Deep-dives into building DuckDB extensions, the Cursor-on-Target protocol, ATAK deployments, real-time geospatial pipelines, and TAK ecosystem security. Hosted by the tak-cot-sender project team.
The origin story behind tak-cot-sender. We cover the DuckDB extension C++ API, how to register scalar functions and table functions, the CMake build system for community extensions, and the design decisions that shaped the current architecture.
Everything you wanted to know about CoT but were afraid to ask. We dissect the XML schema, walk through every field of the <event> element, explain MIL-STD-2525B type strings, and show how TAK Clients interpret incoming CoT messages on the map.
Practitioners share how ATAK and TAK Server have been deployed in real scenarios: military training exercises, wildfire incident command, search-and-rescue coordination, and border security operations. What works, what breaks, and how tak-cot-sender fits in.
How to combine DuckDB's spatial extension with tak-cot-sender to stream GeoJSON, shapefiles, GPX tracks, and PostGIS query results directly to ATAK as live CoT markers. We cover coordinate reference systems, geometry simplification, and bounding box queries for area-of-interest filtering.
Connecting live sensor feeds β GPS trackers, drone telemetry, AIS vessel transponders, vehicle CANbus data, weather stations β to TAK via DuckDB SQL pipelines. We walk through polling loops, the cronjob extension, error handling strategies, and how to tune your stale timeout to match sensor update rates.
A technical deep-dive into TAK network security. How TAK Server CA works, issuing and rotating client certificates, mTLS handshake mechanics, common misconfiguration pitfalls, and how tak-cot-sender's tak_configure_tls() integrates with your PKI. Includes a live demo of certificate rotation without dropping the connection.