Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1877

Transforming Tactical Messaging: Exploiting Web Information Standards for Interoperability

Publication
February 01, 2003
… Miller Dr. Mary Malloy Edward Masek The challenge of interoperability, the ability of systems to exchange services in ways that enable them to work effectively together, has increased with the number of … XML’s pervasiveness, XML-MTF and similar conceptual approaches are gaining developer and user “buy-in” to web-based solutions, increasing the value of these methods in next-generation C2 …

Engineering the Enterprise

Publication
March 01, 2007
… classical "specify and build" approaches commonly employed by government agencies in acquiring individual systems or systems of systems. This paper suggests a way of engineering … of systems. The view presented is that enterprise engineering does not replace or add a layer to classical systems engineering but that it complements classical approaches by shaping the … economy. Great economic analysis skill is needed in deciding how many securities to sell or buy and when, and whether and how much to change reserve requirements, discount and Fed funds …

The Semantic Web and the Role of Information Systems Research

Publication
April 01, 2002
… evolution of the current World Wide Web, and there is much activity surrounding it. However, in spite of the fact that the Web is clearly a large-scale information system, much of the … the traditional database and information systems communities. This workshop has been organized to explore relationships between the Semantic Web (and related enterprise systems) and … one would expect to just build a DBMS and expect eager customers to seek them out in order to buy it. Instead, you'd expect to have to send people out to talk to potential customers and tell …

Breaking Barriers: Revitalizing National Security Supply Chains

Publication
July 30, 2025
… the U.S. must urgently overhaul its national security supply chains. Urgent action is needed to rebuild resilience through integrated planning, digital demand forecasting, expanded strategic … logistics and supply chain challenges that threaten national security and military readiness in the face of near-peer adversaries.  Decades of industrial base atrophy, overreliance on … iii Bryant, Bob. Aircraft Carrier Operations During WW2 | World War II Database. https://ww2db.com/other. php?other_id=49 iv Herman, Arthur, Freedom’s Forge: How American Business Produced …

MITRE and Prelude Announce Partnership to Offer Advanced Cybersecurity for Small and Mid-sized Organizations

News Release
June 14, 2021
… MITRE and Prelude Announce Partnership to Offer Advanced Cybersecurity for Small and Mid-sized Organizations New tools deliver … to operate them, making it difficult to protect themselves against sophisticated adversaries. In recent attacks, like SolarWinds, adversaries gained access to large, well-known organizations … information about a potential partnership with your organization or licensing MITRE IP, please contact the MITRE Technology Transfer Office . About Prelude Prelude Research is a for-profit, …

Going Virtual Can't Hold Back MITRE's 2020 Interns

Student Voice
May 12, 2020
… Kay M. Upham 2020 Summer Interns Eastern Nazarene College student Shante Slender is returning to MITRE for a second internship this summer. She may not be on campus for some time, though. … will be working remotely. Why? Because—regardless of whether the students are at home or in our offices—we can develop students' ability to meet both our and the nation’s future … plans, our interns are showing resilience and enthusiasm for the upcoming summer. "They're online already and coming up with ways to engage and connect with each other," Morris says. As …

Data Integration Needs an Industrial Revolution

Publication
March 01, 2001
… by a distinct community for its purposes, and is largely unusable by others. It is common to see whole data archipelagos comprised of thousands of separate resources [Ston00]. We would, … need metadata, e.g., timestamps, access control lists, lineage, units, accuracy, point of contact, etc., especially for derived values. (Security metadata is needed if the recipient is to … “Integrating Islands of Information”, EAI Journal, Sept 1999.http://www.eaijournal.com/DataIntegration/IntegrateIsland.asp [Vass97] V. Vassalos and Y. Papakonstantinou, “Describing …

MITRE’s Response to the NIST RFI on a National Standards Strategy for Critical and Emerging Technology

Publication
November 06, 2023
… MITRE’s Response to the NIST RFI on a National Standards Strategy for Critical and Emerging Technology MITRE’s … Emerging Technology November 6, 2023 For additional information about this response, please contact: Duane Blackburn Center for Data-Driven Policy The MITRE Corporation 7596 Colshire Drive … increasing awareness and encouraging participation in the process. • Develop centralized online platforms that provide information on SDO activities, tailored to the needs of specific …

Cyber Prep 2.0: Motivating Organizational Cyber Strategies in Terms of Threat Preparedness

Publication
February 01, 2017
… and resilience. Cyber Prep 2.0 is a threat-oriented approach that allows organizations to define and articulate threat assumptions and develop tailored strategic elements. As cyber … References [1] NACD, "Cyber-Risk Oversight: Director's Handbook Series 2014," July 2014. [Online]. Available: http://www.nacdonline.org. [2] NIS , "Framework for Improving Critical … "Cyber Operations Maturity Framework," 16 June 2011. [Online]. Available: http://www.boozallen.com/media/file/Cyber-Operations-Maturity-Framework-viewpoint.pdf. [8] D. Bodeau and R. Graubart, …

Cyber Resiliency Metrics and Scoring in Practice—Use Case Methodology and Examples

Publication
November 04, 2018
… of Cyber Resiliency research project. Cyber resiliency analysis and metrics are sensitive to a wide variety of assumptions about the operational, programmatic, architectural, and threat … for Cyber-Physical Systems, Release 1.0," May 2016. [Online]. Available: https://s3.amazonaws.com/nist- … on frequency of refresh. Enforce clear boundaries on sets of cyber resources 5 Minimize contact between critical and noncritical ECUs Baseline: 1 Firewall at diagnostic port. Firewall …
  • First page
  • Previous page
  • …
  • Page 47
  • Page 48
  • Page 49
  • Page 50
  • Current page 51
  • Page 52
  • Page 53
  • Page 54
  • Page 55
  • …
  • Next page
  • Last page
Displaying 501 - 510 of 1877
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links