Filters
Date Range
Contacts
Tag Schemes
|
Description and data downloaded from DRECP Website: http://www.drecp.org/meetings/2012-07-25-26_workshop/background/Department_of_Defense_Materials/This information and data is provided in support of the Desert Renewable Energy Conservation Plan. Attachment 1 provides a Department of Defense (DoD) comprehensive matrix detailing potential military operational constraints by Development Focus Area. Attachment 2 provides associated conflict maps by renewable energy technology. Regarding the color coding:·        The red areas represent locations where there is a high likelihood of unacceptable risk to national security, and then technology identified might impact military operations, testing and training.Â...
Description and data downloaded from DRECP Website: http://www.drecp.org/meetings/2012-07-25-26_workshop/background/Department_of_Defense_Materials/This information and data is provided in support of the Desert Renewable Energy Conservation Plan. Attachment 1 provides a Department of Defense (DoD) comprehensive matrix detailing potential military operational constraints by Development Focus Area. Attachment 2 provides associated conflict maps by renewable energy technology. Regarding the color coding:·        The red areas represent locations where there is a high likelihood of unacceptable risk to national security, and then technology identified might impact military operations, testing and training.Â...
Description and data downloaded from DRECP Website: http://www.drecp.org/meetings/2012-07-25-26_workshop/background/Department_of_Defense_Materials/This information and data is provided in support of the Desert Renewable Energy Conservation Plan. Attachment 1 provides a Department of Defense (DoD) comprehensive matrix detailing potential military operational constraints by Development Focus Area. Attachment 2 provides associated conflict maps by renewable energy technology. Regarding the color coding:·        The red areas represent locations where there is a high likelihood of unacceptable risk to national security, and then technology identified might impact military operations, testing and training.Â...
|
|