Today we have Steve Orrin, Federal CTO at Intel Corporation
in the studio. The discussion starts
with the assumption that the security stack sits on hardware, then moves on to
concepts like artificial intelligence and the DoD.
His logic about hardware should resonate with federal
information technology professionals.
For example, if you are making a transition to the cloud and you have a
stack of tools to control access, this grouping of tools will have to sit on a
server that has a hardware processor as the foundation. If the code behind the chip is compromised,
then anything that sits on it will be compromised as well.
Secondly, edge computing is putting more emphasis on remote
servers. If analysis and permission will
be discerned by a group of tools sitting a remote server, then the risk is
transferred to other hardware as well.
During the interview, Steve reviews the five concepts that
the DoD has used to guide its strategy with the emphasis on use cases, scaling,
as well as ethics.
Intel has positioned itself at the center of the discussion
of applied artificial intelligence.
Steve reinforces the idea that AI isn’t a “one size fits all.” The
end user should ask questions like is your hardware platform at the edge? Is
your application in a low power environment?
Do you collect data and then aggregate to the cloud?
Visualization means getting the right information to the
decision maker. It means building in the
infrastructure to enable you go get the correct information. What data was used to train that system?