Legacy» as a key to learning

Want to take a break and give your brain a useful workout?

If yes, then this article is for you. And also for those who are just starting to dive into IT processes or already have an idea about them and want to practice their knowledge on an unconventional example. I want to conduct an experiment and implement an unusual idea (but more on that at the end of the article).

Many of you probably watched the 2010 Bestseller – the film “TRON: Legacy”. Personally, it impressed me so much that I re-watched it 3 times. And each time I found new IT services, processes and “Easter eggs” hidden from the user's eyes.

Tron: Legacy (also known as TR2N and Tron 2) is a 2010 American science fiction cyberpunk film produced by Walt Disney Pictures. It is a sequel to the 1982 film Tron, and is based in part on the video game Tron 2.0. It is the directorial debut of Joseph Kosinski; the director of the previous film, Steven Lisberger, served as a producer.

Tron: Legacy (also known as TR2N and Tron 2) is a 2010 American science fiction cyberpunk film produced by Walt Disney Pictures. It is a sequel to the 1982 film Tron, and is based in part on the video game Tron 2.0. It is the directorial debut of Joseph Kosinski; the director of the previous film, Steven Lisberger, served as a producer.

– The system… The digital universe… I kept trying to imagine the data packets rushing through the computer. What are they like? Cars, boats, motorcycles… What routes do they travel? I thought I would never see this world of my dreams. But one day, something amazing happened…

Some might see in this film an operating system with running programs (the first impression that comes from mentions of programs and viruses).

Computer: Attention programs. You will now be given a personal disk. The actions performed and the information received will be recorded on it. In case of loss of the disk or failure to execute commands, you will be subject to immediate zeroing. The image is written. Initialization is complete. Go to games.

Others noticed the idea of ​​self-developing artificial intelligence (some advanced programs thought, made conclusions, performed non-standard actions that clearly went beyond their original algorithms)

The work was in full swing. We were building a utopia. Hours here were just minutes outside. When it seemed that things couldn't get any better, a strange thing happened. Magical. Iso-isomorphic life algorithms. A new form of life. I owe this to the Heavens. Perhaps I just created the conditions for their appearance without even knowing it.

For centuries we dreamed of gods, aliens… Of unearthly higher intelligence. They appeared here… Like flowers in the desert. Defenselessly naive. Infinitely wise. It was as if I had seen the light. Everything I had painstakingly created in the System: power, order… everything had lost its meaning. I lived in a crystal castle of illusions. The isomorphs… smashed it.

How developed is their root code – electronic DNA. Viruses? Not scary! Science, philosophy, all human ideas about the Universe turned out to be false. This is bio-digital jazz. Isomorphs would be my gift to people.

For me personally, the film showed a virtual digital reality (Flynn's idea of ​​creating a virtual world), in which we saw everything: creation, development, conflicts, destruction, geniuses, villains, creators, viruses, emotions.

Watching it again, I suddenly caught myself thinking that I clearly saw almost all typical IT processes in the film's scenes. And I was amazed by the genius of the author and director, how brilliantly and harmoniously they were able to reflect (or encrypt) them in this film.

So, what processes did I find (I will need your help here):

  1. Formation of system requirements

  2. IT security

  3. IT architecture design

  4. Backend development

  5. Frontend development

  6. Preparation of test cases (test scenarios) and testing

  7. Technical support

  8. Bug-fixing

  9. Knowledge Base FAQ

  10. DevOps

  11. ML (Machine Learning)

  12. Code review

  13. Authorization and authentication policy

And the main question: “Why do I need this?”

An idea arose to make a training course on introduction to basic IT processes and to use this film as a basis. I came up with the idea to make the learning process non-standard, tied to memorable bright moments.

Most courses read dry theory. And people (especially those who know nothing) find it quite difficult to understand it the first time. There is no anchor and associations that connect new information with vivid examples. And those who already know something often find it boring to listen to all this again.

Watching how information is formed and conveyed to the audience on the courses, I suddenly realized that there is a lack of vivid associations that would be equally interesting for both beginners (who came, as they say, “from scratch”) and professionals (who already work in IT, know about IT processes, but want to improve their knowledge).

And then I remembered this movie. It is perfect for this task. The course of study will consist of watching this movie, stopping at key moments. By pausing at a bright, memorable scene, you can give a piece of theory that perfectly matches it. This will be the very anchor that will connect dry theory with an interesting and memorable scene in the movie.

And I need your help with this. Write to me in the comments which characters and scenes from this film correspond to the IT processes described above? I missed some IT processes, if you find them, that would be great – write which character (name and what he does) and in what place in the film (in what scene) performs actions that can be associated with a unique IT process.

Thank you in advance for your help and support. I hope that together we will make the IT world a better place!

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *