Powered by Deep Web Technologies
Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Prediction of Web Page Accesses by Proxy Server Log  

Science Conference Proceedings (OSTI)

As the population of web users grows, the variety of user behaviors on accessing information also grows, which has a great impact on the network utilization. Recently, many efforts have been made to analyze user behaviors on the WWW. In this paper, we ... Keywords: WWW, data mining, prediction, proxy server log, suffix tree, user behavior

Yi-Hung Wu; Arbee L. P. Chen

2002-05-01T23:59:59.000Z

2

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

3

Lenel OnGuard Access Control Communication Server ...  

Science Conference Proceedings (OSTI)

... 1330 and #1010) • Mercury SCPD_NET.DLL ... Operating Environment Communication Server RSAENH.dll Mercury scpd_net.dll ...

2013-10-01T23:59:59.000Z

4

The Internal Workflow Of The Smart-Data-Server  

E-Print Network (OSTI)

Middle-tier architectures have to fulfill many requirements. These requirements are growing with the different versions of the middle-tier architecture. To allow a flexible extension of the architecture, its design has to be clear and easy so one has not to take care of all the dependencies of the components if a new one is added. In this paper we present the technology of internal workflow programs (IWP's), a specialized flow-chart that makes it easy to add new components to the inner workflow. The definition of IWP's is rather general so that it can be used in different server-architectures. It has been - for instance - implemented in the middleware-platform of the Institute of Telematics, the Smart-Data-Server (SDS) to handle RPC-requests more efficient. KEYWORDS Middle-Tier-architecture, internal control flow, internal data flow 1.

As In Proc; Uwe Roth; Christoph Meinel

2002-01-01T23:59:59.000Z

5

Design and implementation of a direct access file system (DAFS) kernel server for FreeBSD  

Science Conference Proceedings (OSTI)

The Direct Access File System (DAFS) is an emerging commercial standard for network-attached storage on server cluster interconnects. The DAFS architecture and protocol leverage network interface controller (NIC) support for user-level networking, remote ...

Kostas Magoutis

2002-02-01T23:59:59.000Z

6

International Electricity Trade - Open Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

7

Internal Controls Over Sensitive Compartmented Information Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Controls Over Sensitive Compartmented Information Access for Selected Field Intelligence Elements, IG-0796 Internal Controls Over Sensitive Compartmented Information Access...

8

Remote information service access system based on a client-server-service model  

DOE Patents (OSTI)

A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

Konrad, A.M.

1996-08-06T23:59:59.000Z

9

Remote information service access system based on a client-server-service model  

DOE Patents (OSTI)

A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

Konrad, A.M.

1997-12-09T23:59:59.000Z

10

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

11

China: International Trade and WTO Accession  

E-Print Network (OSTI)

This Working Paper should not be reported as representing the views of the IMF. The views expressed in this Working Paper are those of the author(s) and do not necessarily represent those of the IMF or IMF policy. Working Papers describe research in progress by the author(s) and are published to elicit comments and to further debate. China’s increasing integration with the global economy has contributed to sustained growth in international trade. Its exports have become more diversified, and greater penetration of industrial country markets has been accompanied by a surge in China’s imports from all regions—especially Asia, where China plays an increasingly central role in regional specialization. Tariff reforms have been implemented in China since the 1980s; and, with its recent WTO accession, China has committed itself to additional reforms that are farreaching and challenging. Sustained implementation of these commitments would further deepen China’s international integration and generate benefits for most partner countries.

Thomas Rumbaugh; Nicolas Blancher; International Monetary; Fund Wp; Prepared Thomas Rumbaugh; Nicolas Blancher

2004-01-01T23:59:59.000Z

12

International Electricity Trade - Open Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Electricity Trade - International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply to transmission in interstate commerce. DOE has stated this policy in export authorizations granted to entities requesting authority to export over international transmission facilities. In those authorizations, DOE indicated it expected transmitting utilities owning cross-border facilities constructed pursuant to Presidential permits to provide access across the border in accordance with the principles of comparable open access and non-discrimination contained in the Federal Power Act and articulated in Federal Energy Regulatory Commission Order No.

13

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

14

Proposed Open Access Requirement for International Electric Transmission  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Proposed Open Access Requirement for International Electric Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Proposed Open Access Requirement for International Electric Transmission Facilities and Delegation to the Federal Energy Regulatory Commission: Federal Register Notice Volume 64, No. 143 - Jul. 27, 1999 Notice is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of facilities at the international border for the transmission of electric energy between the United States and foreign countries to require permit holders to provide ondiscriminatory open access transmission services. The open access

15

Web Server  

NLE Websites -- All DOE Office Websites (Extended Search)

Primegens Web Server Due to limited computer and human resource, we are unable to continue further support of this Web site at this time. If you like to use Primegens, please sign...

16

THREDDS Data Server  

NLE Websites -- All DOE Office Websites (Extended Search)

THREDDS DATA SERVER (TDS) THREDDS Data Server Catalog Service Overview The ORNL DAAC's Thematic Real-time Environmental Distributed Data Services (THREDDS) Data Server (TDS) serves...

17

Proceedings of the 12th international ACM SIGACCESS conference on Computers and accessibility  

Science Conference Proceedings (OSTI)

Welcome to Orlando for ASSETS'10, the Twelfth International ACM SIGACCESS Conference on Computers and Accessibility. Sponsored by the ACM Special Interest Group on Accessible Computing (SIGACCESS), this conference allows for the gathering of an ...

Armando Barreto; Vicki L. Hanson

2010-10-01T23:59:59.000Z

18

Securing Citrix Presentation Server in the Enterprise  

Science Conference Proceedings (OSTI)

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features ... Keywords: Applied, Computer Science, Computers, Security

Tariq Azad

2008-06-01T23:59:59.000Z

19

Proceedings of the 14th international ACM SIGACCESS conference on Computers and accessibility  

Science Conference Proceedings (OSTI)

On behalf of the ASSETS 2012 Program Committee, it is my pleasure to welcome you to an exciting technical program offered by the Fourteenth International ACM SIGACCESS Conference on Computers and Accessibility. The technical program of 25 podium presentations ...

Matt Huenerfauth; Sri Kurniawan

2012-10-01T23:59:59.000Z

20

World Wide Web Information Servers  

NLE Websites -- All DOE Office Websites (Extended Search)

World Wide Web Information Servers World Wide Web Information Servers Lawrence Berkeley Laboratory recently announced a gopher and World Wide Web site. To get to the web site, telnet to www.lbl.gov, login: www. Access is provided to LBL's gopher, library catalog, and publication list. The Center is funding the implementation of a WWW network node for on-line access to publications, databases, and documents full of hypermedia links to other documents or information systems from the Energy & Environment Division. Full implementation is expected by May 1994, and will include access to a variety of information from all the research programs and centers. The technology transfer project calls for this newsletter to be published on WWW using the Mosaic interface under development at the National Center

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-181: IBM WebSphere Application Server Information Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere Application Server Information Disclosure 1: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in the Application Snoop Servlet when handling requests and can be exploited to disclose request and client information. Reference Links: Secunia Advisory 49352 CVE-2012-2170 Vendor Advisory IMPACT ASSESSMENT: High Discussion: WebSphere Application Server Administration Console is vulnerable to cross-site scripting, caused by improper validation of user-supplied input

22

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

23

V-194: Citrix XenServer Memory Management Error Lets Local Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Citrix XenServer Memory Management Error Lets Local 4: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host July 8, 2013 - 12:24am Addthis PROBLEM: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host PLATFORM: Citrix XenServer 5.0 - 6.2 ABSTRACT: A vulnerability was reported in Citrix XenServer. REFERENCE LINKS: CTX138134 SecurityTracker Alert ID: 1028740 CVE-2013-1432 IMPACT ASSESSMENT: Medium DISCUSSION: A local administrative user on a PV guest can exploit a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target

24

Google Apps Connector for BlackBerry Enterprise Server Users  

E-Print Network (OSTI)

Google Apps Connector for BlackBerry Enterprise Server Users Google Apps Connector for BlackBerry Enterprise Server is a Google offering that lets you access your Google Apps Mail, Calendar, and Contacts through your native BlackBerry applications. Key Features of Using the Google Apps Connector Updates Mail

Hu, Jie

25

Energy attack on server systems  

Science Conference Proceedings (OSTI)

Power management has become increasingly important for server systems. Numerous techniques have been proposed and developed to optimize server power consumption and achieve energy proportional computing. However, the security perspective of server power ...

Zhenyu Wu; Mengjun Xie; Haining Wang

2011-08-01T23:59:59.000Z

26

SYSTEM ADMINISTRATOR: WINDOWS SERVER 2003  

E-Print Network (OSTI)

SYSTEM ADMINISTRATOR: WINDOWS SERVER 2003 MCSA © 2011 Microsoft Corporation. All rights reserved MCPDMCPD WINDOWS DEVELOPERWEB DEVELOPER Job Role/Achievement Certification Recommended Coursework Student TECHNICIAN: WINDOWS 7 MCITPMCITP SUPPORT TECHNICIAN: WINDOWS VISTA SERVER ADMINISTRATOR: WINDOWS SERVER 2003

Atkinson, Katie

27

Enforcing Resource Sharing Agreements among Distributed Server Clusters  

Science Conference Proceedings (OSTI)

Future scalable, high throughput, and high performance applications are likely to execute on platforms constructed by clustering multiple autonomous distributed servers, with resource access governed by agreements between the owners and users of these ...

Tao Zhao; Vijay Karamcheti

2002-04-01T23:59:59.000Z

28

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Satellite server that could be reached, even if Inter-Satellite Sync support was disabled. IMPACT: A remote user can bypass authentication to gain access to all channel...

29

Scientific Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Scientific Access The APS is a open user facility that makes beam time available to the international scientific community through a peer-reviewed proposal process. Two access...

30

Creating A Model HTTP Server Program Using java  

E-Print Network (OSTI)

HTTP Server is a computer programs that serves webpage content to clients. A webpage is a document or resource of information that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a computer screen. This information is usually in HTML format, and may provide navigation to other webpage's via hypertext links. WebPages may be retrieved from a local computer or from a remote HTTP Server. WebPages are requested and served from HTTP Servers using Hypertext Transfer Protocol (HTTP). WebPages may consist of files of static or dynamic text stored within the HTTP Server's file system. Client-side scripting can make WebPages more responsive to user input once in the client browser. This paper encompasses the creation of HTTP server program using java language, which is basically supporting for HTML and JavaScript.

Veerasamy, Bala Dhandayuthapani

2010-01-01T23:59:59.000Z

31

Thank you for buying an IBM blade server.  

E-Print Network (OSTI)

. See Chapter 4 for more information. BladeCenter QS22 Type 0793 Install the operating system. See . . . . . . . . . . . . . . . . . . . . 10 Blade server controls and LEDs . . . . . . . . . . . . . . . . . . 10 System board LEDs . . . . . . . . . . . . . . . . . . . . . . . 11 System board internal and expansion card connectors . . . . . . . . . . 12 Chapter 3. Installing

32

Thank you for buying an IBM blade server.  

