The Technology Behind the Expedition2

Artificial intelligence and drones are empowering researchers with next-level data on the health of our oceans. Intel® Movidius™ and Xeon® technology is delivering actionable, real-time data in the field, making data collection more efficient, more relevant, and more powerful. Learn more about how the technology is changing the face of whale research.

Identifying Whales in the Wild

Identifying Whales in the Wild

A custom drone is used to do two things: capture biological samples from a whale that can be used to genetically profile the animal and test for illnesses, such as infections; and capture video footage of the whales themselves. The video is downloaded in real-time to an Intel® Core™ i7 brand powered laptop on the ship, equipped with an Intel® Movidius™ Neural Compute Stick (NCS) that uses machine learning algorithms to match the patterns on the whales (or its “fingerprint”) to a database, identifying individual whales in real-time.

Learn more about Intel® Movidius™ brand

Assessing Real-Time Health Data

Assessing Real-Time Health Data

The same technology that identifies the whale is used to assess the animal’s health in real-time. A Xeon-powered machine processes the whale footage collected by drone, delivering volumetric data which tells us the animal’s length, weight, and the overall health of the animal compared to its pod.

Learn more about Intel® Xeon® powered machine processes

Learn More About the Expedition

Parley* SnotBot is a collaborative mission to gather data from whales and the oceans using transformative, non-invasive technology tools like modified drones that collect the blow, or snot, exhaled from whales when they surface to breathe, and artificial intelligence to analyze the results in real time. See the story of the scientists and Intel technologists who are changing the face of marine research.

Product and Performance Information


Samples and footage collected under NMFS permit #18636.


Intel® technologies' features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at

*Other names and brands may be claimed as the property of others.