Achieving JADC2 for the Joint Force will require transformative computing technology.
Photo Credit: Petty Officer 3rd Class Jacob L. Greenberg/DVIDS
Edge computing is critical in the Department of Defense’s effort to implement the Integrated Whole Domain Command and Control (JADC2) concept to put actionable data in the hands of combatants, according to a senior software engineer at the Naval Information Warfare Center. play a role. at his MeriTalk event this week.
Various military platforms rely on sensors that collect vast amounts of data to support multi-domain missions. Edge computing capabilities allow you to process sensor data in real time, analyze and generate insights at mission speed, and interact with data captured at different connectivity levels.
As the Navy Department’s edge computing architecture evolves, breaking down physical silos has become a key area of concern.
Richard Jack, senior software engineer at NIWC PACIFIC, said in the following MeriTalk Insights: edge panel. “So how do we get it off the laptop? It’s about democratizing this functionality in a way that allows us to provide functionality to
He added that the success of edge computing always puts user experience first.
“I think when I talked to the service, we tried to prioritize and emphasize understanding who the operator is. “It’s the most important concept to really get your head around,” Jack said. “Behind this is human capital, which I really like to think about. And that is what I would like to advocate for all our partners here.”
He said the way in which capabilities are delivered needs to be simplified, and skill sets need to be better adapted to help combatants get the job done.
“If we do that, we have to keep it simpler,” Jack said. “If you’re going to give capabilities to fighter planes, they need to be operational by the sailors, marines, soldiers, and airmen who actually use those capabilities.”
Machine learning (ML) and automation can also improve edge computing processing times.
“Machine learning is right around the corner for us. “With that comes the burden of, ‘After this, how do we keep the rhythm to the accelerating pattern?’ Machine learning, as you know, has a certain rhythm… it is adaptable. ”
Due to the decentralized nature of the Department of Defense, data is constantly in motion, exposing it to greater cybersecurity risks. To keep edge data safe, Zero Trust is essential to addressing the threat landscape and handling interconnected devices.
“When thinking about tactical edge computing, the key cyber effect we care about is really embracing the right protections, like good encryption, good controls,” Jack said. . “Zero Trust is going to be a key component… This is going to help really solve a lot of these issues. ”