E-Print Network (OSTI)

. See Chapter 4 for more information. BladeCenter QS21 Type 0792 Install the operating system. See . . . . . . . . . . . . . . . . . . . . 10 Blade server controls and LEDs. . . . . . . . . . . . . . . . . . . 11 System board LEDs . . . . . . . . . . . . . . . . . . . . . . . 12 System board internal and expansion card connectors . . . . . . . . . . 13 Chapter 3. Installing

33

Virtual venue management users manual : access grid toolkit documentation, version 2.3.  

SciTech Connect

An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

2007-10-24T23:59:59.000Z

34

OSTI Establishes OAI Server, Achieves Broader Exposure for Records | OSTI,  

Office of Scientific and Technical Information (OSTI)

Establishes OAI Server, Achieves Broader Exposure for Records Establishes OAI Server, Achieves Broader Exposure for Records June 2005 Oak Ridge, TN - OSTI is pleased to announce the establishment of an Open Archives Initiative (OAI) server, which immediately opened more than 108,000 DOE scientific and technical reports for harvesting by the National Science Digital Library (NSDL) and other OAI users. Establishment of an OAI server achieves broader exposure of searchable science through OSTI's suite of R&D databases. By becoming a data provider adopting the OAI technical framework, OSTI took another step toward easing access and search of the deep Web. This is in keeping with OSTI's mission to advance science and sustain technological creativity by making R&D findings available and useful to DOE researchers and the American people.

35

BIOS Protection Guidelines for Servers  

Science Conference Proceedings (OSTI)

... developed by the original equipment manufacturer (OEM) of ... the BIOS used to run the individual blades. ... BIOS update perspective, a Blade Server is ...

2013-04-25T23:59:59.000Z

36

Next Generation Access (NGA) supply side interventions-An international comparison  

Science Conference Proceedings (OSTI)

Over the last years, technical and economic developments towards the deployment of Next Generation (Access) Networks have triggered discussions under which circumstances investments into physical infrastructure are economically viable. In many countries ... Keywords: Infrastructure investments, Next Generation Access Networks (NGN/NGAN), Policy, Regulation

Ernst-Olav Ruhle; Igor Brusic; Jörg Kittl; Matthias Ehrler

2011-10-01T23:59:59.000Z

37

An access control model for dynamic client-side content  

Science Conference Proceedings (OSTI)

The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually static, and an access control policy ... Keywords: access control, authentication, credentials, trust negotiation

Adam Hess; Kent E. Seamons

2003-06-01T23:59:59.000Z

38

The SDSS data archive server  

SciTech Connect

The Sloan Digital Sky Survey (SDSS) Data Archive Server (DAS) provides public access to data files produced by the SDSS data reduction pipeline. This article discusses challenges in public distribution of data of this volume and complexity, and how the project addressed them. The Sloan Digital Sky Survey (SDSS)1 is an astronomical survey of covering roughly one quarter of the night sky. It contains images of this area, a catalog of almost 300 million objects detected in those images, and spectra of more than a million of these objects. The catalog of objects includes a variety of data on each object. These data include not only basic information but also fit parameters for a variety of models, classifications by sophisticated object classification algorithms, statistical parameters, and more. If the survey contains the spectrum of an object, the catalog includes a variety of other parameters derived from its spectrum. Data processing and catalog generation, described more completely in the SDSS Early Data Release2 paper, consists of several stages: collection of imaging data, processing of imaging data, selection of spectroscopic targets from catalogs generated from the imaging data, collection of spectroscopic data, processing of spectroscopic data, and loading of processed data into a database. Each of these stages is itself a complex process. For example, the software that processes the imaging data determines and removes some instrumental signatures in the raw images to create 'corrected frames', models the point spread function, models and removes the sky background, detects objects, measures object positions, measures the radial profile and other morphological parameters for each object, measures the brightness of each object using a variety of methods, classifies the objects, calibrates the brightness measurements against survey standards, and produces a variety of quality assurance plots and diagnostic tables. The complexity of the spectroscopic data reduction pipeline is similar. Each pipeline deposits the results in a collection of files on disk. The Catalog Archive Server (CAS) provides an interface to a database of objects detected through the SDSS along with their properties and observational metadata. This serves the needs of most users, but some users require access to files produced by the pipelines. Some data, including the corrected frames (the pixel data itself corrected for instrumental signatures), the models for the point spread function, and an assortment of quality assurance plots, are not included in the database at all. Sometimes it is simply more convenient for a user to read data from existing files than to retrieve it using database queries. This is often the case, for example, when a user wants to download data a significant fraction of objects in the database. Users might need to perform analysis that requires more computing power than the CAS database servers can reasonably provide, and so need to download the data so that it can be analyzed with local resources. Users can derive observational parameters not measured by the standard SDSS pipeline from the corrected frames, metadata, and other data products, or simply use the output of tools with which they're familiar. The challenge in distributing these data is lies not in the distribution method itself, but in providing tools and support that allow users to find the data they need and interpret it properly. After introducing the data itself, this article describes how the DAS uses ubiquitous and well understood technologies to manage and distribute the data. It then discusses how it addresses the more difficult problem of helping the public find and use the data it contains, despite its complexity of its content and organization.

Neilsen, Eric H., Jr.; /Fermilab

2007-10-01T23:59:59.000Z

39

Server efficiency rating tool (SERT)  

Science Conference Proceedings (OSTI)

The Server Efficiency Rating Tool (SERT) [1] has been developed by Standard Performance Evaluation Corporation (SPEC) [2] at the request of the US Environmental Protection Agency (EPA) [3], prompted by concerns that US datacenters consumed almost 3% ... Keywords: benchmark, datacenter, energy efficiency, energy star, environmental protection agency, epa, power, rating tool, sert, server, spec

Klaus-Dieter Lange; Mike G. Tricker; Jeremy A. Arnold; Hansfried Block; Sanjay Sharma

2012-04-01T23:59:59.000Z

40

High-efficiency server design  

Science Conference Proceedings (OSTI)

Large-scale data centers consume megawatts in power and cost hundreds of millions of dollars to equip. Reducing the energy and cost footprint of servers can therefore have substantial impact. Web, Grid, and cloud servers in particular can be hard to ...

Eitan Frachtenberg; Ali Heydari; Harry Li; Amir Michael; Jacob Na; Avery Nisbet; Pierluigi Sarti

2011-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Design of Accelerator Online Simulator Server Using Structured Data  

Science Conference Proceedings (OSTI)

Model based control plays an important role for a modern accelerator during beam commissioning, beam study, and even daily operation. With a realistic model, beam behaviour can be predicted and therefore effectively controlled. The approach used by most current high level application environments is to use a built-in simulation engine and feed a realistic model into that simulation engine. Instead of this traditional monolithic structure, a new approach using a client-server architecture is under development. An on-line simulator server is accessed via network accessible structured data. With this approach, a user can easily access multiple simulation codes. This paper describes the design, implementation, and current status of PVData, which defines the structured data, and PVAccess, which provides network access to the structured data.

Shen, Guobao; /Brookhaven; Chu, Chungming; /SLAC; Wu, Juhao; /SLAC; Kraimer, Martin; /Argonne

2012-07-06T23:59:59.000Z

42

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

43

PROXY SERVER CHECKLIST  

Science Conference Proceedings (OSTI)

... Service tab Limit the configuration of the LAT to the range Of addresses in the internal network; ... Filtering tab Apply the Organization filtering policy. ...

44

Windows Server 2008 R2 Licensing Guide  

E-Print Network (OSTI)

Windows Server 2008 R2 Licensing Guide m Your Comprehensive Resource for Licensing and Pricing #12;2 Table of Contents Summary 3 Table of Windows Server 2008 R2 Core Product Offerings 3 License Terms ­ Windows Server 2008 R2 Product Line Updates 4 Edition Comparison by Server Role 5 New and Updated Features

Narasayya, Vivek

45

Windows Server AppFabric provides  

E-Print Network (OSTI)

Windows Server AppFabric provides benefits in three key areas: Faster Web Apps Windows Server App that works with current ASP.Net applications. Simplified Composite Apps Windows Server AppFabric simplifies (benefits often associated with the cloud) with the help of Windows Server AppFabric. These, and countless

Narasayya, Vivek

46

Role Based Access Control for the World Wide Web  

Science Conference Proceedings (OSTI)

... The other way to use RBAC/Web is to modify the UNIX Web server to call the RBAC/Web API to determine RBAC access. ...

47

Socially Optimal Location of Facilities with Fixed Servers, Stochastic ...  

E-Print Network (OSTI)

service rate for the 'servers' (scenario 1) or choosing the number of servers .... servers can be modeled and solved without any increase in computational effort  ...

48

COMPOST: a client-server model for applications using text-to-speech systems  

E-Print Network (OSTI)

This article presents a Client-Server Model for multilingual text-to-speech synthesis. The server maintains a collection of TTS systems together with related recongurable descriptions, called scenarios. Applications of an authorized client can access to this collection via an Ethernet network on a simple request to the server. This server allows the client to customize the TTS processing (language, speaker, speech rate, intonation. . . ) to its requirements by switching between different systems and/or reconfiguring the one it is currently using. The working environment, called COMPOST, has a three layered architecture: the development layer including a powerfull rule-compiler [3] and language-independent processing facilities (linguistic analyzers, PSOLA and Klatt synthesizers . . . ), the system construction layer including the Scenario Definition Language, and the server layer which has two main components: the process manager and the ressource manager.

Mamoun Alissali; Gérard Bailly

1993-01-01T23:59:59.000Z

49

Exchange Server 2010 Unleashed, 1st edition  

Science Conference Proceedings (OSTI)

Microsoft Exchange Server 2010 Unleashed is the ultimate guide to designing, deploying, managing, troubleshooting, and supporting any Exchange Server 2010 environment, no matter how large or complex. Drawing on their extensive experience with hundreds ...

Rand Morimoto; Michael Noel; Chris Amaris; Andrew Abbate; Mark Weinhardt

2009-10-01T23:59:59.000Z

50

Deploying the Squid Proxy Server on Linux  

Science Conference Proceedings (OSTI)

Ian gives an example of the installation, configuration and maintenance of this multi-tentacled invertebrate proxy server.

Ian Spare

2001-03-01T23:59:59.000Z

51

Performance analysis of TLS Web servers  

Science Conference Proceedings (OSTI)

TLS is the protocol of choice for securing today's e-commerce and online transactions but adding TLS to a Web server imposes a significant overhead relative to an insecure Web server on the same platform. We perform a comprehensive study of the performance ... Keywords: Internet, RSA accelerator, TLS, e-commerce, secure Web servers

Cristian Coarfa; Peter Druschel; Dan S. Wallach

2006-02-01T23:59:59.000Z

52

Microsoft Windows Server 2008 Administrator Series  

E-Print Network (OSTI)

Microsoft Windows Server 2008 Administrator Series Led by: Dianne Burke, MCSE and UM Faculty Member emergency such as a medical emergency to drop out of either one of Windows Server 2008 class before on Microsoft Windows Server 2008. The series prepares IT Professionals for the Microsoft Certified Technology

Crone, Elizabeth

53

Fuel cells as a backup energy source for high availability network servers  

E-Print Network (OSTI)

This thesis proposes an uninterruptible power supply, UPS for high availability servers with fuel cells as its back up energy source. The system comprises a DC to DC converter designed to accommodate the fuel cellâ s wide output voltage range. A server power supply is specified, designed and simulated for use with this UPS. The UPS interfaces internal to the server power supply, instead of providing standard AC power. This topology affords enhanced protection from faults and increases overall efficiency of the system by removing power conversions. The UPS is simulated with the designed power supply to demonstrate its effectiveness.

