Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

What Star Wars can Teach About Mentorship

What Star Wars can Teach About Mentorship

The Star Wars saga has many recurring themes - the struggle between desire and destiny, good and evil, impulse and discipline. However, a theme that particularly stands out throughout the series is the examination of the relationship between student and teacher. This theme is similar to the relationship that an IT provider should strive to have with their clients.

For today’s Star Wars Day blog, we’ll review some of the lessons that a professional can learn from the Star Wars films, as well as what the insights that the relationships shared by the characters can reveal about being a mentor, as well as the mentored. To do so, we’ll examine some moments and characters from the complete series thus far - Episodes I through VIII - and the stand-alone Rogue One.

WARNING: this article may spoil a few key moments from the series, so continue at your own caution.

How to Be a Mentor, According to Star Wars
There is no shortage of those who could be considered mentors throughout the series. From Qui-Gon Jinn and Obi-Wan/Old Ben Kenobi, Luke Skywalker and Leia Organa, and finally, Yoda, many characters accept the mantle of mentor… albeit begrudgingly, at times.

In order to be a mentor, there are two requirements that each of these characters present during the series. Likewise, many characters also exhibit just one or the other characteristic. Yet, as they do not exemplify both qualities, they don’t quite qualify as a true mentor. We will explore these characters in more detail later.

These two requirements are to be a committed educator, as well as an equally committed leader. Each of the mentors listed above have had the opportunity to be both, and rose to the occasion. Qui-Gon took the initiative to take a young slave into his care, campaigning to the Jedi Council for the ability to teach him. When Qui-Gon was dispatched by Darth Maul, Obi-Wan rose to the occasion and took up Anakin Skywalker as his padawan learner.

Years after Anakin succumbed to his fear and hubris to be reborn as Darth Vader, Obi-Wan continued to be a mentor under the name Ben Kenobi, teaching the Skywalker of the next generation how to embody the principles of the Jedi. Once this Skywalker, Luke, had learned to be a leader, he teamed up with his long lost sister, Princess Leia Organa, to defeat the Empire. While Leia continued to lead an underground organization committed to fighting the Empire’s last remnants, Luke retreated to a sanctuary to ensure he was able to train the next worthy Jedi.

Finally, we would be amiss if we neglected to mention Yoda’s involvement as a leader throughout the saga. From the very beginning of the story, Yoda was a respected leader of the Jedi Order, proving his worth on the battlefield and in the Senate. When the Empire rose, he retreated to his home planet in wait of the next generation of Jedi to train. He then passed on, but returned as a Force ghost to impart his wisdom again, later in the series’ timeline.

Lining Up Star Wars Mentorship with Our Own (and with The Odyssey)
As one might imagine, the concept of mentorship has been around for much longer than Star Wars has been. In fact, we get the word “mentor” from a character in Homer’s epic poem, The Odyssey. Mentor was entrusted by the protagonist, Odysseus, to care for his son in his absence, and later assisted the young prince Telemachus in reuniting with his long-lost father by serving as his guide and, well, mentor.

In this way, Mentor serves a very similar purpose as many of the characters from Star Wars. By teaching another character and acting as a leader, he allows the protagonists to succeed in their quest - or, in the terminology more likely to be used in Star Wars, their mission. Furthermore, like the mentors to be found in Star Wars, Mentor shares a few characteristics with the mentors we see in the business world.

What Makes a Mentor, a Mentor
We’ve already established that a mentor should be a sort of amalgamation of a teacher, and a leader. This is admittedly a tricky balance to find, until you describe what kind of leader and teacher makes a mentor.

First, as a leader, you have to be able to be supportive as you take charge. As you work with a mentee, commit the time that the mentee needs to grow and devote your full attention to them. Just as Ben Kenobi understood Luke’s rage and bitterness after his aunt and uncle were slaughtered by the Empire’s stormtroopers, you need to be able to emphasize with your acolyte and guide them towards the higher purpose you can see them achieving.

