blog

0
108
Tuesday, July 7, 2008

Operation Golden Phoenix

This week, Dataline is participating in Operation Golden Phoenix. Operation Golden Phoenix is a four-day multi-agency collaborative training event designed to assist federal, state and local agencies with large and complex incident response scenarios. The exercise implements FEMA’s concept of an all-hazards approach to emergency management fostering every level of government to partner to achieve common goals. It’s designed to integrate emergency management planning into mainstream policy-making and operational systems. The lead agency for Golden Phoenix ’08 is U.S. Customs and Border Protection. Many national and international participants and observers from over 100 federal agencies will attend. These include DHS, DOD (U.S. Navy), DEA, FBI, DOJ, DOE, Marine Corps Reserve, California National Guard, NGOs and industry partners.

During the exercise, a backpack-sized, Dataline solar powered mobile communications kit (https://www.dataline.com/products.htm) will be used to provide multi-path access to a MEDWEB (https://www.medweb.com/) telemedicine infrastructure. This will be a field test of the communications kit that features mobile, fast, reliable, secure communications capabilities over multiple WAN technologies as a telemedicine tool. During the exercise, patient registration tracking and triage system with subspecialty telemedicine reach back capabilities, and HL7/DICOM integration will be demonstrated.

This exercise is an example of how cloud computing techniques and infrastructures can be use to improve mission effectiveness in the national security arena. Successful deployment and employment of this type of capability in a joint DoD/DHS cloud can lead the way to enhanced homeland security.

For more on cloud computing in support of national security missions please see Cloud Computing in a Net-Centric Environment.

Follow me at https://Twitter.com/Kevin_Jackson

LEAVE A COMMENT

Name*
E-mail*
Phone number*
Your Message

Latest posts

0
147

2018 AT&T Business Summit: Security “in” and “of” the Cloud

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can...

0
89

My Brush with Royalty: Queen Latifah

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius...

0
99

What’s New in Puppet 5?

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration man...

0
117

5 Reasons Why Ansible is the Best CM Tool Out There?

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT org...

0
159

Machine learning APIs for Google Cloud Platform

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP i...

0
108

What Is The Most Important Part of Architecture?

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the desi...

0
1685

Cloud migration best practice Part 4: Executing the migration

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifyin...

0
280

Cloud Migration Best Practice Part 3: Application Portfolio Analysis

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If y...

0
399

Why Use Immutable Storage?

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the wo...

0
778

CLOUD ACT: What Does That Mean for Your Cloud Storage

When Congress names a law after you, it’s getting serious.  That is where we are now with cloud computing.  The Clari...