Humphrey, Daniel Alan

2008-08-01T23:59:59.000Z

54

Running the Sloan Digital Sky Survey data archive server  

SciTech Connect

The Sloan Digital Sky Survey (SDSS) Data Archive Server (DAS) provides public access to over 12Tb of data in 17 million files produced by the SDSS data reduction pipeline. Many tasks which seem trivial when serving smaller, less complex data sets present challenges when serving data of this volume and technical complexity. The included output files should be chosen to support as much science as possible from publicly released data, and only publicly released data. Users must have the resources needed to read and interpret the data correctly. Server administrators must generate new data releases at regular intervals, monitor usage, quickly recover from hardware failures, and monitor the data served by the DAS both for contents and corruption. We discuss these challenges, describe tools we use to administer and support the DAS, and discuss future development plans.

Neilsen, Eric H., Jr.; Stoughton, Chris; /Fermilab

2006-11-01T23:59:59.000Z

55

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support 1: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information October 26, 2012 - 6:00am Addthis PROBLEM: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Software version: 6.2.3, 6.2.3.1 ABSTRACT: A vulnerability was reported in IBM Tivoli Monitoring. REFERENCE LINKS: IBM Support Document: 1614003 IBM Support Portal SecurityTracker Alert ID: 1027692 IMPACT ASSESSMENT: High DISCUSSION: A remote user may be able to conduct HTTP TRACE and HTTP TRACK attacks to access sensitive information from the HTTP headers.

56

Smart Boards, Access Grids and VizServers - CECM  

E-Print Network (OSTI)

Advanced Collaboration, Shared Visualization and HCI. Collaborative and interactive information technologies are critical to modern research and learning, but ...

57

Dr. Tom Shinder's ISA Server 2006 Migration Guide  

Science Conference Proceedings (OSTI)

Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all ... Keywords: Computer Science, Security, Windows

Thomas W. Shinder; Debra Littlejohn Shinder; Adrian F. Dimcev; James Eaton-Lee; Jason Jones; Steve Moffat

2007-12-01T23:59:59.000Z

58

The PowerNap Server Architecture  

Science Conference Proceedings (OSTI)

Data center power consumption is growing to unprecedented levels: the EPA estimates U.S. data centers will consume 100 billion kilowatt hours annually by 2011. Much of this energy is wasted in idle systems: in typical deployments, server utilization ... Keywords: Power management, servers

David Meisner; Brian T. Gold; Thomas F. Wenisch

2011-02-01T23:59:59.000Z

59

Minimizing Remote Accesses in MapReduce Clusters  

Science Conference Proceedings (OSTI)

MapReduce, in particular Hadoop, is a popular framework for the distributed processing of large datasets on clusters of relatively inexpensive servers. Although Hadoop clusters are highly scalable and ensure data availability in the face of server failures, ... Keywords: MapReduce, Hadoop, remote accesses, data placement

Prateek Tandon, Michael J. Cafarella, Thomas F. Wenisch

2013-05-01T23:59:59.000Z

60

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

How to Protect Your Web Server from Attacks  

Science Conference Proceedings (OSTI)

How to Protect Your Web Server from Attacks. ... Web servers are the software programs that make information available over the Internet. ...

2012-11-01T23:59:59.000Z

62

T-581: Novell Access Manager Java Double Literal Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

81: Novell Access Manager Java Double Literal Denial of Service 81: Novell Access Manager Java Double Literal Denial of Service Vulnerability T-581: Novell Access Manager Java Double Literal Denial of Service Vulnerability March 17, 2011 - 3:05pm Addthis PROBLEM: Novell has acknowledged a vulnerability in Novell Access Manager, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Novell Access Manager 3.1 Linux Access Gateway Novell Access Manager 3.1 Access Administration Novell Access Manager 3.1 SSLVPN Server Novell Access Manager 3.1 Windows Novell Identity Server Novell Access Manager 3.1 Linux Novell Identity Server Novell Access Manager 3.1 Java Agents ABSTRACT: Novell Access Manager Java Double Literal Denial of Service Vulnerability. reference LINKS: Secunia Advisory: SA43769 CVE-2010-4476

63

Real-time remote control of a robot manipulator using Java and client-server architecture  

Science Conference Proceedings (OSTI)

The control of complex systems through PC networks is becoming increasingly important nowadays, both in the industries and in R&D centers. In this paper, a novel architecture is described which provides 24-h-a-day access to a remote system for remote ... Keywords: RS232, client, communication protocol, internet, java, planar manipulator, real-time, remote control, server

F. M. Raimondi; L. S. Ciancimino; M. Melluso

2005-03-01T23:59:59.000Z

64

Microsoft CEP server and online behavioral targeting  

Science Conference Proceedings (OSTI)

In this demo, we present the Microsoft Complex Event Processing (CEP) Server, Microsoft CEP for short. Microsoft CEP is an event stream processing system featured by its declarative query language and its multiple consistency levels ...

M. H. Ali; C. Gerea; B. S. Raman; B. Sezgin; T. Tarnavski; T. Verona; P. Wang; P. Zabback; A. Ananthanarayan; A. Kirilov; M. Lu; A. Raizman; R. Krishnan; R. Schindlauer; T. Grabs; S. Bjeletich; B. Chandramouli; J. Goldstein; S. Bhat; Ying Li; V. Di Nicola; X. Wang; David Maier; S. Grell; O. Nano; I. Santos

2009-08-01T23:59:59.000Z

65

Reference frame independent quantum key distribution server with telecom tether for on-chip client  

E-Print Network (OSTI)

We demonstrate a client-server quantum key distribution (QKD) scheme, with large resources such as laser and detectors situated at the server-side, which is accessible via telecom-fibre, to a client requiring only an on-chip polarisation rotator, that may be integrated into a handheld device. The detrimental effects of unstable fibre birefringence are overcome by employing the reference frame independent QKD protocol for polarisation qubits in polarisation maintaining fibre, where standard QKD protocols fail, as we show for comparison. This opens the way for quantum enhanced secure communications between companies and members of the general public equipped with handheld mobile devices, via telecom-fibre tethering.

P. Zhang; K. Aungskunsiri; E. Martín-López; J. Wabnig; M. Lobino; R. W. Nock; J. Munns; D. Bonneau; P. Jiang; H. W. Li; A. Laing; J. G. Rarity; A. O. Niskanen; M. G. Thompson; J. L. O'Brien

2013-08-15T23:59:59.000Z

66

Collaborative Client-Server Architectures in Tcl/Tk: A Class Project Experiment and Experience  

E-Print Network (OSTI)

This paper presents a class software project that was part of a recent experimental graduate course on Frontiers of Collaborative Computing on the Internet. We chose Tcl/Tk to facilitate rapid prototyping, testing, and demonstrating all phases of the project. The major milestones achieved during this course are: rapid proficiency in Tcl/Tk that allowed each student to manipulate data and widgets, apply socket programming principles, and create a progression of client/server applications, from textbook cases to a unique client/server architecture prototype -- driven by and matched to a well-defined collaborative project driver. universal server that supports any number of user-configurable clients, each accessible through a Web-browser on a Mac, Windows, or UNIX platforms. Prototype client configurations include: (1) collaborative document composition, (2) collaborative Tcl/Tk debugging and compilation, (3) collaborative design workflow.

Franc Brglez; Hemang Lavana; Zhi Fu; Debabrata Ghosh; Lorie I. Moffitt; Steve Nelson; J. Marshall Smith; Jun Zhou

2000-01-01T23:59:59.000Z

67

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

68

Memory resource management in vmware esx server  

E-Print Network (OSTI)

VMware ESX Server is a thin software layer designed to multiplex hardware resources efficiently among virtual machines running unmodified commodity operating systems. This paper introduces several novel ESX Server mechanisms and policies for managing memory. A ballooning technique reclaims the pages considered least valuable by the operating system running in a virtual machine. An idle memory tax achieves efficient memory utilization while maintaining performance isolation guarantees. Content-based page sharing and hot I/O page remapping exploit transparent page remapping to eliminate redundancy and reduce copying overheads. These techniques are combined to efficiently support virtual machine workloads that overcommit memory. 1

Carl A. Waldspurger

2002-01-01T23:59:59.000Z

69

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMSDEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated...

70

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

71

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

72

On the performance and use of dense servers  

Science Conference Proceedings (OSTI)

Dense servers trade performance at the node level for higher deployment density and lower power consumption as well as the possibility of reduced cost of ownership. System performance and the details of energy consumption for this class of servers, however, ...

W. M. Felter; T. W. Keller; M. D. Kistler; C. Lefurgy; K. Rajamani; R. Rajamony; F. L. Rawson; B. A. Smith; E. Van Hensbergen

2003-09-01T23:59:59.000Z

73

Server workload analysis for power minimization using consolidation  

Science Conference Proceedings (OSTI)

Server consolidation has emerged as a promising technique to reduce the energy costs of a data center. In this work, we present the first detailed analysis of an enterprise server workload from the perspective of finding characteristics for consolidation. ...

Akshat Verma; Gargi Dasgupta; Tapan Kumar Nayak; Pradipta De; Ravi Kothari

2009-06-01T23:59:59.000Z

74

PCM Guide to Client Server Databases, 2nd edition  

Science Conference Proceedings (OSTI)

From the Publisher:Now the hottest corporate computing architecture available today, Client/Server technology connects the high powered processing strengths of database servers with the diversity of client-based application tools. Combining database, ...

Joe Salemi

1995-06-01T23:59:59.000Z

75

MCSE Windows 2000 Server: Exam Cram  

Science Conference Proceedings (OSTI)

From the Book:Welcome to MCSE Windows 2000 Server Exam Cram! Whether this is your first or your fifteenth Exam Cram book, you'll find information here and in Chapter 1 that will help ensure your success as you pursue knowledge, experience, ...

Natasha Knight

2000-10-01T23:59:59.000Z

76

De-layered grid storage server  

Science Conference Proceedings (OSTI)

Networks have become faster and disks have become fatter at a pace that, despite Moore's law, CPU developments have simply not been been able to keep up with. We present a Grid Storage Server which is capable of scaling up to meet the "terabit-terabyte" ...

H. Shrikumar

2005-07-01T23:59:59.000Z

77

Server Security Policy 1.0 Purpose  

E-Print Network (OSTI)

Server Security Policy COE­SSP­01 1.0 Purpose The purpose of this policy is to establish standards configurations must be in accordance with approved College guidelines to ensure a significant level of security Wrappers or other security mechanisms. · The most recent security patches must be installed on the system

Demirel, Melik C.

