logo

Blueforce Sidecar

The Blueforce Sidecar features new video content, media coverage, and more. Check back regularly for updates.

autonomous agents

You and almost everyone you know carry a smart device. By 2020, some reports estimate that globally there will be approximately 20 billion smart devices in use. What’s the connection? Must be the voice communications, right? Or perhaps it’s the real-time internet access that we crave. Many of us already rely on smart devices for social interaction, connectivity, and business intelligence. These days, you and...

Read More

Blueforce Announces General Availability of BlueforceEDGE Azure IoT Plugin for Real-Time Stream Analytics Our industry talks a lot about the importance of information, but what often goes missing is any consideration of the PERISHABILITY of information. That is, some bits of data have a shelf life measured in minutes and hours, where other bits hold value for days, months, and even years. Blueforce chose to innovate...

Read More

Sensitive Site Exploitation (SSE) has become a core focus given the potential for executing special operations missions in or near sites suspected of manufacturing, storing, or supporting weapons of mass destruction (WMD) to include chemical, biological, radiological, and nuclear (CBRN). A generation ago, regimes with access to these munitions were limited to developed and relatively stable nation states. However, the operating environment has drastically changed,...

Read More

Counter-terrorism operations take so many shapes across the national security landscape.  We have been there first hand, from Iraq to the African continent, to New York City.  Our heros in New York City present one way, while our friends who jump into new found tunnels on the border present another.  Our participation in Military Working Dog programs and how they leverage our technology never ceases...

Read More

Blueforce is proud to announce that we have been named one of the "Top 10 Homeland Security Solution Providers" by CIOReview magazine.  In a world dominated by asymmetric threats, a split second’s delay in command decision can drive the success or failure of a mission. In such a scenario, ensuring that the right person at the right time receives actionable information is essential for mission...

Read More

Blueforce Development technologies have been a cornerstone for border counter-terrorism joint task forces (JTF) since 2009 here in the United States and OCONUS.  Our sensor fusion technology, found in both BlueforceEDGE and BlueforceTACTICAL, enables sensors from disparate manufacturers to be fused into a single stream of data, enabling the coveted single pane of glass common operating picture.  You can see it in action here in...

Read More

When law enforcement responds to a scene, they face a large number of unknowns.  A scene that initially seems calm, can quickly escalate to one of extreme violence.  Those seconds where escalation begins can be of extreme importance to other responding units.  What has been missing, until now, is a connected solution that leverages telemetry data from firearms, combined with tactical edge information sharing, to...

Read More

A core premise at Blueforce is the practice of rapid adaptation. Our national security customers face digital age adversaries that adapt tactics frequently. This requires an ability for the "good guys" to adapt as fast and as frequently. At Blueforce, we practice highly agile and lean product development methods which allows us to ship new capability AND innovation quickly (often in mere days). Customer feedback and...

Read More

Law enforcement officers need to stay connected and be able to access critical information quickly and easily. Microsoft, together with Blueforce, provides combined solutions that empower officers to better serve and protect, and still allow a choice of mobile devices and sensors that both fit the needs of the agency and officers. Mobile phones running Blueforce Tactical can be used to share and receive photos,...

Read More

Instant and Immediate Discovery of People, Sensors, and Information Services to Improve Operational Efficiency Today's threats and the way that our adversaries fight look very different than in decades past. Asymmetric threats rule the security landscape and with them come chaos and non-predictiveness. Asymmetric techniques often involve tactics that many might call "dirty fighting" which can include operational and strategic surprise and destruction in unanticipated ways....

Read More