"How 5G and AI Are Creating an Architectural Revolution"

The Intel Federal CTO Steve Orrin and the Dell Federal CTO Cameron Chehreh have discussed the bottom-up transformation of IT by the fifth generation of wireless technology 5G and how this revolution will impact security. 5G will enhance the digitization of everyday life as it offers higher bandwidth, increased capacity, lower latency, and more. This next generation of mobile internet connectivity will help improve the delivery of content-rich services such as 4K video and immersive augmented reality to smart devices. 5G can also make Machine-to-Machine (M2M) communications possible for enterprises. The transformation of raw data into real-time insights by applications leveraging Artificial Intelligence (AI) and Machine Learning (ML) will also be underpinned by 5G. It is essential to explore how 5G's dynamic, software-defined architecture can be secured. 5G security must cover not only data but also AI algorithms. Therefore, 5G-enabled architecture calls for a new security paradigm that takes on a risk-based approach in which the whole data lifecycle is considered. Risk-based security should encompass design, procurement, the supply chain, the development process, and more. This article continues to discuss how 5G is expected to transform IT from the bottom-up, how these changes will affect security, and what approach should be taken to secure 5G-enabled architecture. 

NextGov reports "How 5G and AI Are Creating an Architectural Revolution"

 

Submitted by Anonymous on