it? No it wasn’t a blessing from the Goddess Willow of the Black Forest. It is actually from this new culture of IT personnel that you can learn about. This aloof group of people’s way of life has never been studied but they do so much for you. Soon you will realize just how the cloud distributes your files throughout your network so you can never go without the music you need for the harvest dance of the full moon.

  1. Painting Clouds for Art Majors

We aren’t kidding anyone here we know you guys were art students so we are just going to give you some paint to make the cloud network hardware look appealing.

By Chris Kenealy

(Image Source: http://www.foodiggity.com)

About Chris Kenealy

Chris Kenealy is a 26 year old graduate of Georgia State University, and he is a professional freelance writer for both online and print content. Known for his written work with local non-profit organizations and his highly sarcastic jorunalism ;) work on pop culture he is happy letting his writing make others laugh, think, or both. Chris is also currently a freelance writer for CloudTweaks.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…