Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Situational Awareness

Here at Blueforce, we think back just ten years ago and the state of personal computing at the time. We were fresh out of Iraq and post-9/11 and simple gamecam capabilities could run a DoD unit upwards of $80,000 a sensor. Military and emergency management groups alike have long been keen for sensors that can be left behind if need be. Ones that are inexpensive...

Read More

It is most assuredly not our parent's world. We suddenly find ourselves in a new phase in the global threat environment which has implications to our critical infrastructure, our schools, and our businesses. Cybersecurity remains a concern, but our physical security in our personal and professional lives is now front and center. Recent attacks and attempted attacks internationally present a diverse and non-predictable threat environment. IT...

Read More

Microsoft Band 2 is what one would expect from Microsoft.  It is not a single faceted device that merely sends steps or heartbeats.  It also has the ability to receive commands from third party applications via a well documented API, and of course, the Microsoft approach to "platform" shines through.  Blueforce committed very quickly to building for this platform.  The band can serve as a...

Read More

It is most assuredly not our parent's world. We suddenly find ourselves in a new phase in the global threat environment which has implications to our critical infrastructure, our schools, and our businesses. Cybersecurity remains a concern, but our physi-cal security in our personal and professional lives is now front and center. Recent attacks and attempted attacks internationally present a diverse and non-predictable threat environment. Businesses...

Read More

By John Chier, Director, Corporate Communications, Kyocera   At Kyocera, we believe that not all rugged devices are created equal. Our DNA is rooted in creating mobile devices that offer a unique blend of toughness, performance and affordability, and we feel we have a leg up when it comes to providing field workers the best durable mobile solutions. A big part of our success in rugged...

Read More

The beauty of being human is that most of us live our lives believing the best in others and that life will be normal and predictive. We expect that things are always orderly and too often, that events that suddenly break the mold of normalcy, aren't as bad as we might want to consider. Our brain is predisposed to assume that things will carry on...

Read More

The intelligence community has been warning for some time about “home made” explosive and chemical weapons, many of which can be fashioned from materials bought at Home Depot or the local pool supply store. Fast forward to Saturday March 14, 2015 when leaders in the semi-autonomous Kurdish region in Iraq provided the Reuters news organization with soil and clothing samples taken by the peshmerga from...

Read More

Nothing is more frightening than asymmetric threats that involve the use of chemical, biological, radiological, and nuclear (CBRN) agents by non-nation state actors. Deployed tactical teams are increasingly being exposed to CBRN threats, including terrorist attacks with non-conventional means and where threats involve large quantities of toxic industrial chemicals, all posing severe hazards to deployed forces. A lack of warning and reaction time is a...

Read More

Blueforce DC METRO Field Day is quickly approaching. No Powerpoint. No lectures. Just a day of "hands-on" with leading-edge emergency management, first responder, law enforcement, and counter-terrorism technologies. The event is sponsored by Blueforce Development, Tech Data, Sprint, and Mac Business Solutions. "Track 2" will feature “Sensing Platforms for WMD/CBRNE” and will demonstrate the latest in technology for mobile curtains of WMD sensing plus shared...

Read More

You know it's bad when you are driving south against a 120-mile rolling backup of vehicles which are headed north.  There are fights at the gas stations.  When Blueforce was asked to pre-deploy with our emergency communications gear to Jefferson Parish in the hours before Hurricane Gustav was to come ashore, we beat the storm by a mere 60 minutes and bunked at a courthouse...

Read More