C4ISR

Much like military conflict, manmade and natural disasters present similar challenges of uncertainty, complexity and variability. These time-constrained and chaotic decision environments require rapid adaptation and an ability to pivot quickly to changes in the environment. The complexity of the event, coupled with time compressed decision space and the severity of the potential consequences, creates conditions that are unforgiving of error. Given the austere and...

Read More

Ask anyone who has responded to a natural or manmade disaster and they will tell you, these events create the mother of all non-predictive inter-agency mashups. The multitude of agencies responding from outside of the incident area creates a need for hyperlocal services that assist in navigation, but also enable the finding and discovery of resources in the affected area of operation that can be...

Read More

The origins of the Blueforce platform began with a singular and simple mission set: Enable warfighters and first responders to leverage their mobile compute devices to quickly form secure human workgroups in order to respond to a rapidly evolving incident. Blueforce delivered this in 2012 in the form of BlueforceTACTICAL for Android which enabled self-synchronization of location, shared ground intelligence, and the fusion and movement...

Read More

It's that time of year. Every fire season, millions of acres across the world burn during wildland fire events. Worse, between 2000 - 2019 alone, more than 400 wildland firefighters lost their lives fighting these fires while protecting civilians, homes, and forests. While the hazards faced on the fire line can include burnovers/entrapments, heat-related illnesses and injuries, smoke inhalation, vehicle-related injuries (including aircraft), slips, trips,...

Read More

Mosaic system tenants that relate to time constrained decision environments increase survivability while enabling rapid adaptation for the good guys, and creating complexity and uncertainty for the adversary through the rapid composition and recomposition of disaggregated IoT sensors and AI swarms.   A mosaic approach treats threat as a "complex adaptive system" and leverages low-cost manned and unmanned swarming formations, flexibly networked and rapidly configured to...

Read More

Blueforce has been working diligently over the last six months on our new BlueforceTACTICAL and BlueforceEDGE ports to Linux. Much of our work has been in developing next generation Blueforce Plugins for the Linux platform that support and extend capability to shrink the footprint, but also the Space, Weight, and Power (SWaP) requirements such that the code can run on “System on Chip” containers, but...

Read More

Blueforce helps cut through the onslaught of perishable edge IoT data by enabling collections of human, silicon, and AI endpoints that interact with the physical world with sense-making across the collective. Our new BlueforceLINUX IoT fusion platform was built to enable swarm intelligence in a soldier worn form factor and is optimized for CUBIC/DTECH's full line of tactical edge compute form factors, and screams on...

Read More

Distributed sense-making from K9 and military working dog sensor arrays deployed on Blueforce designed harness systems.  Learn more about Integrated K9 Operations for Special Tactics Teams using Blueforce, as broadcast on the Discovery Channel. ...

Read More

Blueforce's new EDGEbox for Linux will Ship With Recognitional Plugins Given the tempo of operations and the collapsed decision space presented by increasingly non-predictive threats, we continue to hear a common refrain: decision makers want nothing to do with a big data problem when on target, or at an incident site. The “Commander” is too often drowning in data, yet desires an explicit collision of “sense-making”...

Read More

Despite rapid advances in weapon-mounted digital optics, target acquisition through-the-optic, classification, and identification have changed very little. It comes down to the operator visually acquiring a target and assessing its friend/foe affiliation and threat potential. This “tried and true” methodology is vulnerable to several points of failure. The foremost vulnerability is reliance on the operator’s ability to classify and identify the target, which may appear...

Read More