logo

Blueforce Sidecar

The Blueforce Sidecar features new video content, media coverage, and more. Check back regularly for updates.

Cognitive Services

After Action Reports (AAR) may be one of the most important tools in emergency management and counter-terrorism operations. When used as a critical component of an agency's tactics, techniques, and procedures (TTP), AAR's can be an important litmus test which questions our assumptions about threats, which ultimately impacts training, mitigation, and response. Blueforce was used extensively over the entire Macys Thanksgiving Day parade route and...

Read More

Force protection (FP) is a multi-dimensional pursuit, incorporating many operational concepts including prescribed personnel TTPs and multiple technology areas. The scope of facility-based FP spans a wide spectrum of activities directed toward the protection and management of personnel, assets, facilities and real property, crossing multiple functional, organizational and security domains. Security, surveillance, and intrusion detection are integrated into force protection, but their resources and infrastructure...

Read More

Joint All-Domain Command & Control (JADC2) is the DoD initiative to replace the current domain and control systems with one that connects the existing sensors and shooters and distribute the available data to all domains (sea, air, land, cyber, and space) and forces that are part of the U.S. military. The goal is to move to a system that connects every sensor and shooter, providing...

Read More

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

When an organization has IoT sensors, surveillance equipment, and even information technology gear deployed to far flung locations across the world, driving to a location to reset a router or a camera can take hours. Arcanum Africa, a Blueforce Platinum reseller based in South Africa, experiences these exact challenges with deployed security equipment as well as counter-poaching technologies designed to protect wildlife. What's needed is...

Read More

With mass shootings on the rise in the United States, efforts to better understand, prevent and deter active shooter incidents are becoming the norm. There is now a heavy focus on helping organizations, agencies, and schools to implement change to prevent loss of life and decrease response time. Although every active shooter scenario varies, there is a similar pattern: the attacker gains access to a...

Read More

The Internet of Things (IoT), by definition, is a wide array of "things" that can connect and exchange data over a network. This "network" can take many forms to include the "big" internet, an enterprise network, and in most places where we work, a closed network "bubble". The reality is that once many organizations begin to leverage "sensing", it becomes clear very quickly that exchanging...

Read More

The internet of things (IoT) is revolutionizing the way we live and work. By connecting devices and sensors to the internet (and/or our private networks), we are able to collect and analyze incident and environmental data like never before. This data can be used to cue and orchestrate various actions and processes, which in turn enhances operational efficiency while positively impacting life safety. IoT V1 was...

Read More

Multi-variant sensing and cueing largely speaks to physical sensors interacting with each other (even sensors from disparate manufacturers) at high speeds to derive meaning and minimize “false positives”.  Adding privacy-assured artificial intelligence, in the form of cognitive services, provides additional precision for threat detection and mitigation. Recognitional support and stream analytics is an essential component of a multi-tiered approach to identify a security and/or safety...

Read More

Digital Workflows triggering Emergency Instructions via Samsung MagicINFO-enabled Displays and Axis Public Address Speakers Every day, our physical and digital worlds become increasingly intertwined, presenting opportunity for investments in a future of continuous and lasting change. This is true of Smart Cities, but also Safe Schools and Smart Campuses. This digitalization of the cyber-physical world is especially promising for schools to realize opportunities and overcome challenges...

Read More