As a teacher, it is important to also challenge those who you mentor. Not only should you assign tasks for your student to complete, these tasks should test the limits of their ability and set a standard that you expect them to meet. As Yoda challenged Luke to lift his X-wing fighter out of the swamps of Dagobah, he wasn’t coddling his student. Neither should you.

It is also important that, as their teacher, you review the lessons that have been imparted. These discussions will not only help ensure the information is retained, it will also encourage your mentee to draw their own conclusions. Remember, teachable moments happen all the time - it’s up to you to embrace them.

Finding Poor Examples in Rogue One
Alternatively, Rogue One offers a few examples of how to very much not be a positive leader. At the very beginning of the film, protagonist Jyn Urso’s father, Galen, is pressured into returning into the Empire’s service and designing the ultimate superweapon: the planet-destroying Death Star. In addition to being forced to work on a project he detests, he is stuck in a thoroughly unpleasant work environment. Oh, and did we mention that his wife was murdered and his daughter lost to him during the attack?

It should be no wonder, then, that instead of being loyal to his ‘employers,’ Galen instead decides to sabotage their operation from the inside. Hiding a critical weakness in the Death Star and sending word of it to the Rebel Alliance, Galen embodies the corporate espionage that a disgruntled employee could leverage against your business. A good leader sees the value in keeping an employee happy in two ways - first, it helps to keep that employee engaged and productive, and secondly, it reduces, if not eliminates, any ill will toward the organization.

In another example of the Empire’s failings in Rogue One, the antagonists of the film also leverage shady office politics to get a leg up on their superiors. For instance, Director Krennic elects to go over his commander’s head and out of the traditional chain of command, reporting directly to Darth Vader. As a commanding officer himself, Krennic serves as an example of what happens when office politics supersede the typical chain of command - and winds up being Force-choked into oblivion for his troubles. While it is highly unlikely that deviating from the chain of command will get you strangled like Krennic, it certainly doesn’t reflect well on you and shows a distinct lack of leadership and respect for the chain of command.

All this only goes to show that lessons in leadership can be found anywhere you look - even in a galaxy far, far away. Do you have any Jedi masters or mentors in your life? What have you learned from them? Share your thoughts in the comments, and may the Fourth be with you!