78

The Best Damn Windows Server 2008 Book Period, 2 edition  

Science Conference Proceedings (OSTI)

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and ... Keywords: Applied, Computer Science, Computers, Security, Viruses

Anthony Piltzecker

2008-06-01T23:59:59.000Z

79

Totally green: evaluating and designing servers for lifecycle environmental impact  

Science Conference Proceedings (OSTI)

The environmental impact of servers and datacenters is an important future challenge. System architects have traditionally focused on operational energy as a proxy for designing green servers, but this ignores important environmental implications from ... Keywords: datacenter design, dematerialization, disaggregation, environmental sustainability, exergy, green computing, lifecycle impact, server architecture

Jichuan Chang; Justin Meza; Parthasarathy Ranganathan; Amip Shah; Rocky Shih; Cullen Bash

2012-04-01T23:59:59.000Z

80

User evaluation of the NASA technical report server recommendation service  

Science Conference Proceedings (OSTI)

We present the user evaluation of two recommendation server methodologies implemented for the NASA Technical Report Server (NTRS). One methodology for generating recommendations uses log analysis to identify co-retrieval events on full-text documents. ... Keywords: digital libraries, recommendation servers, user evaluation

Michael L. Nelson; Johan Bollen; JoAnne R. Calhoun; Calvin E. Mackey

2004-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Designing and scaling distributed VoD servers  

Science Conference Proceedings (OSTI)

Planning Video-on-Demand (VoD) services based on the server architecture and the available equipment is always a challenging task. We created a formal model to support the design of distributed video servers that adapt dynamically and automatically to ... Keywords: Configuration recommendation, Designing, Distributed video server, Scaling, Self-organization

Péter Kárpáti; Tibor Szkaliczki; László Böszörményi

2009-01-01T23:59:59.000Z

82

Workload Characterization and Performance Implications of Large-Scale Blog Servers  

SciTech Connect

With the ever-increasing popularity of social network services (SNSs), an understanding of the characteristics of these services and their effects on the behavior of their host servers is critical. However, there has been a lack of research on the workload characterization of servers running SNS applications such as blog services. To fill this void, we empirically characterized real-world web server logs collected from one of the largest South Korean blog hosting sites for 12 consecutive days. The logs consist of more than 96 million HTTP requests and 4.7 TB of network traffic. Our analysis reveals the followings: (i) The transfer size of non-multimedia files and blog articles can be modeled using a truncated Pareto distribution and a log-normal distribution, respectively; (ii) User access for blog articles does not show temporal locality, but is strongly biased towards those posted with image or audio files. We additionally discuss the potential performance improvement through clustering of small files on a blog page into contiguous disk blocks, which benefits from the observed file access patterns. Trace-driven simulations show that, on average, the suggested approach achieves 60.6% better system throughput and reduces the processing time for file access by 30.8% compared to the best performance of the Ext4 file system.

Jeon, Myeongjae [Rice University; Kim, Youngjae [ORNL; Hwang, Jaeho [KAIST, Daejeon, Republic of Korea; Lee, Joonwon [SungKyunKwan University, Korea; Seo, Euiseong [SungKyunKwan University, Korea

2012-01-01T23:59:59.000Z

83

Integrated mobile GIS and wireless internet map servers for environmental monitoring and management  

E-Print Network (OSTI)

ABSTRACT: With the progress of mobile GIS technology there is a great potential for adopting wireless communications and Internet mapping services for regional environmental management programs and natural habitat conservation. This paper provides an overview of a NASA-funded research project that focuses on the development of mobile GIS tools and wireless Internet Map Server (IMS) services to facilitate environmental monitoring and management tasks. By developing and testing wireless web-based map/image servers, mobile GIS applications, and global positional systems (GPS), this research created an integrated software/hardware infrastructure for a prototype mobile GIS application. The mobile GIS prototype allows multiple resource managers and park rangers to access large-size, remotely sensed images and GIS layers from a portable web server mounted in a vehicle. Users can conduct real-time spatial data updates and/or submit changes back to the web server over the wireless local area network (WLAN). This paper discusses in general the major components of mobile GIS, their current technological limitations, and potential problems during implementation. Key research agenda for mobile GIS are identified with suggestions for future research and development.

Ming-hsiang Tsou

2004-01-01T23:59:59.000Z

84

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

85

V-050: IBM InfoSphere Information Server Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: IBM InfoSphere Information Server Multiple Vulnerabilities 0: IBM InfoSphere Information Server Multiple Vulnerabilities V-050: IBM InfoSphere Information Server Multiple Vulnerabilities December 19, 2012 - 1:00am Addthis PROBLEM: IBM InfoSphere Information Server Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in versions prior to 9.1. ABSTRACT: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server REFERENCE LINKS: Secunia Advisory SA51605 IBM Support home IBM InfoSphere Information Server, Version 9.1 fix list IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in IBM InfoSphere Information Server, where some have an unknown impact and others can be exploited by malicious users to bypass certain security restrictions. 1) An unspecified error exists in the InfoCenter component.

86

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

87

T-542: SAP Crystal Reports Server Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: SAP Crystal Reports Server Multiple Vulnerabilities 2: SAP Crystal Reports Server Multiple Vulnerabilities T-542: SAP Crystal Reports Server Multiple Vulnerabilities January 25, 2011 - 2:30pm Addthis PROBLEM: SAP Crystal Reports Server Multiple Vulnerabilities. PLATFORM: Crystal Reports Server 2008 ABSTRACT: Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system. reference LINKS: Secunia Advisory SA43060 Vulnerability Report: Crystal Reports Server 2008 IMPACT ASSESSMENT: High Discussion: 1) Input passed to the "actId" parameter in InfoViewApp/jsp/common/actionNav.jsp, "backUrl" parameter in

88

T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

89

Expanded Web Map Server and WebGIS Tools Available for ORNL DAAC Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Expanded Web Map Server and WebGIS Tools Available for ORNL DAAC Data Expanded Web Map Server and WebGIS Tools Available for ORNL DAAC Data The ORNL DAAC has developed a WebGIS system that consolidates earlier project-centric viewers into one system to help users locate data, including site characteristics, from flux tower sites, MODIS ASCII Subset Sites, and NPP field sites from around the world. WebGIS is an internet-based technology that enables users to browse, query, display, and download spatial data using a standard web browser. The ORNL DAAC WebGIS includes a number of land cover, biophysical, elevation, and geopolitical layers, as well as access to other relevant Open Geospatial Consortium (OGC) layers. Users can interrogate map features and extract and download selected map features including map layers (shape files).

90

Open Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Communication » Communication » Open Access Open Access Open access (OA) is the practice of providing unrestricted access via the Internet to peer-reviewed scholarly journal articles. Learn more below... Questions? Open Access Email Open access publishing and publications have experienced substantial growth, expansion and uptake in recent years. What exactly is an open access publication? There are many definitions, but in a nutshell an open access publication is a publication that provides immediately free online access to all users worldwide. This may sound like a tall order, and yet there are to date over 4000 journal publications that fit this definition. The need for this type of access has been driven by the out-of-control costs for scholarly publications. Statistics kept by the Association for Research Libraries

91

T-710: Apache HTTP Server Overlapping Ranges Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Apache HTTP Server Overlapping Ranges Denial of Service 10: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability T-710: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability September 6, 2011 - 3:09am Addthis PROBLEM: Apache HTTP Server contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. PLATFORM: Apache HTTP Server versions 2.2.19 and prior ABSTRACT: Apache HTTP Server Overlapping Ranges Denial of Service Vulnerability. reference LINKS: FreeBSD VuXML Document Advisory ID: cisco-sa-20110830-apache IBM Alert: swg21512087 Red Hat Advisory: RHSA-2011:1245-1 CVE-2011-3192 CVE-2011-3192 (Update2) IMPACT ASSESSMENT: High Discussion: The vulnerability is due to improper processing of certain user-supplied requests by the affected software. An unauthenticated, remote attacker

92

On many-server queues in heavy traffic  

E-Print Network (OSTI)

We establish a heavy-traffic limit theorem on convergence in distribution for the number of customers in a many-server queue when the number of servers tends to infinity. No critical loading condition is assumed. Generally, the limit process does not have trajectories in the Skorohod space. We give conditions for the convergence to hold in the topology of compact convergence. Some new results for an infinite server are also provided.

Puhalskii, Anatolii A; 10.1214/09-AAP604

2010-01-01T23:59:59.000Z

93

A New Approach of Performance Improvement for Server Selection in Reliable Server Pooling Systems  

E-Print Network (OSTI)

. The Server Selection by PR and PU be acknowledged by the PE within a given timeout) and propagates the service of a pool given by its PH, a PU requests a PE selection from an arbitrary PR of the op- eration the list of PE identities selected by the PR into its local cache (denoted as PU-side cache). From

Dreibholz, Thomas

94

Report to Congress on Server and Data Center Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Report to Congress on Server and Data Center Energy Efficiency Opportunities Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers...

95

Deploying Server-side File System Monitoring at NERSC  

E-Print Network (OSTI)

J. Shalf, and H. Wasserman. Nersc-6 workload analysis andDeploying Server-side File System Monitoring at NERSC AndrewUselton NERSC, Lawrence Berkeley National Laboratory

Uselton, Andrew

2009-01-01T23:59:59.000Z

96

Microsoft Windows Server 2003 -palvelimen asentaminen ja käyttöönotto yrityksessä Postituspojat.  

E-Print Network (OSTI)

??Opinnäytetyö toteutettiin yritysten Postituspojat ja HelmiTaito kanssa. Projektin tavoitteena oli saada Postituspojille toimiva uusi Microsoft Windows Server 2003 –palvelinympäristö. Uuden palvelinlaitteiston hankkiminen tuli Postituspojille ajankohtaiseksi… (more)

Virtanen, Ilkka

2009-01-01T23:59:59.000Z

97

Microsoft Windows Server 2003 security enhancements and new features .  

E-Print Network (OSTI)

??The purpose of this thesis is to discuss the new features and enhancements of Windows Server 2003. Windows NT and Windows 2000 were known to… (more)

Montehermoso, Ronald Centeno.

2004-01-01T23:59:59.000Z

98

SPDE Limits of Many Server Queues  

E-Print Network (OSTI)

A many-server queueing system is considered in which customers with independent and identically distributed service times enter service in the order of arrival. The state of the system is represented by a process that describes the total number of customers in the system, as well as a measure-valued process that keeps track of the ages of customers in service, leading to a Markovian description of the dynamics. Under suitable assumptions, a functional central limit theorem is established for the sequence of (centered and scaled) state processes as the number of servers goes to infinity. The limit process describing the total number in system is shown to be an Ito diffusion with a constant diffusion coefficient that is insensitive to the service distribution. The limit of the sequence of (centered and scaled) age processes is shown to be a Hilbert space valued diffusion that can also be characterized as the unique solution of a stochastic partial differential equation that is coupled with the Ito diffusion. Fu...

Kaspi, Haya

2010-01-01T23:59:59.000Z

99

Data Protection and Rapid Recovery From Attack With A Virtual Private File Server and Virtual Machine Appliances  

E-Print Network (OSTI)

When a personal computer is attacked, both personal data like digital photos and system configuration information like installed programs can be lost. To protect personal data, we house it in a file server virtual machine running on the same physical host and export it to other virtual machines running on the same host. We implement this private file server virtual machine using a modified version of an NFS server installed in a virtual machine under various virtualization environments such as Xen and VMware. We also demonstrate that by placing the user’s applications in a virtual machine rather than directly on the base machine we can provide near instant recovery of system configuration information. We quantify the costs of this architecture by comparing benchmarks running directly on a base operating system and accessing data in a local filesystem to those running in a guest operating system and accessing data in an NFS partition mounted from a file server virtual machine. We find that for Xen the overhead of read intensive workloads is at most 5 % and for write intensive workloads the overhead is at most 24%. For system benchmarks that stress CPU and memory performance, we see no noticeable degradation.

