Cloud College: Room Still Smells Like Grapes

Cloud College: Room Still Smells Like Grapes

Cloud College: Room Stills Smells Like Grapes

In light of recent college graduates leaving the fake world of percentages labeled on their work letting you know just how hard you tried, compared to, “Do it again or your fired.” I am thinking stress levels maybe a bit high. I certainly remember after I graduated I would sleep under my bed with all text books because the bed was not a futon. I also bought a thousand scratch and sniff good job stickers too, and I put them on everything I did. My room still smells like grapes. Of course I ran out of these stickers and I was forced to become an adult when I didn’t have the money to pay for more stickers. So I got a job and now I repress my wants to live like a college student with yard work and vacuuming my house. Anyways, if you are a recent graduate with a degree in computer science you are probably working. Of course you can still send this to your liberal arts major friend, because what I am about to offer is valuable information for cloud networking classes at an imaginary school that is designed specifically for their liberal arts major.scratachandsniff

  1. Networking 103 for English Majors.

Yes before you come to class make sure you have drunk a stones weight in absinthe and pick a daisy for the teacher because this class is for the poets. You will learn the finer basics of what a network is, without the scary concept of numbers and computers muddling up your whimsical mind. This class will still allow for your creativity to flourish with the colors of an ether frolic after a reading of the Myth of Lycurgus. You may ask our professor such questions like, “Doth the red blinking light on the triumphant tower of cloud networks show the same anger from Aries’ rage or is it soft and joyous color rejoicing in its abilities liken to the redden cheeks of a cherubim?” Once you graduate from this class you will be ready to teach your fellow IT co-workers about the literary comparisons of storing your files on a network and Chaucer’s intent of the Canterbury’s Tales. Here at Networking for English majors you will learn that the cloud is not just a metaphor for sadness.

  1. Security Protocols for Criminal Justice Majors

Listen up maggots you are the last line of defense between order and UTTER CHAOS! What you will learn from this class will be used out in the real world to provide those working with the cloud the security to sleep at night knowing their files are safe in your trusted gaze. Do you want to disappoint those people sleeping so soundly like babies? I don’t think so. You will learn about deterrent, preventative, corrective, and detective controls to keep little Susie’s My Little Pony box set collection safe from any adult male who is otherwise known as a Brony. Those sickos are not getting by us because we hold the keys tonight. You want to ask questions? Well you can’t I tell you what security is, and then you make it happen.

  1. Cloud Theory for Philosophy Majors

What is a cloud? Can we begin with that first? Yes the outside world of philistines and troglodytes may view it as a machine, a machine that holds abstract numbers strung together to make something digital known in the technological realms as code. This code creates the ability to hold onto other coded items and distribute them according to the will of the person, be it determined or free. Then again is any of that real? What can we say about the cloud?

1. The cloud was created by man.

2. All men are mortal with a finite lifespan.

3. Therefore, the cloud network is mortal.

That seems like a misstep in logic but for all we know our logic is misled! Why if men are moral and clouds cannot work without men do they not feel the stinging coldness of mortality as they watch as wither away? This is why we need you to ask . . . the . . . QUESTIONS!

  1. Files on the Go 101 for Anthropologist

Are you the kind of person who is on the go? Someone who feels they are not content until they have hiked every mountain range in Sub-Saharan Africa with nothing but a back pack and a friendly disposition to cultural relativism? Well if that is you have you also ever wondered how all your curry recipes and pictures at waterfalls were sent to all your devices without you manually doing it? No it wasn’t a blessing from the Goddess Willow of the Black Forest. It is actually from this new culture of IT personnel that you can learn about. This aloof group of people’s way of life has never been studied but they do so much for you. Soon you will realize just how the cloud distributes your files throughout your network so you can never go without the music you need for the harvest dance of the full moon.

  1. Painting Clouds for Art Majors

We aren’t kidding anyone here we know you guys were art students so we are just going to give you some paint to make the cloud network hardware look appealing.

By Chris Kenealy

(Image Source:

Chris Kenealy

Chris Kenealy is a 26 year old graduate of Georgia State University, and he is a professional freelance writer for both online and print content. Known for his written work with local non-profit organizations and his highly sarcastic jorunalism ;) work on pop culture he is happy letting his writing make others laugh, think, or both. Chris is also currently a freelance writer for CloudTweaks.

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of


Top Viral Impact

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and store data. The

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues

Cloud Computing Adoption Continues Nowadays, many companies are changing their overall information technology strategies to embrace cloud computing in order to open up business opportunities.  There are numerous definitions of cloud computing. Simply speaking, the term “cloud computing” comes from network diagrams in which cloud shapes are  used to describe certain types of networks. All

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.


Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving