Distributed Sensing

Smartphones and tablets are increasingly becoming a core computing platform for public safety. Moore's Law is alive and well specific to mobile compute with smartphones that are now faster than the mid-1980's Cray-2 Supercomputer. With the promise of FirstNet upon us, as well as hybrid cloud cognitive services that extend to the palm of your hand, the intelligent edge is here and the impact to...

Read More

A Blueforce advisor told us very early on that to truly understand customer pain and the very problems we hoped to solve with our technology, we had to "live a week in the breach". So we did, and we continue to do so. We spend many, many weeks each year deployed alongside of intelligence analysts, far forward commanders, door kickers, CBRN responders, EOD, investigators, undercover...

Read More

Announcing BlueforceEDGE Image Recognition Plugin for superior decision support in time stressed and contested environments The increasing speed of unpredictable and chaotic events collapses the tactical decision space for military commanders and first responders. Forward sensor fusion with edge-based processing accelerates recognitional decision making by widening the decision-maker’s aperture to a greater number of sensor inputs and a wider array of sensor types. Cognitive computing tools...

Read More

Blueforce, like most companies, works to attract a Board of Advisors. These are folks that have served in tactical and leadership positions in the markets we want to pursue. One of our most important mentors was a former Marine who was a senior executive in Donald Rumsfeld's (SecDef) Pentagon. He insisted that for Blueforce to really understand the challenges, we had to "spend a week...

Read More

By Bill Gellman, Blueforce Development Corporation Blueforce was founded with the mission to enable organizations to make better decisions faster at what we refer to as the “tactical edge”. The tactical edge is where the rubber meets the road and might be simply defined as the area or areas where the action is happening. With roots in national security, we often think of this in terms...

Read More

John Boyd, a Korean War U.S. Air Force pilot and subsequent military strategist, has been front and center in how we at Blueforce have thought about and designed software for use by our national security and public safety decision makers. During the Korean War, Boyd wanted to understand why the F-86 Sabre was so dominant in shooting down the Russian MiG-15. He quickly discovered that...

Read More

You and almost everyone you know carry a smart device. By 2020, some reports estimate that globally there will be approximately 20 billion smart devices in use. What’s the connection? Must be the voice communications, right? Or perhaps it’s the real-time internet access that we crave. Many of us already rely on smart devices for social interaction, connectivity, and business intelligence. These days, you and...

Read More

Not a week goes by without someone asking us if we are the "Blue Force Tracker" people. We are not. We named the company as Blueforce Development Corporation because all of the folks on our team share a common purpose in building rapidly adaptable technology for all blue force (the good guys) in all national security and public safety sectors. Yet, we do understand the...

Read More

General Stanley A. McChrystal (RET) will likely go down in history as a fundamental change agent in how we think about and organize to counter a very different 21st century threat model. His success in the US Special Operations Command (SOCOM) was rooted in seeing our enemies as decentralized and autonomous fighting forces. They are not bound by treaty nor institutional rules of engagement, but...

Read More

Sensitive Site Exploitation (SSE) has become a core focus given the potential for executing special operations missions in or near sites suspected of manufacturing, storing, or supporting weapons of mass destruction (WMD) to include chemical, biological, radiological, and nuclear (CBRN). A generation ago, regimes with access to these munitions were limited to developed and relatively stable nation states. However, the operating environment has drastically changed,...

Read More