Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: CONTACT colaplug.com TO BUY COCAINE ONLINE IN Tourcoing

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

1876

Payment Integrity-Disability Payment Integrity: Advancing Solutions Through Partnership-Highlights of Roundtables

Publication
January 29, 2018
… Candi Waller MITRE recently convened two roundtables on Disability Payment Integrity to improve collaboration on this issue, with a focus on data sharing and analytics. In 1990, … in the aggregate against the salary threshold). It can take time to collect pay stubs and/or contact every employer for details related to earnings, and it can be difficult to obtain … • Accountability via data-driven decision making and performance-linked incentives • Partner buy-in based on the value and benefit to stakeholders exceeding cost and risk, as well as the …

The Hill: Take the Lead in 6G—or Lose It to China

Media Coverage
June 10, 2021
… The Hill: Take the Lead in 6G—or Lose It to China The bad news: If the United States remains on its current trajectory with 5G technology, …

Quantum key distribution information leakage due to backflashes in single photon avalanche photodiodes

Tue, 12/01/2020 - 12:00
Patented
… Quantum key distribution information leakage due to backflashes in single photon avalanche photodiodes Quantum key distribution information …

Quantum key distribution information leakage due to backflashes in single photon avalanche photodiodes

Tue, 05/26/2020 - 12:00
Patented
… Quantum key distribution information leakage due to backflashes in single photon avalanche photodiodes Quantum key distribution information …

AI Trust Gap

… every field. It can enable better, faster analysis of imagery in fields ranging from medicine to national security. But if consumers don’t trust AI, adoption may be limited to … AI’s role in important functions like self-driving cars, government benefits processing, or online health chatbots. Their concerns are understandable. We’ve seen news reports about AI … 100% due to weighting, computer rounding, and/or the acceptance of multiple responses. Please contact media@mitre.org for questions or attribution.       Focus Area Artificial Intelligence …

Post-Quantum Cryptography Coalition Publishes Comparison of International PQC Standards

News Release
September 05, 2024
… of International PQC Standards More than 125 cyber researchers participate in coalition to accelerate PQC adoption in commercial and open-source technologies McLean, Va., and Bedford, … defend itself from quantum-enabled threats to national and economic security.” Data encrypted online with today’s methods can be harvested now for decryption later by an adversary with access … or individuals that wish to participate in the coalition can visit  https://pqcc.org or contact  pqcc-registration-list@mitre.org . About MITRE MITRE’s mission-driven teams are …

Developing on the Net: Dealing with Software Vulnerabilities

Publication
August 01, 2001
… However, an overlooked flaw in their web server application version allowed a hacker to insert a series of “..” sequences into an URL which allowed the hacker to make the web server … Those with commercial interests want to be hired to find the mistakes or they want you to buy their tools to help you find the vulnerabilities and exposures yourself. They offer their … web site Insecure.Org Online Vulnerability Database database Ernst & Young’s eSecurityOnline.com ICAT Metabase free web site NIST Bugtraq mailing list Database mailing list database …

Gaining Leverage Over Vendor Lock to Improve Acquisition Performance and Cost Efficiencies

Publication
April 01, 2014
… Gaining Leverage Over Vendor Lock to Improve Acquisition Performance and Cost Efficiencies Virginia Wydler During the acquisition … decline in a competitive 3 Intellectual Property Rights Law Change, http://www.taftlaw.com/news/publications/detail/872-dod-issues-final-rule-on-ownership-of- … in post-award in order to continually examine prices and price creep under a firm-fixed-price contact. The Program Office should consider the following areas: IR&D cost sharing, IP ownership, …

Intelligence After Next: Federal Chief Data Office Survey Analysis—Traits of Model Programs and Common Areas of Strengths

Publication
March 14, 2023
… around data. Empowering and investing in the CDO provides the opportunity for agencies to tackle this problem. MITRE recently conducted a survey of Chief Data Officer (CDO) … artifacts are essential communication tools that can help challenged CDOs secure leadership buy-in – which may in turn secure the additional resources that help enhance the impact the CDO … A. Toncheva, “Fifth Annual CDO Survey,” Gartner, March 26, 2020. [Online]. https://www.gartner.com/en/documents/3982574 7. MITRE, Chief Data Officer (CDO) Role, Responsibilities and Office …

A Business Case Study of Open Source Software

Publication
July 01, 2001
… Systems." This paper analyzes the business case of open source software. It is intended to help Program Managers evaluate whether open source software and development methodologies are … The open source model builds open 10 For more information on Perl, visit http://www.perl.com/pub. 11 Raymond, Eric, “The Cathedral and the Bazaar,” O’Reilly Associates, 1999. xiv … life-cycle supportability. The maintenance burden of OSS can be similar to xviii pure COTS (“buy”), custom code (“build”), or lie somewhere in between. Unmodified OSS can be considered …
  • First page
  • Previous page
  • …
  • Page 5
  • Page 6
  • Page 7
  • Page 8
  • Current page 9
  • Page 10
  • Page 11
  • Page 12
  • Page 13
  • …
  • Next page
  • Last page
Displaying 81 - 90 of 1876
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links