The Rise of Edge Computing in Defense.

AuthorMiller, Mike
PositionViewpoint

* The past year was a time of rapid change for government technology. While bolstering information technology infrastructure that could sustain remote work was a major priority, there's also been an ongoing revolution at the more remote network edge.

By bringing computational data storage and connectivity resources closer to where it's being gathered, edge computing saves bandwidth and accelerates response times.

The approach has been around since the 1990s but has gained traction in recent years thanks to advances in data processing and computing and emerging technologies such as virtual reality and 5G.

Edge computing advances life-saving possibilities for warfighters and the defense community. Thanks to edge computing, troops have access to insights in remote locations with little connectivity. Weather conditions, machine performance data and other sensitive information can now be turned into actionable decision-making. As possibilities at the edge advance, these applications continue to expand.

At the same time, with millions of remote workers and strained networks, there's a greater need for computer power, capacity, and storage closer to another new network edge--home offices. The result is a boom in edge-related hardware, software and applications.

To fully take advantage of possibilities at the edge, the first step is determining how best to deploy such solutions for each unique situation. As an emerging technology, there may not be a prior example or tested solution, and each branch of the department has different circumstances and needs. It is important for senior leaders to evaluate where edge computing is most needed and how to utilize it most efficiently.

For example, how can warfighters in theater--operating under the most extreme of circumstances--have the ability to utilize actionable intelligence where asynchronous operations and connectivity are to be expected?

Once the mission is clear, it's critical to think about data protection at the edge. As the Defense Department explores new applications, data protection needs to advance along with the possibilities. Considering cyber basics, a smart backup strategy, connectivity and unique requirements for the technology's footprint at the edge can ensure sensitive data information is reliable and secure.

To ensure security at the edge, strong governance programs are key--beginning with an understanding of what data is being generated as well as how it is processed and transferred...

To continue reading

Request your trial

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT