Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1799

Data Normalization Challenges and Mitigations in Software Bill of Materials Processing

Publication
October 24, 2024
… For information about workstreams and draft products, contact SBOM@cisa.dhs.gov. https://www.cisa.gov/sbom …

Implementing Bundled Payment: A Case Study of the Crozer-Keystone Health System

Publication
January 01, 2012
… The presence of a payer willing to try bundled payments was instrumental in achieving buy-in for clinical transformation from specialty physicians. 3. Aims and Objectives In its BP … From the outset, CKHS leadership believed that the success of the BP pilot depended on buy-in from and active participation of its physicians. A CKHS executive explained that the … A Case Study of Crozer-Keystone Health System 8 In addition to meetings, CKHS relied on contacts by physician leaders to create awareness and support among their peers. The physician …

MITRE 360 December

MITRE 360
December 18, 2024
… an inclusive work environment. HACKING FOR GOOD Cyber Volunteers Fight Child Exploitation Online Most of the cyber work we do for law enforcement behind the scenes is hush hush (see our … on that). But, as cyber engineer Adam Hammond recognized, the skills we use to catch bad guys online are transferable. He and colleagues launched a volunteer effort coined “ Hackathons For …

The Innovation Landscape and Government’s Future Role

Publication
June 22, 2016
… devices, including sen- sors, actuators, and a host of smart devices, continue to come online. The IoT will not only have a huge impact on the consumer market, these devices will … confidence and assurance that people, organizations, and businesses are who they say they are online. The Identity Ecosystem Steering Group is a private sector-led organiza- tion created to … means. There is an association of a cyber identity with a virtual actor accessing ser- vices online. Most people have multiple cyber identities, each of which has very differ- ent purposes. …

Spectrum Markets and Sharing via Spectrum Consumption Models

Publication
September 19, 2013
… on the use of a spectrum exchange. The exchange collects the offers to sell and offers to buy (bids) for spectrum, determines the winning bid (through a continuous double-auction … propagation map, expected service area location, start time and end time • Bid parameters: Buying price, time window over which the bid is valid In a NOBM scenario, an ask (offer to sell), … of Service Based Spectrum Trading." IEEE Aerospace Conference. http://www.sharedspectrum.com/?section=nsf_measurements; 17 Caicedo Bastidas, Carlos E. 2009. "Technical Architectures and …

MITRE-Harris Poll Survey on Innovation

Publication
January 06, 2022
… be prohibited from paying ransoms to hackers (79%), residents said. This survey was conducted online within the United States between October 5-7, 2021, among 2,037 adults (aged 18 and over) … January 2022 © 2022 MITRE #22-0047 1-6-2022 Research Method Sample Size: n=2,037 Mode: Online survey Field Dates: October 5-7, 2021 Qualification Criteria: U.S. residents Adults Ages …

Getting Data to Applications: Why We Fail and How We Can Do Better(Part 2)

Publication
June 01, 2001
… of—widely used vocabularies (e.g., common terms with agreed meanings) and make them available online. (This is something that eBusiness, health care (HL7), and other consortia are … of systems that are never really "complete," but continually get better. For more information, contact: Arnon Rosenthal Arnie@mitre.org Frank Manola fmanola@mitre.org Len Seligman …

On the Beat: Techniques for Capturing and Sharing the Exchange of Ideas

Publication
August 01, 2002
… on the intranet, posting a request on a MITRE email listserv or on the Technical HOTline, contacting knowledgeable staff in Technical Centers and Technology Area Teams (TATs), tapping the MITRE Expertise page of cluster and specialty groups, searching for online documentation in Project Share and the MITRE Catalog, and searching for published … understand and assess the needs and interests of her customer group, providing face-to-face contact with them, and helping to promote the availability and competencies of the Knowledge …

Recommendations to Support Staffing Decisions

Publication
July 24, 2014
… available for our use include employees’ availability over a six-month period as well as their contact information, job level, organization within MITRE, location, and scheduled hours. We have … tool. Project leaders looking for staff were asked to enter electronic job requisitions in an online system separate from our recommender. Although a tag field exists in the requisition form, … of employees that might be good candidates for a particular position. They then followed up by contacting these employees to determine interest, and to interview those that were. We are in the …

Voice Signature (Voice Sig)

Copyrighted
… technology, public key encryption, and symmetric key encryption. Voice Sig is easy to use, incurs minimal back-end infrastructure costs, can be used virtually anywhere, and requires little or no training. In addition, it can also be used by multiple signers who are either co-located or geographically … technology, public key encryption, and symmetric key encryption. Voice Sig is easy to use, incurs minimal back-end infrastructure costs, can be used virtually anywhere, and …
  • First page
  • Previous page
  • …
  • Page 18
  • Page 19
  • Page 20
  • Page 21
  • Current page 22
  • Page 23
  • Page 24
  • Page 25
  • Page 26
  • …
  • Next page
  • Last page
Displaying 211 - 220 of 1799
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links