Air Traffic Management Set To Meet Cloud Technology

Air Traffic Management Set To Meet Cloud Technology

After revolutionizing domains like industrial design and engineering simulation, cloud computing is now set to drastically modify air traffic management technology.

In a recent proceeding, General Electric Company and National Aeronautics and Space Administration (that’s NASA) have teamed up to undertake a project aimed at incorporating cloud computing into conventional air traffic management solutions. The multi-million dollar arrangement will permit airline personnel and air traffic experts to carry out their usual (and utterly critical) business in an efficient manner.

As an outcome of the project, flight critical real-time information will no longer be the only valuable data presented to air traffic controllers and airline staff. Novel data analytics framework and assessment support tools would also be made readily available, streamlining airport operations, and enhancing overall aircraft safety. According to Liling Ren, project leader at the GE Global Research Division,

“Cloud computing has the potential to fundamentally change how air traffic management operates today. With the transition to it, airlines, pilots and air traffic controllers will be able to achieve increased information exchange, sharing of decision support automation capabilities that tell them more accurately and reliably about a plane’s current position and future flight path.”

GE is confident that the project will lead to improved traffic flow and streamlined route configuration contributing significantly towards seamless, resourceful, and on-time travel for air commuters.

Understanding how air traffic control personnel, airline staff, and cockpit team can coordinate more efficiently within the context of a cloud-powered setup remains the main research question of this project. The traditional air traffic management architecture relies heavily upon systems managed and hosted independently by each of the three sections. However, a cloud-fueled setup would permit the parties to access practically inexhaustible computational resources and storage space. It is speculated that the project would hasten the evolution of air traffic management technology, elevating it to a level that would have taken years without the mighty cloud push.

Cloud endorsement has already directed commercial airlines towards billions of dollars in the form of returns, savings, reduced maintenance expenses, and condensed operational costs. The concept of fusing cloud computing into air traffic management will continue to bring fiscal gains for the companies. For the passengers, it would mean a superior degree of predictable air travel, both in terms of timeliness and comfort.

In addition, the project would bring GE a step closer to the real-world realization of its ground-breaking initiative—the Industrial Internet. The initiative signifies a disruptive progression in product design and development, a sophisticated network of smart machines that redefine efficacy and operational resourcefulness.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…