Jeanna N. Matthews; Jason J. Herne; Todd M. Deshane; Patty A. Jablonski; Leslie R. Cherian; Mike T. Mccabe

2005-01-01T23:59:59.000Z

100

Advantages and limitations of using a server cluster for Server Appliances (specifically, X - Web Form Manager by Avain Technologies Oy).  

E-Print Network (OSTI)

??This thesis describes some general concepts and logic behind server clusters, as well as gives a few examples on technologies available as of 2009. It… (more)

Mikhailov, Alexei

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

On Optimal Policies for Energy-Aware Servers Vincent Maccio  

E-Print Network (OSTI)

On Optimal Policies for Energy-Aware Servers Vincent Maccio McMaster University Hamilton, Ontario exhibit. Even for single server systems, when energy is a factor, optimal policies remain unknown[Sw]). The typical approach to developing energy-aware policies focuses on a particular metric. In [1

Smith, Spencer

102

Business need CISER's aged servers were at full  

E-Print Network (OSTI)

Business need CISER's aged servers were at full capacity due to user growth of at least 20 percent- thirds, with Dell Networking enabling a virtualized server architecture designed by Dell Infrastructure Consulting Services. Benefits · Offers greater availability while cutting CPU utilization in half · Increases

Keinan, Alon

103

Further implementation aspects of the server efficiency rating tool (SERT)  

Science Conference Proceedings (OSTI)

The Server Efficiency Rating Tool (SERT) has been developed by the Standard Performance Evaluation Corporation (SPEC) at the request of the US Environmental Protection Agency (EPA). Almost 3% of all electricity consumed within the US in 2010 went to ... Keywords: affinitization, benchmark, energy efficiency, energy star, environment protection agency (epa), framework,, memory, performance engineering, reporting, server, spec, system discovery, system performance

Klaus Dieter Lange; Jeremy A. Arnold; Hansfried Block; Nathan Totura; John Beckett; Mike G. Tricker

2013-04-01T23:59:59.000Z

104

Exploiting Service Usage Information for Optimizing Server Resource Management  

Science Conference Proceedings (OSTI)

It is often difficult to tune the performance of modern component-based Internet services because: (1) component middleware are complex software systems that expose several independently tuned server resource management mechanisms; (2) session-oriented ... Keywords: Internet application, client behavior, component middleware, optimization, quality-of-service, server resource management, service usage information

Alexander Totok; Vijay Karamcheti

2011-07-01T23:59:59.000Z

105

Workload-Aware Load Balancing for Clustered Web Servers  

Science Conference Proceedings (OSTI)

We focus on load balancing policies for homogeneous clustered Web servers that tune their parameters on-the-fly to adapt to changes in the arrival rates and service times of incoming requests. The proposed scheduling policy, AdaptLoad, monitors the incoming ... Keywords: Clustered Web servers, self-managing clusters, load balance, locality awareness, workload characterization, static and dynamic pages.

Qi Zhang; Alma Riska; Wei Sun; Evgenia Smirni; Gianfranco Ciardo

2005-03-01T23:59:59.000Z

106

Dynamic Server Allocation Over Time-Varying Channels With Switchover Delay  

E-Print Network (OSTI)

We consider a dynamic server allocation problem over parallel queues with randomly varying connectivity and server switchover delay between the queues. At each time slot, the server decides either to stay with the current ...

Le, Long B.

107

V-011: IBM Tivoli Monitoring Web Server HTTP TRACE/TRACK Support...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM Tivoli Monitoring Web Server HTTP TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-011: IBM Tivoli Monitoring Web Server HTTP TRACETRACK...

108

Open Access  

E-Print Network (OSTI)

© 2007 Brewer; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Earl J Brewer; Earl J Brewer

2007-01-01T23:59:59.000Z

109

Profit-Aware Server Allocation for Green Internet Services  

E-Print Network (OSTI)

A server farm is examined, where a number of servers are used to offer a service to impatient customers. Every completed request generates a certain amount of profit, running servers consume electricity for power and cooling, while waiting customers might leave the system before receiving service if they experience excessive delays. A dynamic allocation policy aiming at satisfying the conflicting goals of maximizing the quality of users' experience while minimizing the cost for the provider is introduced and evaluated. The results of several experiments are described, showing that the proposed scheme performs well under different traffic conditions.

Mazzucco, Michele; Dikaiakos, Marios

2011-01-01T23:59:59.000Z

110

Fluid Models of Many-server Queues with Abandonment  

E-Print Network (OSTI)

We study many-server queues with abandonment in which customers have general service and patience time distributions. The dynamics of the system are modeled using measure- valued processes, to keep track of the residual service and patience times of each customer. Deterministic fluid models are established to provide first-order approximation for this model. The fluid model solution, which is proved to uniquely exists, serves as the fluid limit of the many-server queue, as the number of servers becomes large. Based on the fluid model solution, first-order approximations for various performance quantities are proposed.

Zhang, Jiheng

2009-01-01T23:59:59.000Z

111

Applying General Access Structure to Metering Ventzislav Nikov  

E-Print Network (OSTI)

Applying General Access Structure to Metering Schemes Ventzislav Nikov Department of Mathematics.vandewalle@esat.kuleuven.ac.be Abstract In order to decide on advertisement fees for web servers, Naor and Pinkas introduced metering number of clients. Several researchers have generalized the idea of Naor and Pinkas: #12;rst metering

International Association for Cryptologic Research (IACR)

112

Applying General Access Structure to Metering Ventzislav Nikov  

E-Print Network (OSTI)

Applying General Access Structure to Metering Schemes Ventzislav Nikov Department of Mathematics.vandewalle@esat.kuleuven.ac.be Abstract In order to decide on advertisement fees for web servers, Naor and Pinkas introduced metering number of clients. Several researchers have generalized the idea of Naor and Pinkas: first metering

International Association for Cryptologic Research (IACR)

113

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Building Owners and Managers Association International on DOE Request for Information-Implementing the National...

114

Development of improved methods for remote access of DIII-D data and data analysis  

SciTech Connect

The DIII-D tokamak is a national fusion research facility. There is an increasing need to access data from remote sites in order to facilitate data analysis by collaborative researchers at remote locations, both nationally and internationally. In the past, this has usually been done by remotely logging into computers at the DIII-D site. With the advent of faster networking and powerful computers at remote sites, it is becoming possible to access and analyze data from anywhere in the world as if the remote user were actually at the DIII-D site. The general mechanism for accessing DIII-D data has always been via the PTDATA subroutine. Substantial enhancements are being made to that routine to make it more useful in a non-local environment. In particular, a caching mechanism is being built into PTDATA to make network data access more efficient. Studies are also being made of using Distributed File System (DFS) disk storage in a Distributed Computing Environment (DCE). A data server has been created that will migrate, on request, shot data from the DIII-D environment into the DFS environment.

Greene, K.L.; McHarg, B.B. Jr.

1997-11-01T23:59:59.000Z

115

ACCESS CONTROL  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TERMS/DEFINITIONS FROM DOE M 470.4-7 TERMS/DEFINITIONS FROM DOE M 470.4-7 ACCESS CONTROL. The process of permitting access or denying access to information, facilities, nuclear materials, resources, or designated security areas. ACCESS CONTROL MEASURES. Hardware and software features, physical controls, operating procedures, administrative procedures, and various combinations of these designed to detect or prevent unauthorized access to classified information; special nuclear materials; Government property; automated information systems, facilities, or materials; or areas containing the above and to enforce use of these measures to protect Departmental security and property interests. CRITICAL PATH SCENARIO. An adversary-based scenario that is generated during the conduct of a vulnerability assessment and accounts for adversary tactics that

116

Design, implementation, and evaluation of a compilation server  

Science Conference Proceedings (OSTI)

Modern JVM implementations interleave execution with compilation of “hot” methods to achieve reasonable performance. Since compilation overhead impacts the execution time of the application and induces run-time pauses, we explore offloading ... Keywords: Compilation server, Java virtual machine

Han B. Lee; Amer Diwan; J. Eliot B. Moss

2007-08-01T23:59:59.000Z

117

OSTI Establishes OAI Server, Achieves Broader Exposure for Records  

Office of Scientific and Technical Information (OSTI)

of an OAI server achieves broader exposure of searchable science through OSTI's suite of R&D databases. By becoming a data provider adopting the OAI technical framework, OSTI took...

118

ORNL DAAC, Map Server for Flux Data, June 12, 2003  

NLE Websites -- All DOE Office Websites (Extended Search)

for FLUXNET Data The ORNL DAAC has developed a Web map server to help users locate flux tower sites from around the world. Users can choose from more than 210 sites in the FLUXNET...

119

Improving server application performance via pure TCP ACK receive optimization  

Science Conference Proceedings (OSTI)

Network stack performance is critical to server scalability and user-perceived application experience. Perpacket overhead is a major bottleneck in scaling network I/O. While much effort is expended on reducing perpacket overhead for data-carrying packets, ...

Michael Chan, David R. Cheriton

2013-06-01T23:59:59.000Z

120

ORNL DAAC, Net Primary Productivity Web Map Server, Feb. 28,...  

NLE Websites -- All DOE Office Websites (Extended Search)

helps users more readily find NPP data for 61 locations around the world. Users simply "Query" the map and select a site marker. In response, the server provides links to all the...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Windows 2000 Server System Administration Handbook, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:A complete overview of the Windows 2000 Server operating system provides key assistance for NT4 professionals in administering and supporting the system. Its detailed coverage will enable administrators to differentiate the features ...

CORPORATE Syngress Media Inc

1999-11-01T23:59:59.000Z

122

Minimizing data center cooling and server power costs  

Science Conference Proceedings (OSTI)

This paper focuses on power minimization in a data center accounting for both the information technology equipment and the air conditioning power usage. In particular we address the server consolidation (on/off state assignment) concurrently with the ... Keywords: datacenter

Ehsan Pakbaznia; Massoud Pedram

2009-08-01T23:59:59.000Z

123

ITL's TREC 2002 Draws Strong International Participation  

Science Conference Proceedings (OSTI)

ITL's Annual Information Retrieval Conference Draws Strong International Participation. The Information Access Division ...

124

Leveraging thermal dynamics in sensor placement for overheating server component detection  

Science Conference Proceedings (OSTI)

Server overheating has become a well-known issue in today's data centers that host a large number of high-density servers. The current practice of server overheating detection is to monitor the server inlet temperature with the temperature sensor on ...

Xiaodong Wang; Xiaorui Wang; Guoliang Xing; Cheng-Xian Lin

2012-06-01T23:59:59.000Z

125

Providing Internet access to Los Alamos National Laboratory technical reports: A case history in providing public access to previously restricted documents  

Science Conference Proceedings (OSTI)

The Los Alamos National Laboratory (LANL) Research Library recently fulfilled a strategic goal of providing worldwide desktop access via the Internet to full-image files of the complete unclassified holdings of Los Alamos technical reports in its Report Collection. This effort began in late 1994 with the scanning of paper and microfiche format reports. Concurrently, the Research Library helped to initiate shifting the model for publishing new technical reports from paper to electronic; the files could then be directly mounted on the Research Library`s Web server. Providing desktop access to these reports was instrumental in expediting the development of internal policies that would better define what documents, previously restricted to the general public, could be publicly released. Undoubtedly, the most significant category of such reports were previously classified reports that had been declassified, but had not gone through a further review for public release. Collaboration with LANL`s Classification Group led to approval for public release of 97% of these reports. The LANL Research Library`s Web site now offers unique and unprecedented access to the world of a huge body of technical reports never available before anywhere in any form. This paper discusses the issues and steps involved in this achievement.

