Valiant Angel – A Perfect PED Application for Cloud Computing

A group of people standing in front of a large screen.

2018 AT&T Business Summit: Security “in” and “of” the Cloud

By G C Network | November 10, 2018

While public cloud is undoubtedly an outsized piece of the conversation, news headlines of the latest data breach can make this move a very frightening proposition. The question of how…

A group of people standing in front of a display.

My Brush with Royalty: Queen Latifah

By G C Network | November 9, 2018

Queen Latifah! Hip Hop Icon. Movie Star. Television Star. Fashion Model. Songwriter. Producer. Entrepreneurial Genius!? YES! Dana Elaine Owens, her given name, is co-owner of Flavor Unit Entertainment, a firm that includes…

What’s New in Puppet 5?

By G C Network | November 9, 2018

Puppet 5 is released and comes with several exciting enhancements and features that promise to make configuration management much more streamlined. This article will take a comprehensive look at these…

5 Reasons Why Ansible is the Best CM Tool Out There?

By G C Network | November 9, 2018

Amidst volatile markets, dynamic technology shifts, and ever-increasing customer demands, it is imperative for IT organizations to develop flexible, scalable and high-quality applications that exceed expectations and enhance productivity. A…

Machine learning APIs for Google Cloud Platform

By G C Network | November 9, 2018

Google Cloud Platform (GCP) is considered to be one of the Big 3 cloud platforms among Microsoft Azure and AWS. GCP is widely used cloud solutions supporting AI capabilities to design and…

What Is The Most Important Part of Architecture?

By G C Network | November 9, 2018

I always find it interesting to hear what people view architecture as. A lot of people think it’s just about the design aspect, where you get to put pen to…

Cloud migration best practice Part 4: Executing the migration

By G C Network | September 16, 2018

This series has stepped through cloud migration best practices. After providing an overview, we discussed: Classifying business-critical data. Updating organizational IT governance policies. Application screening and cloud workload selection. How to…

Cloud Migration Best Practice Part 3: Application Portfolio Analysis

By G C Network | September 16, 2018

In part three of this series on cloud migration best practice, I will focus on migrating the application itself. If you haven’t had the opportunity to read our recommendations from part…

Why Use Immutable Storage?

By G C Network | September 11, 2018

Data has become a global currency, and its value has nowhere to go but up.  According to The Economist online, the world’s most valuable resource is no longer oil, but…

CLOUD ACT: What Does That Mean for Your Cloud Storage

By G C Network | August 31, 2018

When Congress names a law after you, it’s getting serious.  That is where we are now with cloud computing.  The Clarifying Lawful Overseas Use of Data Act or CLOUD Act (H.R. 4943) is…

A few weeks ago in an article title “Why the Cloud? Processing, Exploitation and Dissemination“, I described two instances where the newspaper industry used cloud computing in order to process, exploit and disseminate information. In that article I postulated that this is one reason why the intelligence community is interested in cloud computing.

Well Signal Magazine has recently highlighted a specific program where the DoD could use a similar approach. In a project called Valiant Angel, the Joint Intelligence Laboratory, located at the U.S. Joint Forces Command in Norfolk, Virginia, is working on a way for commanders to handle massive amounts of full-motion video being provided from unmanned platforms.

In addition to storing, moving, communicating and accessing large amounts of data, Valiant Angel is also addressing full-motion video processing, exploitation and dissemination (PED). Col. Chuck Mehle II, USA, commander of the Joint Transformation Command for Intelligence (JTC-I), JFCOM, notes that this aspect of full-motion video management is important because currently different people have different meanings for PED.

“For some, PED might be sticking yellow stickies on a screen after the event happens, and then taking notes about it as the video is displayed to them. But Valiant Angel gives them the capability—the John Madden-type capability—to drop the icon onto that video frame. Let’s say there is an event such as an IED [improvised explosive device] placement or an IED detonation or defusing. Immediately across the Defense Department, intelligence enterprise alerts will go out to those people who subscribe to that type of event, that geographic region, that timeframe, you name it,” he explains.

Such a requirement is perfect for cloud computing. An ability to meet surge storage and computing requirements by securely scaling into a on-demand cloud computing infrastructure could actually make projects like Valiant Angel affordable. Since it would be costly and impractical to buy the equipment needed to meet all possible tactical situations, a platform with an inherent ability to expand into a commercially provided cloud infrastructure could be ideal. It’s very difficult to predict real-time tactical processing, exploitation and dissemination requirements. Cloud computing approaches could definitely provide a better option.

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

5 Comments

  1. Anonymous on April 30, 2009 at 1:50 am

    ^^Thanks!!

    婚前徵信婚姻感情大陸抓姦外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回大陸抓姦離婚工商徵信婚前徵信外遇抓姦感情挽回尋人大陸抓姦離婚家暴工商徵信法律諮詢跟蹤工商徵信婚前徵信感情挽回外遇抓姦法律諮詢家暴尋人大陸抓姦離婚大陸抓姦外遇尋人家暴工商徵信法律諮詢家暴感情挽回大陸抓姦外遇婚前徵信離婚尋人工商徵信外遇抓姦法律諮詢家暴婚前徵信大陸抓姦尋人感情挽回外遇抓姦婚前徵信感情挽回尋人大陸抓姦工商徵信法律諮詢離婚家暴工商徵信外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回大陸抓姦離婚婚前徵信工商徵信外遇抓姦尋人離婚家暴大陸抓姦感情挽回法律諮詢離婚感情挽回婚前徵信外遇抓姦家暴尋人工商徵信外遇抓姦法律諮詢家暴婚前徵信尋人感情挽回">徵大陸抓姦離婚婚前徵信工商徵信外遇抓姦尋人離婚家暴大陸抓姦感情挽回法律諮詢



  2. Anonymous on May 8, 2009 at 12:49 pm

    But Valiant Angel doesn’t have this capability! It’s based on Isilon — at best it does fast ftp of files and has no distributed processing capability beyond what’s available at a single site.



  3. Kevin Jackson on May 8, 2009 at 12:54 pm

    That’s my point! Valiant Angel could probably does much more with a lot less cost if they would leverage a cloud computing infrastructure something like Animoto. See http://kevinljackson.blogspot.com/2008/12/animoto-automated-imagery-ped.html



  4. Anonymous on October 30, 2009 at 6:21 pm

    Do you have any idea how limited bandwidth is in a combat enviroment? How well does cloud computing work in a high latency, low bandwidth infrastructure?



  5. Kevin L. Jackson on October 30, 2009 at 6:35 pm

    During the US Navy Trident Warrior exercise, we've been testing the use of Amazon Web Services over simulated shipboard communications systems and have found the use of cloud computing technologies to be very feasible. These test simulated the high latency, low bandwidth environment found shipboard.