Digital Infrastructure Creation with Tactical Cloudlets
Abstract:
Todays edge users are increasinglyequipped with mobile computing andcommunications technology that enablesthem to share data and access complexapplications such as facial recognitionand language translation. Sincecomputational power and battery powerare limited, these mobile devices typicallyreach back to external resources such ascloud resources or data centers to supportthe needed capabilities. But in an austereenvironment such as the aftermath ofa tsunami, or a hostile environmentsuch as the center of an insurrection,access to these remote resources maybe compromised, degraded, or disabled,severely limiting access to the neededcapabilities.
Security Markings
DOCUMENT & CONTEXTUAL SUMMARY
Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release
RECORD
Collection: TRECMS