Collins, K.A.

1996-12-31T23:59:59.000Z

126

SQL SERVER BUSINESS INTELLIGENCE PROGRAM An eleven-week in-depth program covering Microsoft SQL Server 2008 R2 analysis services, integration services, and  

E-Print Network (OSTI)

trademarks in the United States of America and/or other countries. The SQL Server Business IntelligenceSQL SERVER BUSINESS INTELLIGENCE PROGRAM An eleven-week in-depth program covering Microsoft SQL Server Business Intelligence Program is designed to provide a comprehensive introduction to the Microsoft

Schaefer, Marcus

127

U-253: Citrix XenServer Denial of Service and Privilege Escalation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

253: Citrix XenServer Denial of Service and Privilege Escalation 253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities U-253: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities September 7, 2012 - 6:00am Addthis PROBLEM: Citrix XenServer Denial of Service and Privilege Escalation Vulnerabilities PLATFORM: Citrix XenServer 5.0 Citrix XenServer 5.5 Citrix XenServer 5.6 Citrix XenServer 6.0 ABSTRACT: Citrix XenServer is prone to a local privilege-escalation vulnerability. reference LINKS: Citrix Document ID: CTX134708 Secunia Advisory SA50530 Bugtraq ID: 55432 CVE-2012-3432 CVE-2012-3433 CVE-2012-3494 CVE-2012-3495 CVE-2012-3496 CVE-2012-3498 CVE-2012-3515 CVE-2012-3516 CVE-2012-4606 IMPACT ASSESSMENT: High Discussion: A number of security vulnerabilities have been identified in Citrix

128

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

129

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

130

SERVER DEVELOPMENT FOR NSLS-II PHYSICS APPLICATIONS AND PERFORMANCE ANALYSIS  

SciTech Connect

The beam commissioning software framework of NSLS-II project adopts a client/server based architecture to replace the more traditional monolithic high level application approach. The server software under development is available via an open source sourceforge project named epics-pvdata, which consists of modules pvData, pvAccess, pvIOC, and pvService. Examples of two services that already exist in the pvService module are itemFinder, and gather. Each service uses pvData to store in-memory transient data, pvService to transfer data over the network, and pvIOC as the service engine. The performance benchmarking for pvAccess and both gather service and item finder service are presented in this paper. The performance comparison between pvAccess and Channel Access are presented also. For an ultra low emittance synchrotron radiation light source like NSLS II, the control system requirements, especially for beam control are tight. To control and manipulate the beam effectively, a use case study has been performed to satisfy the requirement and theoretical evaluation has been performed. The analysis shows that model based control is indispensable for beam commissioning and routine operation. However, there are many challenges such as how to re-use a design model for on-line model based control, and how to combine the numerical methods for modeling of a realistic lattice with the analytical techniques for analysis of its properties. To satisfy the requirements and challenges, adequate system architecture for the software framework for beam commissioning and operation is critical. The existing traditional approaches are self-consistent, and monolithic. Some of them have adopted a concept of middle layer to separate low level hardware processing from numerical algorithm computing, physics modelling, data manipulating and plotting, and error handling. However, none of the existing approaches can satisfy the requirement. A new design has been proposed by introducing service oriented architecture technology, and client interface is undergoing. The design and implementation adopted a new EPICS implementation, namely epics-pvdata [9], which is under active development. The implementation of this project under Java is close to stable, and binding to other language such as C++ and/or Python is undergoing. In this paper, we focus on the performance benchmarking and comparison for pvAccess and Channel Access, the performance evaluation for 2 services, gather and item finder respectively.

Shen, G.; Kraimer, M.

2011-03-28T23:59:59.000Z

131

Price Server System for Automated Critical Peak Pricing  

NLE Websites -- All DOE Office Websites (Extended Search)

Price Server System for Automated Critical Peak Pricing Price Server System for Automated Critical Peak Pricing Speaker(s): David S. Watson Date: June 3, 2005 - 12:00pm Location: 90-3148 Overview of current California Energy Commission (CEC)/Demand Response Research Center (DRRC) Auto-CPP project: This summer, some select commercial CPP customers of PG&E will have the option of joining the Automated Critical Peak Pricing pilot. The pilot will have the same tariffs as standard CPP programs, but will include an added feature: automated shedding of electric loads. Through use of the Price Server System, day-ahead CPP event signals initiated by PG&E will ultimately cause electric loads to be automatically curtailed on commercial customer sites. These optional predetermined shed strategies will occur without

132

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: IBM WebSphere Application Server for z/OS Arbitrary Command 4: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability December 25, 2012 - 12:08am Addthis PROBLEM: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability PLATFORM: IBM HTTP Server for z/OS Version 5.3 ABSTRACT: A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS REFERENCE LINKS: Security vulnerability Reference #:1620945 Xforce: 80684 Secunia Advisory SA51656 CVE-2012-5955 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability has been reported in IBM WebSphere Application Server for z/OS, which can be exploited by malicious people to compromise a vulnerable

133

T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: Avaya Aura Application Server Buffer Overflow in 95: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code August 17, 2011 - 3:23pm Addthis PROBLEM: A vulnerability was reported in Avaya Aura Application Server (Nortel Media Application Server). PLATFORM: Avaya Aura Application Server 5300 version(s): 1.0, 2.0 ABSTRACT: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code. reference LINKS: Avaya Advisory: 100146108 Security Tracker Alert ID: 1025942 IMPACT ASSESSMENT: Medium Discussion: A flaw was found in one of the Media Application Server listening processes. If a remote attacker was able to successfully establish a

134

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012...

135

T-602: BlackBerry Enterprise Server Input Validation Flaw in...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation...

136

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands...

137

How to Cheat at Configuring VmWare ESX Server  

Science Conference Proceedings (OSTI)

This book will detail the default and custom installation of VMware's ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration ... Keywords: NT, Networking, Operating Systems

David Rule

2007-12-01T23:59:59.000Z

138

Enabling datacenter servers to scale out economically and sustainably  

Science Conference Proceedings (OSTI)

As cloud applications proliferate and data-processing demands increase, server resources must grow to unleash the performance of emerging workloads that scale well with large number of compute nodes. Nevertheless, power has become a crucial bottleneck ... Keywords: cloud workload, datacenter, energy storage, green energy, power management, scalability, sustainability

Chao Li, Yang Hu, Ruijin Zhou, Ming Liu, Longjun Liu, Jingling Yuan, Tao Li

2013-12-01T23:59:59.000Z

139

Disaggregated memory for expansion and sharing in blade servers  

Science Conference Proceedings (OSTI)

Analysis of technology and application trends reveals a growing imbalance in the peak compute-to-memory-capacity ratio for future servers. At the same time, the fraction contributed by memory systems to total datacenter costs and power consumption during ... Keywords: disaggregated memory, memory blades, memory capacity expansion, power and cost efficiencies

Kevin Lim; Jichuan Chang; Trevor Mudge; Parthasarathy Ranganathan; Steven K. Reinhardt; Thomas F. Wenisch

2009-06-01T23:59:59.000Z

140

Integrating ISA Server 2006 with Microsoft Exchange 2007  

Science Conference Proceedings (OSTI)

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes ... Keywords: Applied, Computer Architecture, Computer Science, Computers, Information Management, Operating Systems, Security, Viruses

Fergus Strachan

2008-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Microsoft Windows NT Server 4 in the Enterprise: Exam Guide  

Science Conference Proceedings (OSTI)

From the Publisher:MCSE Windows NT Server in the Enterprise Exam Guide, Second Edition, is strictly exam-related in order to help you fully understand Exam 70-073. Diagrams put concepts into a visual form that aids comprehension and memorization, and ...

Emmett Dulaney

1999-12-01T23:59:59.000Z

142

The Globus Striped GridFTP Framework and Server  

Science Conference Proceedings (OSTI)

The GridFTP extensions to the File Transfer Protocol define a general-purpose mechanism for secure, reliable, high-performance data movement. We report here on the Globus striped GridFTP framework, a set of client and server libraries designed to support ...

William Allcock; John Bresnahan; Rajkumar Kettimuthu; Michael Link; Catalin Dumitrescu; Ioan Raicu; Ian Foster

2005-11-01T23:59:59.000Z

143

MADServer: a server architecture for mobile advanced delivery  

Science Conference Proceedings (OSTI)

Rapid increases in cellular data traffic demand creative alternative delivery vectors for data. Despite the conceptual attractiveness of mobile data offloading, no concrete web server architectures integrate intelligent offloading in a production-ready ... Keywords: cellular data offloading, delay tolerant cache, mobile advanced delivery

Agoston Petz; Anders Lindgren; Pan Hui; Christine Julien

2012-08-01T23:59:59.000Z

144

PowerNap: Eliminating Server Idle Power David Meisner  

E-Print Network (OSTI)

determine that PowerNap is effective if state transition time is below 10ms, and incurs no overheads below 1, unlike consumer devices, servers cannot rely on the user to transition between power states; they must manage ACPI state transitions and would coordinate PowerNap transitions. A typical service processor

Wenisch, Thomas F.

145

Bridging end users' terms and AGROVOC concept server vocabularies  

Science Conference Proceedings (OSTI)

The AGROVOC is multilingual structure thesaurus for Agricultural domain. It has already been mapped with several vocabularies, for example, AGROVOC-CAT, AGROVOC-NALT, and AGROVOC-SWD. Although these vocabularies already contained a good portion of non-preferred ... Keywords: AGROVOC, concept server, synonym rings, vocabulary

Ahsan Morshed; Gudrun Johannsen; Johannes Keizer; Marcia Lei Zeng

2010-10-01T23:59:59.000Z

146

Web servers and services for electrostatics calculations with APBS and PDB2PQR  

Science Conference Proceedings (OSTI)

APBS and PDB2PQR are widely utilized free software packages for biomolecular electrostatics calculations. Using the Opal toolkit, we have developed a web services framework for these software packages that enables the use of APBS and PDB2PQR by users who do not have local access to the necessary amount of computational capabilities. This not only increases accessibility of the software to a wider range of scientists, educators, and students but it also increases the availability of electrostatics calculations on portable computing platforms. Users can access this new functionality in two ways. First, an Opal-enabled version of APBS is provided in current distributions, available freely on the web. Second, we have extended the PDB2PQR web server to provide an interface for the setup, execution, and visualization electrostatics potentials as calculated by APBS. This web interface also uses the Opal framework which ensures the scalability needed to support the large APBS user community. Both of these resources are available from the APBS/PDB2PQR website: http://www.poissonboltzmann.org/.

Unni, Samir; Huang, Yong; Hanson, Robert M.; Tobias, Malcolm; Krishnan, Sriram; Li, Wilfred; Nielsen, Jens E.; Baker, Nathan A.

