(703) 288-9767    NTC Store
NTConnections Blog

NTConnections has been serving the Reston area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Star Wars can Teach About Mentorship

What Star Wars can Teach About Mentorship

The Star Wars saga has many recurring themes - the struggle between desire and destiny, good and evil, impulse and discipline. However, a theme that particularly stands out throughout the series is the examination of the relationship between student and teacher. This theme is similar to the relationship that an IT provider should strive to have with their clients.

For today’s Star Wars Day blog, we’ll review some of the lessons that a professional can learn from the Star Wars films, as well as what the insights that the relationships shared by the characters can reveal about being a mentor, as well as the mentored. To do so, we’ll examine some moments and characters from the complete series thus far - Episodes I through VIII - and the stand-alone Rogue One.

WARNING: this article may spoil a few key moments from the series, so continue at your own caution.

How to Be a Mentor, According to Star Wars
There is no shortage of those who could be considered mentors throughout the series. From Qui-Gon Jinn and Obi-Wan/Old Ben Kenobi, Luke Skywalker and Leia Organa, and finally, Yoda, many characters accept the mantle of mentor… albeit begrudgingly, at times.

In order to be a mentor, there are two requirements that each of these characters present during the series. Likewise, many characters also exhibit just one or the other characteristic. Yet, as they do not exemplify both qualities, they don’t quite qualify as a true mentor. We will explore these characters in more detail later.

These two requirements are to be a committed educator, as well as an equally committed leader. Each of the mentors listed above have had the opportunity to be both, and rose to the occasion. Qui-Gon took the initiative to take a young slave into his care, campaigning to the Jedi Council for the ability to teach him. When Qui-Gon was dispatched by Darth Maul, Obi-Wan rose to the occasion and took up Anakin Skywalker as his padawan learner.

Years after Anakin succumbed to his fear and hubris to be reborn as Darth Vader, Obi-Wan continued to be a mentor under the name Ben Kenobi, teaching the Skywalker of the next generation how to embody the principles of the Jedi. Once this Skywalker, Luke, had learned to be a leader, he teamed up with his long lost sister, Princess Leia Organa, to defeat the Empire. While Leia continued to lead an underground organization committed to fighting the Empire’s last remnants, Luke retreated to a sanctuary to ensure he was able to train the next worthy Jedi.

Finally, we would be amiss if we neglected to mention Yoda’s involvement as a leader throughout the saga. From the very beginning of the story, Yoda was a respected leader of the Jedi Order, proving his worth on the battlefield and in the Senate. When the Empire rose, he retreated to his home planet in wait of the next generation of Jedi to train. He then passed on, but returned as a Force ghost to impart his wisdom again, later in the series’ timeline.

Lining Up Star Wars Mentorship with Our Own (and with The Odyssey)
As one might imagine, the concept of mentorship has been around for much longer than Star Wars has been. In fact, we get the word “mentor” from a character in Homer’s epic poem, The Odyssey. Mentor was entrusted by the protagonist, Odysseus, to care for his son in his absence, and later assisted the young prince Telemachus in reuniting with his long-lost father by serving as his guide and, well, mentor.

In this way, Mentor serves a very similar purpose as many of the characters from Star Wars. By teaching another character and acting as a leader, he allows the protagonists to succeed in their quest - or, in the terminology more likely to be used in Star Wars, their mission. Furthermore, like the mentors to be found in Star Wars, Mentor shares a few characteristics with the mentors we see in the business world.

What Makes a Mentor, a Mentor
We’ve already established that a mentor should be a sort of amalgamation of a teacher, and a leader. This is admittedly a tricky balance to find, until you describe what kind of leader and teacher makes a mentor.

First, as a leader, you have to be able to be supportive as you take charge. As you work with a mentee, commit the time that the mentee needs to grow and devote your full attention to them. Just as Ben Kenobi understood Luke’s rage and bitterness after his aunt and uncle were slaughtered by the Empire’s stormtroopers, you need to be able to emphasize with your acolyte and guide them towards the higher purpose you can see them achieving.

As a teacher, it is important to also challenge those who you mentor. Not only should you assign tasks for your student to complete, these tasks should test the limits of their ability and set a standard that you expect them to meet. As Yoda challenged Luke to lift his X-wing fighter out of the swamps of Dagobah, he wasn’t coddling his student. Neither should you.

It is also important that, as their teacher, you review the lessons that have been imparted. These discussions will not only help ensure the information is retained, it will also encourage your mentee to draw their own conclusions. Remember, teachable moments happen all the time - it’s up to you to embrace them.

Finding Poor Examples in Rogue One
Alternatively, Rogue One offers a few examples of how to very much not be a positive leader. At the very beginning of the film, protagonist Jyn Urso’s father, Galen, is pressured into returning into the Empire’s service and designing the ultimate superweapon: the planet-destroying Death Star. In addition to being forced to work on a project he detests, he is stuck in a thoroughly unpleasant work environment. Oh, and did we mention that his wife was murdered and his daughter lost to him during the attack?

It should be no wonder, then, that instead of being loyal to his ‘employers,’ Galen instead decides to sabotage their operation from the inside. Hiding a critical weakness in the Death Star and sending word of it to the Rebel Alliance, Galen embodies the corporate espionage that a disgruntled employee could leverage against your business. A good leader sees the value in keeping an employee happy in two ways - first, it helps to keep that employee engaged and productive, and secondly, it reduces, if not eliminates, any ill will toward the organization.

