autonomous agents

If you have been following Blueforce for any amount of time, you know the value we place on open standards. Even more so, standards that are portable between a wide array of compute environments, but also those that are light on the network. We have become quite enamored with REST/JSON given the speed in which it allows stateless inter-connectivity between Blueforce APIs and disparate systems....

Read More

Balancing privacy and public health, while providing real time informatics to detect “viral blooms” in Smart Cities The COVID-19 pandemic has ushered in an era of unprecedented uncertainty. For businesses, the virus has introduced unparalleled issues with business continuity, supply chain disruptions, and employee health. If there is one thing history has shown us, it's that pandemics are known to occur in waves. Infections spike, peak,...

Read More

Whether you are involved in executive protection, campus safety, or manage teams of mobile "lone workers", a fundamental requirement exists to keep track of people and to ensure their safety as they go about their day. BlueforceBEACON is a highly secure software based emergency notification system that provides a safety net. The product delivers location services, secure text communications, covert emergency camera triggering, “listen live”...

Read More

CANTON OHIO: It's home to the Football Hall of Fame, Kent State University, and now Wi-Fiber’s Smart City and Real Time Crime Center, powered by BlueforceEDGE, for distributed gunshot intelligence and more. Wi-Fiber manufactures a best-in-class Smart City Platform which leverages BlueforceEDGE to fuse a wide array of pluggable and dynamically adaptable sensors in the lamp head which include: Lighting control, two-way microphones, speakers, 4K...

Read More

It’s the same kit we have deployed for more than 10 years for border counter-terrorism joint task forces. A kit that is airline checkable (46 lbs; 32" L x 20" W x 9" H) and provides communications, sensor fusion, and a distributed common operating picture that crosses domains, agencies, and networks. More importantly, a kit that isn’t confined to a single vehicle and can be...

Read More

The Pandemic Response Hackathon to hack COVID-19 started this past Friday at 1600P EDT and continues through the weekend. The Pandemic Response Hackathon is a virtual hackathon aimed at better understanding and mitigating the spread of COVID-19 and future pandemics. The goal of the hackathon is to bring public health professionals alongside the technology community’s talent to contribute to the world’s response to the pandemic....

Read More

It has been called many names: distributed cloud, fog computing, and 4th generation data center, but with the impending mass deployment of 5G a variant of distributed cloud is more commonly referred to as "multi-access edge computing" or "MEC". The idea behind MEC is to deliver compute, bandwidth, and micro services much closer to the end user and IoT devices for faster and more informed...

Read More

Squishy Robotics and Blueforce Development Corporation are working to integrate our technologies to provide an improved user interface (UI) experience for our customers by enabling the data obtained from Squishy Robots to be displayed and shared on the Blueforce software platform. Blueforce, which is based in Newburyport, Massachusetts, provides advanced sensor fusion/data sharing capabilities for enhanced tactical decision support and situational awareness. At present, the Squishy...

Read More

Announcing Blueforce Discovery Services V2 plugin for BlueforceEDGE The movie Jurassic Park features an enjoyable scene where Ian Malcom (played by Jeff Goldblum) attempts to explain chaos theory to Dr. Sattler (played by Laura Dern) where he drops a bead of water onto Sattler’s knuckle and shares how “tiny variations, the orientation of hairs on your hand, the amount of blood distending your vessels vastly affects...

Read More

Sensitive site exploitation (SSE) missions are often conducted far forward and without the luxuries of time and assured security. Analysis of site information has traditionally required network backhaul which has often proved elusive in electronic warfare-contested or space-contested operational environments. Even under ideal conditions, onsite forces face difficult challenges of making sense from, the volume, variety, and velocity of data encountered. Teams need to collect...

Read More