Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Cloud SLA Considerations for the Government Consumer

Publication
November 01, 2010
… also must be considered, including the application of proprietary technologies that can lead to service provider lock-in (i.e., significant switching challenges among providers) and limited … a Service (SaaS). They have further defined cloud deployment models as private cloud, shared com- munity cloud, public cloud, and hybrid cloud. Cloud computing presents the Federal … Further Information SLA Context/ Overview The SLA should identify the provider, the consumer, contact information, SLA purpose, and SLA background. Overall, SLAs should be simple, familiar, …

Presentation: Exponential Average

Publication
December 30, 2015
… Dr. Brian Schmidt When making decisions with several measures of success, it's common to combine them into one overall measure using a weighted average, which may cause an Imbalance … measure using a weighted average. Unfortunately, this approach can lead to "optimal" decisions in which some capabilities are overdeveloped while others are neglected. This may be called the … 45 Reach Location 70  We are considering buying one of two upgrades | 7 | Which Should We Buy? Search & Rescue 54 Recv Distress Call 80 Locate Vehicle 20 Plan Resources 45 Reach Location …

Seven Significant Challenges for Federal Leaders Employing SOA

Publication
October 01, 2009
… emerging Service-Oriented Architecture efforts, there are several challenges that will need to be addressed in order to realize the full value of the investment. As Federal leadership … can be leveraged to provide this capability. • SOA enables organizations to technically com- municate and collaborate seamlessly, but it does not ensure that such interoperability will … Governance models handed down to the team are oft en self-defeating if the team does not buy into the model. Th e team needs to see a clear tie between the governance model and improved …

Hawkeye

Copyrighted
… various MITRE Periodic Mobile Forensics enterprise components. Hawkeye uses various mechanisms to speed up the differential comparison of mobile device data. The Hawkeye agent is typically temporarily installed on the mobile device, and the mobile device can operate in “stock” modes during periods of non-Hawkeye use. To discuss licensing or collaboration activities, please contact us . … Hawkeye provides rapid physical acquisition of mobile device storage at a rate at …

Cyber Risk Metrics Survey, Assessment, and Implementation Plan Briefing

Publication
May 11, 2018
… Security Act of 2002 (Section 305 of PL 107-296, as codified in 6 U.S.C. 185), herein referred to as the “Act,” authorizes the Secretary of the Department of Homeland Security (DHS), acting … Knowledge. The Open Group., CA. (Online). ▪ RiskLens. (Online). Available: http://www.risklens.com/ ▪ Hubbard, D.W., and Seiersen, R. (2016). How to Measure Anything in Cybersecurity Risk. … | 13 | (Eric.Harder@hq.dhs.gov) (Gregory.Wigton@hq.dhs.gov) Contact for More Information Dr. Douglas Maughan (Douglas.Maughan@hq.dhs.gov) Cyber Security …

Safety II White Paper: Assessing Resilience and Human Variability Within Aviation Safety

Publication
November 11, 2024
… Kerkoub Gene Lin Ph.D. David McKenney Greg Sizemore New, complementary approaches are needed to improve upon existing FAA safety accomplishments. As the nation's aerospace system becomes … Work as Done WAI Work as Imagined BIBLIOGRAPHY [1] FAA, "FAA Portfolio of Goals," July 2023. [Online]. Available: https://www.faa.gov/sites/faa.gov/files/FY23%20Portfolio%20of%20Goals%20July … or implied, concerning the content or accuracy of these views. For further information, please contact The MITRE Corporation, Contracts Management Office, 7515 Colshire Drive, McLean, VA …

Integrating Large-Scale Group Projects and Software Engineering Approaches for Early Computer Science Courses

Publication
June 01, 2005
… these types of projects, students are given a specific portion of a large programming problem to design and develop. Ultimately, the consolidation of all of the independent student projects … should not decrease the amount of programming reinforcement training offered in the early com- puter science courses. In addition to the work at Georgetown Manuscript received July 30, … in code integration. The instructor suggests that these students be given freedom to contact other students in the final week to make small changes that assist the integration …

Embedded in Systems Engineering: How One Organization Makes It Work

Publication
May 01, 2006
… Moore There is growing interest today in dedicating, or embedding, information professionals to a specific team. There is growing interest today in dedicating—or embedding—information … analyst, my office was two buildings away from the SEPO offices, and I knew only two contact people on the team. My assignments were to update and augment the online library and to … useful Web sites, using a Web tracking program called WatchThatPage (www.watchthatpage.com) and monitoring RSS Feeds using the Bloglines aggregator (www.bloglines.com). The articles I …

MITRE Engenuity Launches MITRE ATT&CK Defender™ Training and Certification

Media Coverage
March 25, 2021
… models and certification products available, cybersecurity professionals are often unable to keep pace with new, emerging threats. To help close this skills gap, MITRE Engenuity has launched MITRE ATT&CK Defender™ to train and certify practitioners in the real-world application of the MITRE ATT&CK® knowledge base.  MAD is a training and … or using ATT&CK to assess SOC operations. Learn more and access the full slate of MAD online training and certifications. MITRE Engenuity Launches MITRE ATT&CK Defender™ Training and …

User Request Evaluation Tool (URET)

Copyrighted
… Tool (URET) was developed by MITRE's Center for Advanced Aviation System Development (CAASD) to assist air traffic controllers with timely detection and resolution of predicted problems. To discuss licensing or collaboration activities, please contact us . … The User Request Evaluation Tool (URET) was developed by MITRE's Center for …
  • First page
  • Previous page
  • …
  • Page 20
  • Page 21
  • Page 22
  • Page 23
  • Current page 24
  • Page 25
  • Page 26
  • Page 27
  • Page 28
  • …
  • Next page
  • Last page
Displaying 231 - 240 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links