Uncovering Multiple Use Cases for Edge Computing at Alamo ACE

Uncovering Multiple Use Cases for Edge Computing at Alamo ACE

CIS Secure attended the Alamo Cybersecurity Exposition (ACE), hosted by the Alamo, Texas Chapter of AFCEA. In a year of hit-or-miss conferences in terms of attendance and enthusiasm, Alamo ACE delivered an inspired ending to 2025. The show focused on communications technology and management with topics including cyber operations, mission assurance and secure technology innovations. And in that vein, the words “AI” and “transformation” were on everyone’s lips.

Creating a spectacle at the CIS Secure booth.

cis booth at Alamo Ace 2025For this show, we brought along our Portable High Density Server Kit and, with its blinking lights flashing, it drew a lot of attention on the floor. The HD Server Kit packs a suite of computing capabilities, a 16-core Intel server, WAN and WiFi capabilities and red and black routers, all in a portable case.

The HD Server Kit (like other CIS Secure comms kits) is a powerful tactical tool for bringing C4ISR capabilities to the edge. With ideas swirling from the energy on the conference floor, booth visitors envisioned smart use cases that are possible today and bring AI and on- and off-line computing power to remote and tactical missions:

  • Deploying LLMs at the edge: The HD Server Kit can run multiple LLMs simultaneously, providing advanced capabilities wherever the kits are deployed. By replicating functionality from your data center and going offline, you’ll have powerful AI capabilities at the front lines that can’t be jammed, hacked or otherwise accessed.
  • Comms Unit for Operational Continuity: One of the booth visitors was preparing to exercise their Continuity of Operations (COOP) plan and various disaster recovery scenarios. By placing the HD Server Kit in their Humvees, the team can maintain online connectivity and operational readiness even in contested environments.
  • Battlefield Data Analytics: Data analytics is increasingly vital on the battlefield, supporting predictive models and drone swarming to inform decisions like troop deployment and resource allocation. Because this often depends on a data center connection, which can be disrupted in contested environments, users can offload critical data analytics models onto CIS Secure Kits. These kits can replicate each other, ensuring COOP, even if a critical connection is lost.

If you’d like to discuss these use cases and others, please contact us for a conversation of how CIS Secure ensures mission security and agility at the tactical edge.