“Cloud” Shows Promise during Navy Trident Warrior

Cloud computing: A data-centric business model

By G C Network | October 3, 2015

According to the National Institute of Standards and Technology: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers,…

John Mayer At Dell World 2015!! (Oh, I’ll be there too.)

By G C Network | September 30, 2015

An artist who defies all boundaries, John Mayer has won seven Grammy Awards and sold more than 17 million albums worldwide. The singer, songwriter and guitarist’s skills have been widely…

Data-centric Security: The New Must Have

By G C Network | September 23, 2015

Where is your data right now? The explosion of cloud computing and consumer IT means that your data, as well as data about you, can be virtually anywhere.Having your data and the…

Personal email:Pathway to Cybersecurity Breaches

By G C Network | September 14, 2015

As a business communications tool, email is the dominant option, and many corporations have policies that allow the use of personal email on corporate computers. In a recent Adobe Systems…

IEEE Cloud Computing: Legal Clouds

By G C Network | September 11, 2015

The new issue of IEEE Cloud Computing is now available!   This special issue looks at how to balance privacy with legitimate surveillance and lawful data access. Some of the…

Cloud hosting: Look beyond cost savings and weigh pros, cons

By G C Network | September 3, 2015

Is your company struggling with the idea of using “cloud hosting” in order to save money? Truth be known, using cost savings as the primary reason for moving to cloud…

“Cloud First” Lessons Learned from ViON

By G C Network | August 25, 2015

In 2011, then United States CIO Vivek Kundra released the US Federal Cloud Computing Strategy [1]. In the executive summary he pointed to cloud computing as a key component of…

Looking for Security Peak Performance?

By G C Network | August 19, 2015

You can find it at Dell Peak Performance 2015!!! I’ll be there at the Aria Resort and Casino in Las Vegas attending as a social media correspondent with a full…

The Cybersecurity Sprint: Are we safe yet?

By G C Network | August 7, 2015

UPDATE: NBC News reports U.S. officials have disclosed a hack of the Pentagon’s Joint Staff unclassified email system, which took place on July 25. Recent unauthorized access to a U.S. government database…

Cloud Computing + Things = “Information Excellence”, Not IoT

By G C Network | July 31, 2015

The Internet of Things (IoT) has quickly become the next “be all to end all” in information technology. Touted as how cloud computing will connect everyday things together, it is…

Last month as part of the Navy’s annual Trident Warrior exercise, Dataline, LLC successfully demonstrated that a standard shipboard communications infrastructure could be used to manage a commercial cloud infrastructure-as-a-service (IaaS) platform. Presented during the fall Trident Warrior ’10 (TW ’10) lab period, Dataline’s Secure Cloud Computing experiment used a simulated shipboard infrastructure to demonstrate secure access to selected collaboration and geospatial information service (GIS) applications. The purpose was to validate the ability of a commercial Infrastructure as a Service (IaaS) platform to support Department of the Navy (DON) requirements for global connectivity, server failover and application access. For this portion of the exercise, Dataline used the Amazon EC2 IaaS platform. The experiment also used SecureParser® as part of the Unisys Stealth architecture to provide “data-in-motion” security. Applications used included Oracle Beehive, ERDAS Apollo and the Joint Forces Command (JFCOM) developed Transverse collaboration suite. LCDR Caroline Lahman, Officer-in-Charge Navy FORCEnet San Diego, was pleased with the results noting a desire to continue these cloud computing experiments as part of the spring lab period.

Cloud Musings

During a recent interview, Robert Carey, Navy Chief Information Officer, also stated that cloud computing offered real value to the Navy. Citing that both the Navy Next Generation Enterprise Network (NGEN) and Consolidated Afloat Networks and Enterprise Services (CANES) programs will leverage cloud computing, he envisioned a future day when “Grey clouds” within a ship’s hull would eventually transition to clouds within the battle group. The increased IT efficiency delivered through cloud computing would also enhance mission accomplishment by making more resources available for investment into naval mission platforms (ships and planes). Mr. Carey sees ready access to authoritative data from the cloud as an important enabler to a real-time/near real-time decision making process, saying that the cloud delivers the ability to have a ubiquitous computing environment and interoperability. After observing the experiment, SPAWAR representatives showed similar sentiments, saying that the Navy was actively considering the use of cloud computing technologies as part of its Naval Networks Enterprise-2016 strategy

Trident Warrior ’10 is scheduled to continue with a second lab period in the spring 2010 and an at sea demonstration period after that.

For further information on the Trident Warrior lab based experiments, please contact LCDR Caroline Lahman (caroline.lahman@navy.mil ).


( Thank you. If you enjoyed this article, get free updates by email or RSS – KLJ )

Performancing Metrics

Performancing Metrics

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

1 Comments

  1. Anonymous on November 23, 2009 at 8:10 pm

    Interesting to see Amazon Web Services and Amazon EC2 start to pennitrate DoD…