in ,

DoD Needs ‘Smart Edge’ Infrastructure to Back AI Initiatives; Cameron Chehreh Quoted

DoD Needs ‘Smart Edge’ Infrastructure to Back AI Initiatives; Cameron Chehreh Quoted - top government contractors - best government contracting event
Cameron Chehreh
DoD Needs ‘Smart Edge’ Infrastructure to Back AI Initiatives; Cameron Chehreh Quoted - top government contractors - best government contracting event
Cameron Chehreh

The Department of Defense needs a “smart edge” computing infrastructure to better leverage the capabilities of artificial intelligence and support warfighters at the tactical edge, C4ISRNET reported Wednesday.

The smart edge architecture allows drones, mobile devices and sensors to transmit data and inform AI-based algorithms in real time.

Cameron Chehreh, federal chief technology officer and vice president at Dell Technologies, cited the need to perform the computing process and data analytics “locally” and “in near real time.”

“If you have semi-autonomous drones in the battlefield, you need to be able to run the algorithm at the edge so that it can take defensive maneuvers immediately if necessary,” Chehreh said.

“The platform has to make some real-time decisions and you cannot afford the latency required to send it out to the cloud and back. It has to be able to do that computing at the edge where it sits,” he added.

ExecutiveBiz Logo

Sign Up Now! ExecutiveBiz provides you with Daily Updates and News Briefings about Government Technology

mm

Written by Jane Edwards

is a staff writer at Executive Mosaic, where she writes for ExecutiveBiz about IT modernization, cybersecurity, space procurement and industry leaders’ perspectives on government technology trends.

Gina Gallagher Named VP of Growth at B3 Group - top government contractors - best government contracting event
Gina Gallagher Named VP of Growth at B3 Group
Tenable’s James Hayes: Vulnerability Management Key Step to Cyber Risk Mitigation - top government contractors - best government contracting event
Tenable’s James Hayes: Vulnerability Management Key Step to Cyber Risk Mitigation