Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Machine Learning

SIX capabilities, powered by Blueforce’s edge IoT technology, that deliver immense capability to our National Security Operators and Organizations. Pervasive sensor technology presents the opportunity for operators to extend their capabilities, share information horizontally, and swarm faster than their adversaries, by communicating with devices that are installed at fixed locations, carried, mounted on manned and unmanned systems, or worn on the body, the latter of which...

Read More

With mass shootings on the rise in the United States, efforts to better understand, prevent and deter active shooter incidents are becoming the norm. There is now a heavy focus on helping organizations, agencies, and schools to implement change to prevent loss of life and decrease response time. Although every active shooter scenario varies, there is a similar pattern: the attacker gains access to a...

Read More

The Internet of Things (IoT), by definition, is a wide array of "things" that can connect and exchange data over a network. This "network" can take many forms to include the "big" internet, an enterprise network, and in most places where we work, a closed network "bubble". The reality is that once many organizations begin to leverage "sensing", it becomes clear very quickly that exchanging...

Read More

Multi-variant sensing and cueing largely speaks to physical sensors interacting with each other (even sensors from disparate manufacturers) at high speeds to derive meaning and minimize “false positives”.  Adding privacy-assured artificial intelligence, in the form of cognitive services, provides additional precision for threat detection and mitigation. Recognitional support and stream analytics is an essential component of a multi-tiered approach to identify a security and/or safety...

Read More

Digital Workflows triggering Emergency Instructions via Samsung MagicINFO-enabled Displays and Axis Public Address Speakers Every day, our physical and digital worlds become increasingly intertwined, presenting opportunity for investments in a future of continuous and lasting change. This is true of Smart Cities, but also Safe Schools and Smart Campuses. This digitalization of the cyber-physical world is especially promising for schools to realize opportunities and overcome challenges...

Read More

Battlefield, disaster response, and public safety sustainment is both an art and science; it’s about synchronizing, integrating, and transporting commodities in a highly “just-in-time” manner to provide maneuver and incident commanders with freedom of action, extended operational reach, and prolonged endurance. As it turns out, the “science” of sustainment is not terribly difficult as it is grounded in basic math and computation, based on real-time...

Read More

For decades now, public safety Land Mobile Radio (LMR) systems have provided a reliable, albeit geographically limited, communications backbone and baseline for related command and control systems for public safety agencies. These legacy LMR systems are often limited to the geographic areas of the agency/agencies being served and, in many cases, there may be multiple public safety LMR systems in the same geographic area using...

Read More

The intelligence community has been warning for some time about “home made” explosive and chemical weapons, many of which can be fashioned from materials bought at Home Depot or the local pool supply store. Fast forward to Saturday March 14, 2015 when leaders in the semi-autonomous Kurdish region in Iraq provided the Reuters news organization with soil and clothing samples taken by the peshmerga from...

Read More

Our nation’s stadiums, arenas, and concert venues host millions of people each year for special events. The majority of these venues will not contend with an extreme emergency during any given year. However, as we have seen in Las Vegas and more recently in Houston, consequences of extreme activity at these events, whether caused by human violence, natural disaster or another factor can be devastating...

Read More

Battlefield, disaster response, and public safety sustainment is both art and science; it's about synchronizing, integrating, and transporting commodities in a highly "just-in-time" manner to provide maneuver and incident commanders with freedom of action, extended operational reach, and prolonged endurance. As it turns out, the "science" of sustainment is not terribly difficult as it is grounded in basic math and computation, based on real-time time...

Read More