Operation Golden Phoenix

The Endpoint Imperative: In a Software World, Hardware Does Matter

By G C Network | January 9, 2018

Hardware matters. From productivity to security to innovation, make sure your machines can keep up. Intel’s Sarah Wieskus joins The End Point Imperative: A Podcast series from Intel to discuss…

IT Transformation with Watson

By G C Network | January 5, 2018

Credit: Shutterstock by Kevin Jackson & Dez Blanchfield   IBM recently launched an exciting new project in the form of a podcast series produced and hosted Dez Blanchfield, appropriately titled the…

The Endpoint Imperative: A Form Factor Renaissance

By G C Network | December 22, 2017

Workplace expectations are changing, and along with them, the devices we use to do our jobs. In this episode of “The End Point Imperative”, Intel’s Sarah Wieskus tells us about…

Cloud Storage 2.0 Set To Dominate Market

By G C Network | December 19, 2017

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from…

Top “Cloud Musings” Posts For 2017

By G C Network | December 17, 2017

    ( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud…

The Endpoint Imperative: ID’ing and Overcoming the Stumbling Blocks to Digital Transformation

By G C Network | December 6, 2017

Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices.…

Industry Verticals Tackle Unstructured Data

By G C Network | December 1, 2017

  Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email,…

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

By G C Network | November 27, 2017

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.…

The Data Storage Explosion

By G C Network | November 25, 2017

Cloud computing innovation will power enterprise transformation in 2018.  Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity.…

Digital Transformation Drives Mainframe’s Future

By G C Network | November 15, 2017

  Digital Transformation is amplifying mainframe as mission critical to business growth more than ever before. With 70% of the world’s corporate data and over half of the world’s enterprise…

This week, Dataline is participating in Operation Golden Phoenix. Operation Golden Phoenix is a four-day multi-agency collaborative training event designed to assist federal, state and local agencies with large and complex incident response scenarios. The exercise implements FEMA’s concept of an all-hazards approach to emergency management fostering every level of government to partner to achieve common goals. It’s designed to integrate emergency management planning into mainstream policy-making and operational systems. The lead agency for Golden Phoenix ’08 is U.S. Customs and Border Protection. Many national and international participants and observers from over 100 federal agencies will attend. These include DHS, DOD (U.S. Navy), DEA, FBI, DOJ, DOE, Marine Corps Reserve, California National Guard, NGOs and industry partners.

During the exercise, a backpack-sized, Dataline solar powered mobile communications kit (https://www.dataline.com/products.htm) will be used to provide multi-path access to a MEDWEB (https://www.medweb.com/) telemedicine infrastructure. This will be a field test of the communications kit that features mobile, fast, reliable, secure communications capabilities over multiple WAN technologies as a telemedicine tool. During the exercise, patient registration tracking and triage system with subspecialty telemedicine reach back capabilities, and HL7/DICOM integration will be demonstrated.

This exercise is an example of how cloud computing techniques and infrastructures can be use to improve mission effectiveness in the national security arena. Successful deployment and employment of this type of capability in a joint DoD/DHS cloud can lead the way to enhanced homeland security.

For more on cloud computing in support of national security missions please see Cloud Computing in a Net-Centric Environment.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network