Interoperability

Ask anyone who has responded to a natural or manmade disaster and they will tell you, these events create the mother of all non-predictive inter-agency mashups. The multitude of agencies responding from outside of the incident area creates a need for hyperlocal services that assist in navigation, but also enable the finding and discovery of resources in the affected area of operation that can be...

Read More

The origins of the Blueforce platform began with a singular and simple mission set: Enable warfighters and first responders to leverage their mobile compute devices to quickly form secure human workgroups in order to respond to a rapidly evolving incident. Blueforce delivered this in 2012 in the form of BlueforceTACTICAL for Android which enabled self-synchronization of location, shared ground intelligence, and the fusion and movement...

Read More

It's that time of year. Every fire season, millions of acres across the world burn during wildland fire events. Worse, between 2000 - 2019 alone, more than 400 wildland firefighters lost their lives fighting these fires while protecting civilians, homes, and forests. While the hazards faced on the fire line can include burnovers/entrapments, heat-related illnesses and injuries, smoke inhalation, vehicle-related injuries (including aircraft), slips, trips,...

Read More

Mosaic system tenants that relate to time constrained decision environments increase survivability while enabling rapid adaptation for the good guys, and creating complexity and uncertainty for the adversary through the rapid composition and recomposition of disaggregated IoT sensors and AI swarms.   A mosaic approach treats threat as a "complex adaptive system" and leverages low-cost manned and unmanned swarming formations, flexibly networked and rapidly configured to...

Read More

Blueforce has been working diligently over the last six months on our new BlueforceTACTICAL and BlueforceEDGE ports to Linux. Much of our work has been in developing next generation Blueforce Plugins for the Linux platform that support and extend capability to shrink the footprint, but also the Space, Weight, and Power (SWaP) requirements such that the code can run on “System on Chip” containers, but...

Read More

Exciting times indeed.  Our partnership with Wilcox Industries, Samsung, Providence UK, Tactical Equipements FR and VARSPEX (CA) plus active international engagement pushes Blueforce rapidly into global markets as we add new service providers, value added resellers, and technology partners. With these partnerships comes expansion into new geographies, here in the United States, but also globally. With these new geos comes the need to support a...

Read More

Blueforce helps cut through the onslaught of perishable edge IoT data by enabling collections of human, silicon, and AI endpoints that interact with the physical world with sense-making across the collective. Our new BlueforceLINUX IoT fusion platform was built to enable swarm intelligence in a soldier worn form factor and is optimized for CUBIC/DTECH's full line of tactical edge compute form factors, and screams on...

Read More

Blueforce was founded with the idea that through our technology, we could have a positive impact on the world. Our products are created to enable organizations doing important things to keep their people safe and have the information that they need to make better informed and faster decisions to accomplish their missions and their goals. When we were approached by Tim Harry, owner of Severance...

Read More

Situational awareness is a critical component for Incident Commanders making life and death decisions in time constrained environments. As the internet has matured, and public safety IoT/sensors are deployed, the commander now has access to a wide array of data that transcends mere location and map markups. With this proliferation of public safety sensors, drones, robotics, and now smart city infrastructure, the commander has an ever...

Read More

Despite rapid advances in weapon-mounted digital optics, target acquisition through-the-optic, classification, and identification have changed very little. It comes down to the operator visually acquiring a target and assessing its friend/foe affiliation and threat potential. This “tried and true” methodology is vulnerable to several points of failure. The foremost vulnerability is reliance on the operator’s ability to classify and identify the target, which may appear...

Read More