In another example of the Empire’s failings in Rogue One, the antagonists of the film also leverage shady office politics to get a leg up on their superiors. For instance, Director Krennic elects to go over his commander’s head and out of the traditional chain of command, reporting directly to Darth Vader. As a commanding officer himself, Krennic serves as an example of what happens when office politics supersede the typical chain of command - and winds up being Force-choked into oblivion for his troubles. While it is highly unlikely that deviating from the chain of command will get you strangled like Krennic, it certainly doesn’t reflect well on you and shows a distinct lack of leadership and respect for the chain of command.

All this only goes to show that lessons in leadership can be found anywhere you look - even in a galaxy far, far away. Do you have any Jedi masters or mentors in your life? What have you learned from them? Share your thoughts in the comments, and may the Fourth be with you!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 21 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Privacy Hackers Business Computing Microsoft Hosted Solutions Productivity Malware Backup Internet Google Mobile Devices Efficiency VoIP IT Support Business Email Network Security IT Services Managed Service Provider Miscellaneous Server Innovation Data Workplace Tips Upgrade Disaster Recovery Business Continuity Network Software Windows Business Management Saving Money Hardware Managed IT Services Communication Computer Save Money Android Mobile Device Management Virtualization Smartphone Browser communications User Tips Data Backup Smartphones Outsourced IT Holiday Cybercrime Microsoft Office Computers Internet of Things BYOD Windows 10 WiFi Data Recovery Mobile Computing Hacking Chrome Big Data Ransomware Small Business Cloud Computing Social Media Remote Monitoring Operating System Collaboration IT Solutions VPN Alert Application Apple Managed IT Services Automation Proactive IT Avoiding Downtime Office Marketing Budget The Internet of Things Quick Tips Social Engineering Information Technology BDR Employer-Employee Relationship Tech Term Passwords Going Green Remote Computing Health Mobility Bring Your Own Device Managed IT Recovery spam Gadgets Telephone Systems Bandwidth Artificial Intelligence Cybersecurity Redundancy Wireless Technology Office 365 User Error Two-factor Authentication How To Document Management Vulnerability Data Security Vendor Management Website iPhone Money IT Support Save Time Firewall App Data Protection Router Gmail Business Intelligence Private Cloud Compliance Networking Mouse Apps Data Management Phishing Risk Management Identity Theft PowerPoint Excel Phone System Antivirus Office Tips Content Filtering Downtime Law Enforcement Facebook History Entertainment Tablet Productivity Lithium-ion battery Analytics Word Value Windows 10 Connectivity Retail Memory Search People Servers Safety Work/Life Balance Programming Government Cleaning Smart Tech Network Congestion IT Plan Trending Meetings CES Education HaaS Unsupported Software Fax Server Data loss IT Consultant Black Market Content Management Update Public Cloud Humor Saving Time Statistics Streaming Media Internet Exlporer Online Currency Data storage HIPAA Biometrics Encryption Sports Outlook Credit Cards Printer eWaste YouTube Flexibility USB Hard Drives Solid State Drive Current Events Applications Administration Infrastructure Maintenance Analysis Data Storage Running Cable Workers Physical Security DDoS Unified Threat Management Robot Comparison Skype Windows 7 Business Owner Mobile Office Environment Google Drive Customer Relationship Management OneNote Intranet Human Resources SaaS Mobile Device Training Best Available IT Management Domains Wireless Charging Healthcare Bloatware Criminal IaaS Internet exploMicrosoft Cameras Customer Service Root Cause Analysis Workforce Thought Leadership Video Surveillance Fiber-Optic Electronic Health Records Flash Consultant Entrepreneur Software as a Service Patch Management Advertising Tech Support Printer Server Insurance Telecommuting Content Filter Cables Machine Learning Sync Hacker Worker Commute Cost Management Piracy Scam Charger Software Tips Shadow IT Practices Remote Work Storage Unified Communications HVAC Telephony User Wireless Science Hybrid Cloud Instant Messaging Blockchain Company Culture Licensing Google Docs Computer Care Shortcut Hosted Computing Addiction Windows 8.1 Update Samsung Theft Start Menu SharePoint Twitter Windows 8 PDF Staff Spam Blocking Voice over Internet Protocol Audit HBO Inventory Bluetooth Cache Crowdfunding Cortana Mobile Monitor Keyboard Tablets Digital Signature Multi-Factor Security Screen Mirroring Notifications Frequently Asked Questions Access Control Fraud Wireless Internet Google Apps Professional Services Print Server Reputation Wearable Technology Windows Media Player Social Strategy Computer Fan Lifestyle Cast Tip of the week NarrowBand Authentication Amazon Wire Tools Customers Files Password Social Networking Net Neutrality Hiring/Firing FENG Computer Repair Best Practice Windows Server 2008 Chromecast Wi-Fi WIndows 7 Nanotechnology Amazon Web Services Smart Office Password Manager Colocation Analyitcs Accountants Electronic Medical Records Laptop Managing Stress Settings Online Shopping Paperless Office Business Mangement Botnet Hosted Solution Distributed Denial of Service Computing Infrastructure Legal Virus Virtual Desktop Touchscreen Specifications LinkedIn Data Warehousing Regulations Touchpad IT service Devices Evernote Students Virtual Reality Recycling Debate Travel Relocation End of Support Uninterrupted Power Supply Computer Accessories IoT Millennials IBM Webinar Emergency Worker Supercomputer Content IT solutions Video Games Rootkit Knowledge Audiobook Netflix Scalability Politics Transportation How to webinar Benefits Loyalty Conferencing Windows 10s Smart Technology Battery Experience Two Factor Authentication Assessment Music Users Television Troubleshooting Techology Public Computer Employer Employee Relationship Data Breach Automobile Emails Books CrashOverride