Author: Blueforce

Mosaic system tenants that relate to time constrained decision environments increase survivability while enabling rapid adaptation for the good guys, and creating complexity and uncertainty for the adversary through the rapid composition and recomposition of disaggregated IoT sensors and AI swarms.   A mosaic approach treats threat as a "complex adaptive system" and leverages low-cost manned and unmanned swarming formations, flexibly networked and rapidly configured to...

Read More

Blueforce has been working diligently over the last six months on our new BlueforceTACTICAL and BlueforceEDGE ports to Linux. Much of our work has been in developing next generation Blueforce Plugins for the Linux platform that support and extend capability to shrink the footprint, but also the Space, Weight, and Power (SWaP) requirements such that the code can run on “System on Chip” containers, but...

Read More

Exciting times indeed.  Our partnership with Wilcox Industries, Samsung, Providence UK, Tactical Equipements FR and VARSPEX (CA) plus active international engagement pushes Blueforce rapidly into global markets as we add new service providers, value added resellers, and technology partners. With these partnerships comes expansion into new geographies, here in the United States, but also globally. With these new geos comes the need to support a...

Read More

"Power to the Edge" is the name of a book written by Dave Alperts and Richard Hayes which describes a shift in the late 90’s to a threat model that required that we think differently about conflict and threats to our interests. The book describes technology frameworks that can deliver small unit swarming effects in time-collapsed decision environments to more quickly respond to, make sense...

Read More

Blueforce helps cut through the onslaught of perishable edge IoT data by enabling collections of human, silicon, and AI endpoints that interact with the physical world with sense-making across the collective. Our new BlueforceLINUX IoT fusion platform was built to enable swarm intelligence in a soldier worn form factor and is optimized for CUBIC/DTECH's full line of tactical edge compute form factors, and screams on...

Read More

Distributed sense-making from K9 and military working dog sensor arrays deployed on Blueforce designed harness systems.  Learn more about Integrated K9 Operations for Special Tactics Teams using Blueforce, as broadcast on the Discovery Channel. ...

Read More

Blueforce's new EDGEbox for Linux will Ship With Recognitional Plugins Given the tempo of operations and the collapsed decision space presented by increasingly non-predictive threats, we continue to hear a common refrain: decision makers want nothing to do with a big data problem when on target, or at an incident site. The “Commander” is too often drowning in data, yet desires an explicit collision of “sense-making”...

Read More

Blueforce was founded with the idea that through our technology, we could have a positive impact on the world. Our products are created to enable organizations doing important things to keep their people safe and have the information that they need to make better informed and faster decisions to accomplish their missions and their goals. When we were approached by Tim Harry, owner of Severance...

Read More

Situational awareness is a critical component for Incident Commanders making life and death decisions in time constrained environments. As the internet has matured, and public safety IoT/sensors are deployed, the commander now has access to a wide array of data that transcends mere location and map markups. With this proliferation of public safety sensors, drones, robotics, and now smart city infrastructure, the commander has an ever...

Read More

Despite rapid advances in weapon-mounted digital optics, target acquisition through-the-optic, classification, and identification have changed very little. It comes down to the operator visually acquiring a target and assessing its friend/foe affiliation and threat potential. This “tried and true” methodology is vulnerable to several points of failure. The foremost vulnerability is reliance on the operator’s ability to classify and identify the target, which may appear...

Read More