logo

Blueforce Sidecar

The Blueforce Sidecar features new video content, media coverage, and more. Check back regularly for updates.

Distributed Sensing

By Bill Gellman, Blueforce Development Corporation Blueforce was founded with the mission to enable organizations to make better decisions faster at what we refer to as the “tactical edge”. The tactical edge is where the rubber meets the road and might be simply defined as the area or areas where the action is happening. With roots in national security, we often think of this in terms...

Read More

John Boyd, a Korean War U.S. Air Force pilot and subsequent military strategist, has been front and center in how we at Blueforce have thought about and designed software for use by our national security and public safety decision makers. During the Korean War, Boyd wanted to understand why the F-86 Sabre was so dominant in shooting down the Russian MiG-15. He quickly discovered that...

Read More

You and almost everyone you know carry a smart device. By 2020, some reports estimate that globally there will be approximately 20 billion smart devices in use. What’s the connection? Must be the voice communications, right? Or perhaps it’s the real-time internet access that we crave. Many of us already rely on smart devices for social interaction, connectivity, and business intelligence. These days, you and...

Read More

Not a week goes by without someone asking us if we are the "Blue Force Tracker" people. We are not. We named the company as Blueforce Development Corporation because all of the folks on our team share a common purpose in building rapidly adaptable technology for all blue force (the good guys) in all national security and public safety sectors. Yet, we do understand the...

Read More

General Stanley A. McChrystal (RET) will likely go down in history as a fundamental change agent in how we think about and organize to counter a very different 21st century threat model. His success in the US Special Operations Command (SOCOM) was rooted in seeing our enemies as decentralized and autonomous fighting forces. They are not bound by treaty nor institutional rules of engagement, but...

Read More

Sensitive Site Exploitation (SSE) has become a core focus given the potential for executing special operations missions in or near sites suspected of manufacturing, storing, or supporting weapons of mass destruction (WMD) to include chemical, biological, radiological, and nuclear (CBRN). A generation ago, regimes with access to these munitions were limited to developed and relatively stable nation states. However, the operating environment has drastically changed,...

Read More

Counter-terrorism operations take so many shapes across the national security landscape.  We have been there first hand, from Iraq to the African continent, to New York City.  Our heros in New York City present one way, while our friends who jump into new found tunnels on the border present another.  Our participation in Military Working Dog programs and how they leverage our technology never ceases...

Read More

Recent terrorist attacks and active shooter incidents have shared a common similarity: 100's of armed responders from many agencies descending on the scene to help neutralize the situation. With that comes not only a radio interoperability problem, but a command interoperability problem. Blueforce products were specifically designed to enable secure “small unit swarming”, an ability for responders from diverse agencies, to rapidly form responder networks...

Read More

Laws are not enforced from a desk. They are enforced out in the world on our streets and highways by brave men and women who face unpredictable and constantly evolving threats. The Blueforce Mobile Command & Control solution leverages Blueforce’s patented mobile and sensor fusion technology and Microsoft’s powerful Azure platform to provide the law enforcement community with an operational advantage, enabling better informed and...

Read More

Blueforce is proud to announce that we have been named one of the "Top 10 Homeland Security Solution Providers" by CIOReview magazine.  In a world dominated by asymmetric threats, a split second’s delay in command decision can drive the success or failure of a mission. In such a scenario, ensuring that the right person at the right time receives actionable information is essential for mission...

Read More