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Network Security Business Google Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices IT Services Hardware Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Productivity Collaboration Cybersecurity Quick Tips Users Business Management Upgrade Managed IT Services Windows Phishing Outsourced IT Ransomware Data Backup Windows 10 Server Save Money Data Recovery Office Cloud Computing Windows 10 Passwords Chrome Gadgets Virtualization Saving Money Social Media Holiday Tech Term Managed IT Services Microsoft Office Managed Service Automation Cybercrime Operating System Computers Artificial Intelligence Facebook IT Support Health Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Networking Managed Service Provider Spam Remote Office 365 Alert Telephone Systems Information Information Technology Covid-19 Router Social Engineering Mobility BDR Bandwidth Employer-Employee Relationship Recovery Human Resources Big Data Data Breach Law Enforcement Remote Monitoring Mobile Computing App History Password Money Application Encryption Applications Remote Computing Government Mobile Office Private Cloud Blockchain Managed IT Paperless Office Office Tips How To Training Apps VPN Data Storage Patch Management Vulnerability Two-factor Authentication Windows 7 Word Avoiding Downtime Mouse Servers HaaS Flexibility Marketing Data Security Bring Your Own Device WiFi Data Management Work/Life Balance IT solutions Entertainment Wireless Website Budget Infrastructure Gmail Voice over Internet Protocol Settings Google Drive HIPAA Sports Redundancy RMM Scam Keyboard Virtual Reality Data Protection Apple Social Vendor Management User Error Meetings Save Time Telephone System Staff Software as a Service Risk Management Hacker Machine Learning Cleaning Connectivity Remote Work Vendor The Internet of Things Lithium-ion battery Managed Services USB Display End of Support Education Physical Security Safety Conferencing Employee/Employer Relationship Firewall Remote Worker PDF Business Intelligence Computing Cryptocurrency SaaS Audit Worker Proactive IT IT Management Best Practice Botnet Network Congestion Comparison YouTube Black Market eWaste IT Plan Digital Signage CES Unsupported Software Business Technology Document Management Content Management Virus Access Control Solid State Drive Charger Wireless Technology Downtime Unified Threat Management Wearable Technology Procurement How to Virtual Assistant Retail Net Neutrality Hard Drives Compliance Computer Accessories Workplace Strategy OneNote Authentication Instant Messaging Computer Care Robot Current Events Help Desk Excel Data storage Telephony Printing Automobile Biometrics Samsung Virtual Desktop Computing Infrastructure Update Printer Going Green Managed Services Provider Value Bluetooth DDoS Spam Blocking Database Electronic Medical Records Google Docs Identity Theft SharePoint Battery Remote Workers Hiring/Firing Shadow IT Processor Legal IT Consultant Customer Service Augmented Reality Environment Internet Exlporer Fraud Humor Hard Drive Fax Server Tools Copiers IT service 5G Smart Tech Trending Amazon Quick Tip Addiction Television Smartwatch Recycling Tablet Relocation Consultant Ergonomics Development Wiring Domains OLED Practices Analytics Amazon Web Services PCI DSS Virtual Machine Cache Video Games Public Computer Fiber Optics Safe Mode Maintenance Worker Commute Employee Criminal Transportation Best Available 2FA IaaS Regulations Messaging GDPR Experience Computer Fan Cabling Hosted Computing Bloatware Rootkit WIndows 7 Online Shopping Policy Hypervisor Wireless Internet Scalability Trend Micro File Sharing Business Owner Workers Tablets Benefits Dark mode SMS Camera FENG Default App Inventory Entrepreneur Specifications NarrowBand IBM Evernote Procedure Saving Time Wire Search Flash Shopping Shortcut Google Search iPhone Smart Technology Travel dark theme PowerPoint Windows Media Player AI Printers IT Infrastructure Cost Management User Millennials Supercomputer Bing Wireless Charging FinTech Software Tips Smart Office Social Networking Sync Social Network Emails Files Virtual Private Network Investment Managing Stress Workforce Chromecast Cables Employees Running Cable Employee/Employer Relationships Netflix ISP Memory Colocation Two Factor Authentication Uninterrupted Power Supply Cameras Windows 365 Video Conferencing Project Management Root Cause Analysis ROI Nanotechnology Telecommuting Knowledge Shortcuts Cortana Monitor Music Sales HBO Bitcoin Skype Personal Cryptomining Digital Signature Point of Sale Supply Chain Management Warranty Data loss HVAC Leadership Google Apps Science Reputation Troubleshooting Streaming Media Monitoring Outlook Batteries Start Menu Digitize Content Analysis Tech Support Printer Server Windows 8.1 Laptop Administrator Screen Mirroring Windows Server 2008 R2 Devices Techology Loyalty Enterprise Content Management Customer Relationship Management Customers Books Customer relationships Distributed Denial of Service Frequently Asked Questions Email Best Practices Mobile IT Assessment MSP Audiobook Windows 10s Manufacturing Accountants Analyitcs Credit Cards Touchpad Microchip Cast Thought Leadership Programming Managed IT Service Password Management webinar Security Cameras Password Manager Emergency Computer Tips Tip of the week Virtual CIO Professional Services OneDrive Politics Public Cloud Biometric Security Advertising Employer Employee Relationship Multi-Factor Security Peripheral Search Engine Antivirus Twitter Assessment Using Data NIST Business Mangement Windows 8 Notifications Digital Security Cameras Windows Server 2008

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code