Fusion

It has been called many names: distributed cloud, fog computing, and 4th generation data center, but with the impending mass deployment of 5G a variant of distributed cloud is more commonly referred to as "multi-access edge computing" or "MEC". The idea behind MEC is to deliver compute, bandwidth, and micro services much closer to the end user and IoT devices for faster and more informed...

Read More

Squishy Robotics and Blueforce Development Corporation are working to integrate our technologies to provide an improved user interface (UI) experience for our customers by enabling the data obtained from Squishy Robots to be displayed and shared on the Blueforce software platform. Blueforce, which is based in Newburyport, Massachusetts, provides advanced sensor fusion/data sharing capabilities for enhanced tactical decision support and situational awareness. At present, the Squishy...

Read More

Sensitive site exploitation (SSE) missions are often conducted far forward and without the luxuries of time and assured security. Analysis of site information has traditionally required network backhaul which has often proved elusive in electronic warfare-contested or space-contested operational environments. Even under ideal conditions, onsite forces face difficult challenges of making sense from, the volume, variety, and velocity of data encountered. Teams need to collect...

Read More

By John Black, Vice President—Federal, Blueforce Development Corp. An Eye-opening Moment and Genesis of S2S-AI Rapid Prototyping Next week, at the Wilcox Industries Range Day at SHOT Show, outside Las Vegas, Blueforce will provide a live fire demonstration of Sensor-to-Shooter Artificial Intelligence (S2S-AI), a proof-of-concept of IoT data fusion, applied to a sniper scenario, one year after its inception. On a sunny day, last January on the...

Read More

Zello PTT Launches as First Tactical PTT Plugin for BlueforceTACTICAL and BlueforceCOMMAND Land mobile radio (LMR) systems, featuring public safety-grade radios and infrastructure, have been the historical "go-to" technology for military and first responders for mission-critical voice and "push to talk" (PTT) communications. For decades, PTT in the military and first responder sectors was provided exclusively by agency-owned LMR systems. All of that is changing. Mature...

Read More

A Blueforce advisor told us very early on that to truly understand customer pain and the very problems we hoped to solve with our technology, we had to "live a week in the breach". So we did, and we continue to do so. We spend many, many weeks each year deployed alongside of intelligence analysts, far forward commanders, door kickers, CBRN responders, EOD, investigators, undercover...

Read More

General Stanley A. McChrystal (RET) will likely go down in history as a fundamental change agent in how we think about and organize to counter a very different 21st century threat model. His success in the US Special Operations Command (SOCOM) was rooted in seeing our enemies as decentralized and autonomous fighting forces. They are not bound by treaty nor institutional rules of engagement, but...

Read More

Blueforce Announces General Availability of BlueforceEDGE Azure IoT Plugin for Real-Time Stream Analytics Our industry talks a lot about the importance of information, but what often goes missing is any consideration of the PERISHABILITY of information. That is, some bits of data have a shelf life measured in minutes and hours, where other bits hold value for days, months, and even years. Blueforce chose to innovate...

Read More

Sensitive Site Exploitation (SSE) has become a core focus given the potential for executing special operations missions in or near sites suspected of manufacturing, storing, or supporting weapons of mass destruction (WMD) to include chemical, biological, radiological, and nuclear (CBRN). A generation ago, regimes with access to these munitions were limited to developed and relatively stable nation states. However, the operating environment has drastically changed,...

Read More

Counter-terrorism operations take so many shapes across the national security landscape.  We have been there first hand, from Iraq to the African continent, to New York City.  Our heros in New York City present one way, while our friends who jump into new found tunnels on the border present another.  Our participation in Military Working Dog programs and how they leverage our technology never ceases...

Read More