logo

Blueforce Sidecar

The Blueforce Sidecar features new video content, media coverage, and more. Check back regularly for updates.

Counter-Terrorism

No matter what the public safety networks look like in 20 years, they are sure to have core capabilities grounded in location-based services.  A critical component of any successful rescue operation is time.  Decision cycle time can be optimized by having the precise location of buildings, core services, emergency service resources, and disaster relief sites. This information is critical to disaster relief teams and public...

Read More

Ask any soldier or first responder and they will tell you of the importance of shared tactical video for decision-making during edge operations. Drones can now be cued to launch in real-time for overwatch. Military working dogs routinely carry low light infrared imagers that enable off-leash shared awareness for what the dog sees even though he is 200 meters forward. Video is core to intelligence...

Read More

Much like military conflict, manmade and natural disasters present similar challenges of uncertainty, complexity and variability. These time-constrained and chaotic decision environments require rapid adaptation and an ability to pivot quickly to changes in the environment. The complexity of the event, coupled with time compressed decision space and the severity of the potential consequences, creates conditions that are unforgiving of error. Given the austere and...

Read More

Blueforce has been working diligently over the last six months on our new BlueforceTACTICAL and BlueforceEDGE ports to Linux. Much of our work has been in developing next generation Blueforce Plugins for the Linux platform that support and extend capability to shrink the footprint, but also the Space, Weight, and Power (SWaP) requirements such that the code can run on “System on Chip” containers, but...

Read More

Squishy Robotics builds rapidly deployable mobile sensing robots for disaster rescue, remote monitoring and space exploration. With a rich history of building technology for NASA, Squishy technology is at the fusion of robotics, mobile sensing, machine learning, big data fusion and smart IoT (Internet of Things). Blueforce Founder and CEO Michael Helfrich recalls that a common friend of both companies brought Squishy and Blueforce together. “Both...

Read More

Blueforce helps cut through the onslaught of perishable edge IoT data by enabling collections of human, silicon, and AI endpoints that interact with the physical world with sense-making across the collective. Our new BlueforceLINUX IoT fusion platform was built to enable swarm intelligence in a soldier worn form factor and is optimized for CUBIC/DTECH's full line of tactical edge compute form factors, and screams on...

Read More

Distributed sense-making from K9 and military working dog sensor arrays deployed on Blueforce designed harness systems.  Learn more about Integrated K9 Operations for Special Tactics Teams using Blueforce, as broadcast on the Discovery Channel. ...

Read More

Blueforce's new EDGEbox for Linux will Ship With Recognitional Plugins Given the tempo of operations and the collapsed decision space presented by increasingly non-predictive threats, we continue to hear a common refrain: decision makers want nothing to do with a big data problem when on target, or at an incident site. The “Commander” is too often drowning in data, yet desires an explicit collision of “sense-making”...

Read More

Situational awareness is a critical component for Incident Commanders making life and death decisions in time constrained environments. As the internet has matured, and public safety IoT/sensors are deployed, the commander now has access to a wide array of data that transcends mere location and map markups. With this proliferation of public safety sensors, drones, robotics, and now smart city infrastructure, the commander has an ever...

Read More

Despite rapid advances in weapon-mounted digital optics, target acquisition through-the-optic, classification, and identification have changed very little. It comes down to the operator visually acquiring a target and assessing its friend/foe affiliation and threat potential. This “tried and true” methodology is vulnerable to several points of failure. The foremost vulnerability is reliance on the operator’s ability to classify and identify the target, which may appear...

Read More