2011-04-02T23:59:59.000Z

147

Kilim: A Server Framework with Lightweight Actors, Isolation Types & Zero-copy Messaging  

E-Print Network (OSTI)

Number 769 Computer Laboratory Kilim: A server framework with lightweight actors, isolation types and zero-copy messaging

Sriram Srinivasan; Sriram Srinivasan

2010-01-01T23:59:59.000Z

148

On understanding the energy consumption of ARM-based multicore servers  

Science Conference Proceedings (OSTI)

There is growing interest to replace traditional servers with low-power multicore systems such as ARM Cortex-A9. However, such systems are typically provisioned for mobile applications that have lower memory and I/O requirements than server application. ... Keywords: analytical model, energy, low-power, multicore, performance, servers

Bogdan Marius Tudor; Yong Meng Teo

2013-06-01T23:59:59.000Z

149

Networking without Dynamic Host Configuration Protocol server in Ethernet and Wireless Local Area Network  

Science Conference Proceedings (OSTI)

A Dynamic Host Configuration Protocol (DHCP) server is a well-known server deployed at a network to manage Internet Protocol (IP) addresses temporarily rentable to hosts in the network. Besides, a DHCP server provides hosts with important network information ... Keywords: AHCM, ARP, Autoconfiguration, Automatic host configuration, DHCP, Free IP address

Tzu-Chi Huang; Kuo-Chih Chu

2011-11-01T23:59:59.000Z

150

Accounts & Access | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Account Information Accounts and Access FAQ Connect & Log In Using CRYPTOCards SSH Keys on Surveyor Disk Space Quota Management Allocations Decommissioning of BG/P Systems and Resources Blue Gene/Q Versus Blue Gene/P Mira/Cetus/Vesta Intrepid/Challenger/Surveyor Tukey Eureka / Gadzooks Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Accounts & Access Account Information Account Information: All computing carried out on the ALCF systems is associated with a user "account." This account is used to log onto the login servers and run jobs on the resources. Using CRYPTOcards Using CRYPTOCards: Useful information to guide you in using and troubleshooting your CRYPTOcard.

151

HAE international home therapy consensus document  

E-Print Network (OSTI)

et al. : HAE international home therapy consensus document.Access HAE international home therapy consensus documenttreatment results in delays. Home therapy offers the

2010-01-01T23:59:59.000Z

152

T-682:Double free vulnerability in MapServer | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2:Double free vulnerability in MapServer 2:Double free vulnerability in MapServer T-682:Double free vulnerability in MapServer August 2, 2011 - 4:08pm Addthis PROBLEM: Double free vulnerability in MapServer PLATFORM: All versions may be susceptible to SQL injection under certain circumstances ABSTRACT: MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases. reference LINKS: Double-free in msAddImageSymbol() when filename is a http resource

153

V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie 6: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30, 2013 - 4:33am Addthis PROBLEM: Two vulnerabilities have been reported in Apache HTTP Server, which can be exploited by malicious people to disclose potentially sensitive information and compromise a vulnerable system. PLATFORM: Apache 2.0.x Apache HTTP Server 2.x ABSTRACT: Two vulnerabilities have been reported in Apache HTTP Server REFERENCE LINKS: CVE-2012-0053 CVE-2013-1862 http://secunia.com/advisories/54320/ IMPACT ASSESSMENT: Medium DISCUSSION: protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400)

154

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

200: Red Hat Directory Server Information Disclosure Security 200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

155

U-094: EMC Documentum Content Server Lets Local Administrative Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC Documentum Content Server Lets Local Administrative 4: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges February 2, 2012 - 9:15am Addthis PROBLEM: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges PLATFORM: EMC Documentum Content Server 6.0, 6.5, 6.6 ABSTRACT: EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system. reference LINKS: SecurityTracker Alert ID: 1026624 EMC Resource Library CVE-2011-4144 bugtraq ESA-2012-009 IMPACT ASSESSMENT: Medium Discussion: EMC Documentum Content Server contains a security vulnerability that may allow a system administrator to elevate their or other users privileges to

156

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

157

U-200: Red Hat Directory Server Information Disclosure Security Issue and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Red Hat Directory Server Information Disclosure Security 0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27, 2012 - 7:00am Addthis PROBLEM: A security issue and a vulnerability have been reported in Red Hat Directory Server, which can be exploited by malicious users to disclose sensitive information. PLATFORM: Red Hat Directory Server 8.x ABSTRACT: If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password. Reference Links: Original Advisory Secunia ID 49734 CVE-2012-2678, CVE-2012-2746 IMPACT ASSESSMENT: Medium Discussion: 1) The security issue is caused due to new passwords being saved to the

158

U-158: HP NonStop Server Java Multiple Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP NonStop Server Java Multiple Vulnerabilities 8: HP NonStop Server Java Multiple Vulnerabilities U-158: HP NonStop Server Java Multiple Vulnerabilities April 30, 2012 - 7:00am Addthis PROBLEM: HP NonStop Server Java Multiple Vulnerabilities PLATFORM: HP NonStop Server 6.x ABSTRACT: Multiple vulnerabilities have been reported in HP NonStop Server Reference links: Secunia Advisory SA48977 CVE-2011-3547 CVE-2011-3551 CVE-2011-3553 IMPACT ASSESSMENT: High Discussion: HP has acknowledged multiple vulnerabilities in HP NonStop Server, which can be exploited by malicious users to disclose sensitive information and by malicious people to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system. Impact: Successful exploitation of this vulnerability may allow remote manipulation

159

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

160

Introducing djatoka: a reuse friendly, open source JPEG image server  

SciTech Connect

The ISO-standardized JPEG 2000 image format has started to attract significant attention. Support for the format is emerging in major consumer applications, and the cultural heritage community seriously considers it a viable format for digital preservation. So far, only commercial image servers with JPEG 2000 support have been available. They come with significant license fees and typically provide the customers with limited extensibility capabilities. Here, we introduce djatoka, an open source JPEG 2000 image server with an attractive basic feature set, and extensibility under control of the community of implementers. We describe djatoka, and point at demonstrations that feature digitized images of marvelous historical manuscripts from the collections of the British Library and the University of Ghent. We also caIl upon the community to engage in further development of djatoka.

Chute, Ryan M [Los Alamos National Laboratory; Van De Sompel, Herbert [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to...

162

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Gate Access Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register...

163

Congressional Testimony FOR INTERNAL ACCESS ONLY  

E-Print Network (OSTI)

Bludworth Island (created marsh); d, Mesquite Bay; ANWR, Aransas National Wildlife Refuge. 459S.C. Zeug et and nonvegetated habitats in ANWR from 100 1-m2 drop samples and our sample size (18 per marsh) appeared ad- equate) 457e466 #12;(Grus americana) that over-winter at ANWR and forage for blue crabs in adjacent marsh

164

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

165

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Citrix XenServer Multiple Flaws in Web Self Service Have 6: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified Impact February 17, 2012 - 8:30am Addthis PROBLEM: Multiple vulnerabilities were reported in Citrix XenServer Web Self Service. PLATFORM: Version(s): 5.5, 5.6 SP2, 6.0; Web Self Service prior to 1.1.1 ABSTRACT: A number of security vulnerabilities have been identified in the management web interface of Citrix XenServer Web Self Service. reference LINKS: Citrix Support Center SecurityTracker Alert ID:1026695 IMPACT ASSESSMENT: Medium Discussion: Customers who have installed XenServer but have not additionally downloaded and installed the optional Web Self Service component are not affected by these vulnerabilities. These vulnerabilities affect all currently supported

166

T-668: Vulnerability in a BlackBerry Enterprise Server component could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Vulnerability in a BlackBerry Enterprise Server component 8: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service July 14, 2011 - 7:20am Addthis PROBLEM: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service PLATFORM: Affected Software >> BlackBerry Enterprise Server (BES) version(s) 5.0.0 for API/MS Exchange (Admin API Option Only), BES/Express version 5.0.2 & 5.0.3 IBM Lotus Domino , BES 5.0.1, 5.0.2 & 5.0.3 for MS Exchange, IBM Lotus Domino, BlackBerry Enterprise Server versions 5.0.1 for GroupWise ABSTRACT: This advisory describes a security issue in the BlackBerry Administration

167

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

168

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27: Adobe InDesign Server SOAP Interface Lets Remote Users 27: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

169

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

170

V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe InDesign Server SOAP Interface Lets Remote Users 7: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands V-027: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands November 19, 2012 - 2:30am Addthis PROBLEM: Adobe InDesign Server SOAP Interface Lets Remote Users Execute Arbitrary Commands PLATFORM: CS5.5 7.5.0.142; possibly other versions ABSTRACT: Adobe InDesign Server "RunScript" SOAP Message Command Execution Vulnerability REFERENCE LINKS: Secunia Advisory SA48572 SecurityTracker Alert ID: 1027783 Adobe IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Adobe InDesign Server. A remote user can execute arbitrary commands on the target system. A remote user can send a specially crafted "RunScript" SOAP message to

171

Deploying Server-side File System Monitoring at NERSC  

E-Print Network (OSTI)

The Franklin Cray XT4 at the NERSC center was equipped with the server-side I/O monitoring infrastructure Cerebro/LMT, which is described here in detail. Insights gained from the data produced include a better understanding of instantaneous data rates during file system testing, file system behavior during regular production time, and long-term average behaviors. Information and insights gleaned from this monitoring support efforts to proactively manage the I/O infrastructure on Franklin. A simple model for I/O transactions is introduced and compared with the 250 million observations sent to the LMT database from August 2008 to February 2009. 1

Andrew Uselton

2009-01-01T23:59:59.000Z

172

Deploying Server-side File System Monitoring at NERSC  

SciTech Connect

The Franklin Cray XT4 at the NERSC center was equipped with the server-side I/O monitoring infrastructure Cerebro/LMT, which is described here in detail. Insights gained from the data produced include a better understanding of instantaneous data rates during file system testing, file system behavior during regular production time, and long-term average behaviors. Information and insights gleaned from this monitoring support efforts to proactively manage the I/O infrastructure on Franklin. A simple model for I/O transactions is introduced and compared with the 250 million observations sent to the LMT database from August 2008 to February 2009.

Uselton, Andrew

2009-05-01T23:59:59.000Z

173

Asynchronous data change notification between database server and accelerator controls system  

SciTech Connect

Database data change notification (DCN) is a commonly used feature. Not all database management systems (DBMS) provide an explicit DCN mechanism. Even for those DBMS's which support DCN (such as Oracle and MS SQL server), some server side and/or client side programming may be required to make the DCN system work. This makes the setup of DCN between database server and interested clients tedious and time consuming. In accelerator control systems, there are many well established software client/server architectures (such as CDEV, EPICS, and ADO) that can be used to implement data reflection servers that transfer data asynchronously to any client using the standard SET/GET API. This paper describes a method for using such a data reflection server to set up asynchronous DCN (ADCN) between a DBMS and clients. This method works well for all DBMS systems which provide database trigger functionality. Asynchronous data change notification (ADCN) between database server and clients can be realized by combining the use of a database trigger mechanism, which is supported by major DBMS systems, with server processes that use client/server software architectures that are familiar in the accelerator controls community (such as EPICS, CDEV or ADO). This approach makes the ADCN system easy to set up and integrate into an accelerator controls system. Several ADCN systems have been set up and used in the RHIC-AGS controls system.

