Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

December 2016 Federal Big Data Summit Report

Publication
March 29, 2017
… government and academia which are summarized below: Data sharing and collaboration continues to be an important area of development. Policies need to be put in place to allow for simple data … development. Policies need to be put in place to allow for simple data sharing and avenues for com- munication between agencies need to be established for easy access and aggregation of data. … operating environment. The trustworthiness discussion identified the need to have stakeholder buy-in for access control, data sharing, privacy and so forth. This led to consideration of data …

Intrusion Reaction Recommendations for Obtaining Reaction Capabilities

Publication
September 01, 1998
… Reaction Recommendations for Obtaining Reaction Capabilities Leonard LaPadula A growing threat to Air Force networks and computers is exploitative intrusion activity. A growing threat to Air … for Stalker 3.0 by Trusted Information Systems in a 1998 press release, at http://www.tis.com/corporate/press/98/stalker3pr.html (as of October 6, 1998). 16 more than a vendor is willing to risk on speculation13. In a commercial marketplace where enterprises are willing to buy relatively simple detectors, vendors may lack motivation to invest in research and …

NAS Delay Program Emulator

Mon, 01/06/2025 - 12:00
Copyrighted
… and inputs of this technology include: Inclusion and Exemption: Included flights occupy slots in GDP or AFP, while exempt flights receive special handling to minimize delays. Eligible Flight Object: Represents flight attributes, requiring inputs like … on MITRE's NAS Delay Program Emulator technology, or to inquire about licensing opportunities, contact our Technology Transfer Office at techtransfer@mitre.org .   … The NAS Delay Program …

Getting Data to Applications: Why We Fail, How We Can Do Better

Publication
August 01, 2000
… Getting Data to Applications: Why We Fail, How We Can Do Better Arnon Rosenthal Ph.D. Frank Manola Dr. Scott … of "transparent access," making all data available to all consumers (users and applications), in a way the consumer can interpret, anywhere and at any time. Many initiatives, governmental and … It enables progress to be driven by local efforts, which consist mainly of providing thorough, on-line self-descriptions. • Metadata (e.g., self-description) providers must benefit soon from …

The Impact of XML on Databases and Data Sharing

Publication
March 01, 2000
… (eXtensible Markup Language) has received a great deal of attention as the likely successor to HTML for expressing much of the content of the Web. XML (eXtensible Markup Language) has … the tools that support them, we refer the reader to http://w3.org/xml and http://www.xmlinfo.com. 4 Today’s dominant database management systems (DBMS) are broad, mature products that will … 10 [7] A. Gonsalves, L. Pender, “Schema Fragmentation Takes a Bite out of XML”, in PC Week Online, May 3, 1999. http://www.zdnet.com/pcweek/stories/news/0,4153,401355,00.html. [8] J. …

MITRE-Harris Poll Finds U.S. Public Is Worried about the Security of Our Critical Infrastructure

News Release
March 13, 2024
… public agrees, almost universally, that protecting our critical infrastructure is essential to our daily lives, national security, and having a global advantage. With temporary failures of … critical infrastructure, visit  mitre.org/cipic .  About the Survey This survey was conducted online February 13-15, 2024, among 2,046 U.S. adults (ages 18 and over) by The Harris Poll via … help leaders make the best decisions possible. To learn more, please visit  www.theharrispoll.com . About MITRE MITRE’s mission-driven teams are dedicated to solving problems for a safer …

Every James Bond Needs a Q: A Cyber Forensics Expert Assists Law Enforcement Behind the Scenes

Employee Voice
March 21, 2024
… Enforcement Behind the Scenes Catherine Trifiletti Kevin Fairbanks draws on his cyber know-how to build community and help sponsors catch criminals.  When friends and family ask the ever … tools to help catch bad guys.” Due to its sensitive nature, his work often can’t be explained in too much detail beyond that. “Ever since I was a kid, I wanted to be Q from James Bond,” he … of Arizona tapped him to help with a case brought against an individual for child exploitation online.  In his not guilty plea, the defendant claimed his computer was infected with malware …

Arming the Eagle, Outpacing the Dragon: Understanding and Out Competing China’s Defense Acquisition and Innovation System

Publication
June 17, 2022
… System Dan Ward Matt MacGregor "Arming the Eagle" examines the Chinese military’s approach to acquisition & innovation, highlighting their primary strategies for fielding new military … https://asia.nikkei.com/Politics/International-relations/Russia-up-in-arms-over-Chinese-theft-of-military-technology … acquisition roles. For more information about this paper or the Center for Data-Driven Policy, contact policy@mitre.org MITRE’s mission-driven teams are dedicated to solving problems for a …

Designing Glycoprotein Films and Micelles to Capture and Remove Pathogens from Aqueous Suspensions

Publication
July 01, 2012
… Designing Glycoprotein Films and Micelles to Capture and Remove Pathogens from Aqueous Suspensions Elaine Mullen This paper describes … glycoprotein film forms spontaneously when an aqueous solution of glycoprotein comes in contact with a layer or droplet of oil [Mullen, 1998; Mullen, 2003; Mullen, 2006]. Such … of carbohydrate structures to which particular pathogens and lectins are known to bind. This online bioinformatics resource, SugarBindDB [Shakhsheer et al., 2005] compiles and makes …

Tactical Edge Characterization Framework Volume 2: Design Patterns for Tactical Environments

Publication
November 01, 2008
… tactical environments, the current methods of development may not provide reliable capability to users within this environment. In this paper, we propose a method for capturing design … developers to program applications to support an offline mode of operations in addition to the online mode. These solutions work by implementing a local server on the browser side where … of Europe, Globus, Hewlett-Packard, Sonic Software, TIBCO Software, http://www.ibm.com/developerworks/library/specification/ws-notification/, …
  • First page
  • Previous page
  • …
  • Page 70
  • Page 71
  • Page 72
  • Page 73
  • Current page 74
  • Page 75
  • Page 76
  • Page 77
  • Page 78
  • …
  • Next page
  • Last page
Displaying 731 - 740 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links