Cloud computing is currently entering the fight. Literally

  • Press
The current security situation in the world is accompanied by the rapid introduction of modern technologies into all military structures. Deployable cloud computing is one of these technologies.
Cloud computing is currently entering the fight. Literally

Technological innovation in the defence sector

In the past, we have witnessed that many technological innovations that we take for granted today began to be developed in the defense and space industries and were only later transformed into civilian applications. For example, the Internet, which is an integral part of our lives today, was created in the 1960s as a project funded by an agency of the US Department of Defense. The Cold War significantly stimulated the research and development of military technologies in the given period, so many innovations were created specifically for military purposes and only later found application in the civilian sector.

When we look at the world of information technology today, we see the opposite picture – innovation is predominantly found in the commercial sector.  Many experts state that it takes around thirty years for a new technology to become mature and developed enough to be used for defence purposes. And it is this time milestone that cloud technologies, which began to be deployed more massively in the commercial world roughly a decade ago, are approaching today. 

Cloud computing on the battlefield

Increasing amounts of data are being generated on the modern battlefield. Reconnaissance drones are equipped with powerful cameras, satellites take detailed pictures of the terrain, radars continuously monitor the airspace, and all this data needs to be processed in the shortest possible time and relevant information provided to the command in order to make quick and high-quality decisions. Having technology that can store data, process it and share it in real time is a necessity today.

In the mainstream world, cloud computing can do it all. However, the military environment places a huge emphasis on security, reliability and resilience in harsh environments. And it adds an extra feature – the ability to function without any connection to the world. And, of course, there are requirements specific to the modern battlefield environment, such as high mobility, building distributed command posts that are not concentrated in a small area, and low electromagnetic emissions from equipment that could be intercepted by the enemy.

The combination of these needs creates requirements for unique solutions using cloud and edge computing along with resilient hardware. To illustrate the use of cloud computing in the military, we can imagine the following scenario of a modern military operation where cloud technologies are used in the form of a so-called tactical cloud.

In the first phase, i.e. the preparation and planning phase, the operational requirements to which the deployable information systems must adapt are known. To give a simple idea, this is similar to planning IT systems when setting up a new small business. In addition to software and applications, you need servers, cabling, internet connectivity, routers and switches. For military purposes, however, all such hardware must be highly rugged and portable.  Even in the harshest conditions, its job is to provide the necessary computing power to run the applications that soldiers will use on the ground during a planned military operation. At this stage, IT specialists classically prepare the aforementioned devices so that all applications for the needs of a given operation are installed on them. But in the cloud era, this process can be significantly easier and automated. Instead of manually installing and configuring each device, the user selects the package of applications and services from the cloud catalogue that best meets the operational requirements. These are deployed automatically, configuration takes place and then all technology is ready for use.

In the second phase, the prepared tactical cloud devices will be deployed to the operation. The equipment is brought into the field, command posts with small mobile datacenters are built, and soldiers on the ground bring the tactical cloud endpoint equipment into operation. With cloud technologies, there is no need to do complex configurations and installations. Even a Soldier with basic IT knowledge can handle system commissioning.  If changes need to be made to the application suite, all the user has to do is select a different operating scenario in the system, and a new suite of applications and IT services are deployed with a single click. The automation platform takes care of everything without the need for manual intervention by the servicing military personnel. The equipment in the field is also able to establish a connection with the base, for example via satellite, and receive and send data directly from the operation. If problems arise during the course of the operation, remote technical assistance can be requested if a link is available. The link also allows the command to monitor the status of equipment connected to the tactical cloud, keeping an overview of the situation at lower levels and reacting more quickly to changes or catching cyber threats or malfunctions early. After a military operation is conducted, the equipment is disconnected, disassembled and taken back to base for maintenance and any repairs. Everything is then ready to be re-deployed for the next operation.

Efficiency and adaptability

The use of cloud technologies has its importance not only in the commercial sector, but also in the armed forces. In addition to reducing the technical complexity by automating a number of previously manual tasks, it also brings new opportunities to process data directly in the field and not overwhelm the decision-making process with a quantum of information. Cloud computing in the form of tactical cloud brings high efficiency and flexibility of information technologies to the battlefield. The ability to adapt to changing conditions is now a key capability of modern security forces of any state.

SOURCE: TREND