Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

MITRE Proposes a National Strategy for Digital Health

Impact Story
May 18, 2021
… Strategy for Digital Health Mike Murphy This year could be a significant inflection point in our nation’s health and public health history. An urgent "Call to Action" from MITRE and its Health Advisory Committee brings attention to a new draft national … Action ” and the full draft of the national strategy , including steps to achieve the goals. Contact us to deliver feedback on the draft document or schedule a discussion. MITRE Proposes a …

MITRE Appoints Gerald Gilbert a MITRE Fellow

News Release
January 07, 2021
… MITRE Appoints Gerald Gilbert a MITRE Fellow Gilbert to expand MITRE’s impact in quantum innovation. McLean, Va., and Bedford, Mass., January 7, 2021 —MITRE named Gerald … industry to tackle challenges to the safety, stability, and well-being of our nation. Media contact: media@mitre.org MITRE Appoints Gerald Gilbert a MITRE Fellow Emerging Technology …

Cyber Risk Metrics Survey, Assessment, and Implementation Plan Report

Publication
May 11, 2018
… Generation Cyber Infrastructure Apex program, identifies existing metrics and surveys related to cybersecurity and provides a plan to gather feedback from the financial services sector … reflect official DHS opinion or policy. For more information about this publication contact: Homeland Security Systems Engineering & Development Institute The MITRE Corporation 7515 … Quantifying the risk of loss from cyber attacks,” December 2014. http://www.beckstrom.com/uncategorized/cybervar-quantifying-risk-loss- cyber-attacks/ 6. Black, P. E., Scarfone, K., …

Critical Infrastructure Cyberspace Analysis Tool (CICAT™)

Thu, 02/03/2022 - 12:00
Copyrighted
… represent critical infrastructure or cyber physical systems. CICAT uses attack path analysis to identify attack paths within the infrastructure between specified entry points and targets, … for Windows, Linux, and MacOS. Interested in licensing CICAT for your organization’s use? Contact Us . … MITRE’S CICAT™ PUT MITRE ATT&CK TO WORK FOR YOUR ORGANIZATION WITH THIS MODELING … | Component Description: Schneider M221 PLC CVE-2018-7792 URL: https://www.schneider- electric.com/en/download/document/SEVD-2018-235-01/ CVE-2018-7789 URL: …

National Cybersecurity FFRDC

… Cybersecurity FFRDC National Cybersecurity FFRDC Securing systems for an interconnected world. IN THIS SECTION NCF Leadership Contact the Team News & Insights Fact Sheet Read more about the Cybersecurity FFRDC Download Our … NIST and cyber-community stakeholders, NCF develops practical, unbiased, real-world solutions to protect critical infrastructure and improve threat detection, response, and recovery. Our …

Distributed Object Computing (DOC) Security: Paradigms and Strategies

Publication
May 01, 1999
… describes the status of distributed object computing (DOC) security. It proposes a strategy to enable evolution to more secure DOC systems and secure interoperability among different DOC … 3.4.1 Conceptual Stratum 25 3.4.2 Architectural Stratum 26 3.4.3 Implementation Stratum 27 4 COM, DCOM, and COM+ 28 4.1 COM Motivation and Background 28 4.1.1 Architectural Overview 29 4.1.2 … the host from. Thus, while RMI calls may be made by any foreign or local host who knows how to contact the server and which possesses the appropriate stub and skeleton interfaces, the security …

Ready for Takeoff: Mobile Technology Helps Streamline Departure Flows

Impact Story
August 09, 2019
… Ready for Takeoff: Mobile Technology Helps Streamline Departure Flows Pilots sometimes have to wait in a long queue on the airport surface before getting clearance for departure. A MITRE-developed … with their customers when planning their departure times," Johnson says. MITRE brought Pacer online at Las Vegas in June, and the FAA plans for GA operators at the airport to begin using the …

Adaptive Time-Critical Resource Management Using Time/Utility Functions

Publication
April 04, 2004
… completion time. With TUF time constraints, timeliness optimization criteria can be specified in terms of accrued activity utilities. Such utility accrual (or UA) criteria facilitate design … an application activity as an applica­ tion/ situation-specific function of that activity’s com­ pletion time. With TUF time constraints, timeliness optimization criteria can be specified … implies that completing the activity before the deadline implies the accrual of some “utility” to the system and that utility remains the same if the activity were to complete anytime before …

Theater Battle Management Core System: Lessons for Systems Engineers

Publication
December 01, 2007
… and oversight, coupled with strong pressure for rapid deployment, caused the program to fail its first operational tests and actually delayed its deployment to the field. Theater … products and systems made it impossible to establish a system baseline and to test TBMCS in realistic conditions. Thus, significant problems manifested themselves only during official …

System Evolution in the Intelligent Enterprise: An Historical Case Study of VISA's Transaction Processing Systems

Publication
January 01, 2007
… Intelligent enterprises need systems which evolve well. Systems will increasingly be expected to evolve to meet users' changing needs, and predicting user demand is becoming more inexact. … as the account number can be stored in another form: written down on paper, retrieved by the online ordering system, or even memorized by the customer. While it seems unlikely that a … Rights Reserved. References Belight Software, Business Card History, http://www.belightsoft.com/ products/composer/history.php Brooker, Katrina. Just One Word: Plastic, Fortune, Time Inc. …
  • First page
  • Previous page
  • …
  • Page 74
  • Page 75
  • Page 76
  • Page 77
  • Current page 78
  • Page 79
  • Page 80
  • Page 81
  • Page 82
  • …
  • Next page
  • Last page
Displaying 771 - 780 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links