Digital Infrastructure Creation with Tactical Cloudlets

reportActive / Technical Report | Accesssion Number: AD1128012 | Open PDF

Abstract:

Todays edge users are increasinglyequipped with mobile computing andcommunications technology that enablesthem to share data and access complexapplications such as facial recognitionand language translation. Sincecomputational power and battery powerare limited, these mobile devices typicallyreach back to external resources such ascloud resources or data centers to supportthe needed capabilities. But in an austereenvironment such as the aftermath ofa tsunami, or a hostile environmentsuch as the center of an insurrection,access to these remote resources maybe compromised, degraded, or disabled,severely limiting access to the neededcapabilities.

Security Markings

DOCUMENT & CONTEXTUAL SUMMARY

Distribution Code:
A - Approved For Public Release
Distribution Statement: Public Release

RECORD

Collection: TRECMS
Subject Terms