Fu, W.; Morris, J.; Nemesure, S.

2011-10-10T23:59:59.000Z

174

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431  

E-Print Network (OSTI)

in 5 years the national energy consumption by servers andefficiency trends, national energy consumption by serversdata centers to national energy consumption, it is perhaps

Brown, Richard; Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency

2008-01-01T23:59:59.000Z

175

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

support site. The TFTP server is enabled by default. When upgrading, the enableddisabled setting that was previously selected will be preserved. Until the fix can be applied,...

176

Access to the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to the ALS Print User Access The ALS experiment floor (Building 6) is a Controlled Access Area for radiation protection. All ALS users are required to register with the ALS...

177

Law of Large Numbers Limits for Many Server Queues  

E-Print Network (OSTI)

This work considers a many-server queueing system in which customers with i.i.d., generally distributed service times enter service in the order of arrival. The dynamics of the system is represented in terms of a process that describes the total number of customers in the system, as well as a measure-valued process that keeps track of the ages of customers in service. Under mild assumptions on the service time distribution, as the number of servers goes to infinity, a law of large numbers (or fluid) limit is established for this pair of processes. The limit is characterised as the unique solution to a coupled pair of integral equations, which admits a fairly explicit representation. As a corollary, the fluid limits of several other functionals of interest, such as the waiting time, are also obtained. Furthermore, in the time-homogeneous setting, the fluid limit is shown to converge to its equilibrium. Along the way, some results of independent interest are obtained, including a continuous mapping result and a...

Kaspi, Haya

2007-01-01T23:59:59.000Z

178

Fluid limits of many-server queues with reneging  

E-Print Network (OSTI)

This work considers a many-server queueing system in which impatient customers with i.i.d., generally distributed service times and i.i.d., generally distributed patience times enter service in the order of arrival and abandon the queue if the time before possible entry into service exceeds the patience time. The dynamics of the system is represented in terms of a pair of measure-valued processes, one that keeps track of the waiting times of the customers in queue and the other that keeps track of the amounts of time each customer being served has been in service. Under mild assumptions, essentially only requiring that the service and reneging distributions have densities, as both the arrival rate and the number of servers go to infinity, a law of large numbers (or fluid) limit is established for this pair of processes. The limit is shown to be the unique solution of a coupled pair of deterministic integral equations that admits an explicit representation. In addition, a fluid limit for the virtual waiting ti...

Kang, Weining; 10.1214/10-AAP683

2010-01-01T23:59:59.000Z

179

Capital Access Program (Vermont)  

Energy.gov (U.S. Department of Energy (DOE))

The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

180

Automatic two way synchronization between server and multiple clients for HVAC system  

Science Conference Proceedings (OSTI)

The authors study different two way synchronization methods between a server and distributed clients. Client-server architectures are used to control multiple instances from center. Hard-coded embedded controllers are replaced by embedded controllers ... Keywords: HVAC, data synchronization, embedded systems, multi-agent systems, online file storage, thick client

Anton Tyukov; Adriaan Brebels; Maxim Shcherbakov

2011-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Klienten und Server mit TCL --Remote Procedure Calls und Verteilte Objekte  

E-Print Network (OSTI)

Klienten und Server mit TCL -- Remote Procedure Calls und Verteilte Objekte Axel-Tobias Schreiner-Server- Programmierung, die das Paket TCL-DP im Rahmen der Tool Command Language erschlie�t. Dieser Artikel beschäftigt sich mit aufwendigeren, aber auch wesentlich komfortableren Kommunikationsmechanismen, die TCL-DP zur

Schreiner, Axel-Tobias

182

Optimal Policy of a Server System with Replication Buffering Relay Method  

Science Conference Proceedings (OSTI)

Recently, a replication buffering relay method has been used for a server system. The replication buffering relay method replicates data synchronously and enables a fast system migration when a disaster has occurred in the main site. We have already ... Keywords: server system, disaster recovery, replication buffering relay method, cost effectiveness

Mitsutaka Kimura; Mitsuhiro Imaizumi; Toshio Nakagawa

2012-11-01T23:59:59.000Z

183

Upgrading LDM Server and Archive Systems to support Atmospheric Sciences at Texas A&M University  

E-Print Network (OSTI)

the aging archive infrastructure supporting data and metadata presentation using THREDDS and RAMADDA the aging LDM servers (bigbird.tamu.edu and sasquatch.tamu.edu) with a cluster of servers to provide high and weekly student-led briefings, to storm chasing. The department's computer labs utilize Gempak

184

Quantifying the Economic Value of Warranties in the U.S. Server Market  

Science Conference Proceedings (OSTI)

We quantify the economic value of hardware base warranties in the U.S. server market to manufacturers, channel intermediaries, and customers. We further decompose the value of a warranty into its insurance value and its price discrimination value, which ... Keywords: insurance, price discrimination, server market, sorting, structural modeling, warranty

Junhong Chu; Pradeep K. Chintagunta

2009-01-01T23:59:59.000Z

185

The SQL Server 7.0 Handbook: A Guide to Microsoft Database Computing, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:The SQL Server 7.0 Handbook concisely and authoritatively explains how to design, implement, administer, and tune Microsoft's powerful new database management system for Windows NT Readers will learn all major SQL Server 7.0 capabilities ...

Ken England; Nigel Stanley

1999-05-01T23:59:59.000Z

186

Still All on One Server: Perforce at Scale Dan Bloch, Google Inc.  

E-Print Network (OSTI)

Still All on One Server: Perforce at Scale Dan Bloch, Google Inc. May 21, 2011 Abstract Google runs. Perforce at Google Google's main Perforce server supports over twelve thousand users, has more than in the low hundreds of thousands of files. We have a single large depot with almost all of Google's projects

Cortes, Corinna

187

Power containers: an OS facility for fine-grained power and energy management on multicore servers  

Science Conference Proceedings (OSTI)

Energy efficiency and power capping are critical concerns in server and cloud computing systems. They face growing challenges due to dynamic power variations from new client-directed web applications, as well as complex behaviors due to multicore resource ... Keywords: hardware counters, multicore, operating system, power modeling, power virus, server and cloud computing

Kai Shen; Arrvindh Shriraman; Sandhya Dwarkadas; Xiao Zhang; Zhuan Chen

2013-04-01T23:59:59.000Z

188

U-139: IBM Tivoli Directory Server Input Validation Flaw | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: IBM Tivoli Directory Server Input Validation Flaw 39: IBM Tivoli Directory Server Input Validation Flaw U-139: IBM Tivoli Directory Server Input Validation Flaw April 3, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in IBM Tivoli Directory Server. A remote user can conduct cross-site scripting attacks PLATFORM: Version(s): 6.2, 6.3 ABSTRACT: The Web Admin Tool does not properly filter HTML code from user-supplied input before displaying the input. Reference LINKS: Vendor Advisory Security Tracker ID 1026880 CVE-2012-0740 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the IBM Tivoli Directory Server software and will run in the security context

189

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

190

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

191

V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Firefly Media Server Null Pointer Dereference Lets Remote 5: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service V-055: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service December 26, 2012 - 9:00am Addthis PROBLEM: Firefly Media Server Null Pointer Dereference Lets Remote Users Deny Service PLATFORM: Version(s): 1.0.0.1359 and prior ABSTRACT: A vulnerability was reported in Firefly Media Server REFERENCE LINKS: SecurityTracker Alert ID: 1027917 HTB Advisory ID: HTB23129 CVE-2012-5875 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can send specially crafted data to trigger a null pointer dereference and cause the target service to crash. IMPACT: A remote user can cause denial of service conditions. SOLUTION: No solution was available at the time of this entry. Addthis

192

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apache Traffic Server Host Header Processing Flaw Lets 4: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

193

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

194

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Stack-based buffer overflow in oninit in IBM Informix 9: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution February 17, 2011 - 7:00am Addthis PROBLEM: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution. PLATFORM: IBM Informix Dynamic Server (IDS) 11.50 ABSTRACT: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement. reference LINKS: Security Database - Reference - CVE-2011-1033 CVE Details - Reference - CVE-2011-1033

195

U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apache Traffic Server Host Header Processing Flaw Lets 34: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service March 27, 2012 - 7:00am Addthis PROBLEM: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service PLATFORM: Versions prior to 3.0.4 and 3.1.3 ABSTRACT: A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions. reference LINKS: SecurityTracker Alert ID: 1026847 CVE-2012-0256 Secunia Advisory SA48509 IMPACT ASSESSMENT: High Discussion: A remote user can send a request with a specially crafted 'Host' header value to trigger a heap allocation error and cause the target service to crash. Impact: A remote user can cause the target service to crash.

196

T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Citrix XenServer Lets Local Administrative Users on the 21: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 - 3:00pm Addthis PROBLEM: A vulnerability was reported in Citrix XenServer. A local administrative user on the guest operating system can cause denial of service conditions. PLATFORM: Citrix XenServer 5.6 Feature Pack 1 and prior ABSTRACT: A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor. reference LINKS: Document ID: CTX129208 SecurityTracker Alert ID: 1025524 Document ID: CTX129103 Document ID: CTX129102 Document ID: CTX128844 Document ID: CTX129101 Document ID: CTX129100 Citrix Support IMPACT ASSESSMENT Medium Discussion:

197

Microsoft Word - SmallServerRoomEfficiencyFactSheet.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

5E 5E Fact Sheet: Improving Energy Efficiency for Server Rooms and Closets Hoi Ying (Iris) Cheung, Rod Mahdavi, Steve Greenberg, Rich Brown and William Tschudi, Lawrence Berkeley National Laboratory (LBNL) Pierre Delforge, National Resources Defense Council (NRDC) Joyce Dickerson, Google Environmental Energy Technologies Division September 2012 DISCLAIMER This document was prepared as an account of work sponsored by the United States Government. While this document is believed to contain correct information, neither the United States Government nor any agency thereof, nor The Regents of the University of California, nor any of their employees, makes any warranty, express or implied, or assumes any legal responsibility for the accuracy, completeness, or usefulness of any information,

198

Stream combination: Adaptive IO scheduling for streaming servers  

E-Print Network (OSTI)

Cycle-based IO schedulers use statically configured timecycle durations. As a result, they are unable to avoid the formation of virtual bottlenecks. We term a bottleneck as virtual when it occurs within a single resource subsystem, and it is possible to use a secondary under-utilized resource to thwart the bottleneck. The primary reason for virtual bottlenecks in streaming servers is static allocation of memory and disk-bandwidth resources using fixed time-cycle durations. As a result, shifting request workload can cause a virtual bottleneck either in the memory or disk subsystem. We present stream combination, an adaptive IO scheduling technique that addresses this problem in a comprehensive fashion. Stream combination predicts the formation of virtual bottlenecks and proactively alters the IO schedule to avoid them. A simulation study suggests significant performance gains compared to the current state-of-the-art fixed time-cycle IO scheduler. 1

Bin Liu; Raju Rangaswami

2006-01-01T23:59:59.000Z

199

GlusterFS One Storage Server to Rule Them All  

SciTech Connect

GlusterFS is a Linux based distributed file system, designed to be highly scalable and serve many clients. Some reasons to use GlusterFS are: No centralized metadata server, Scalability, Open Source, Dynamic and live service modifications, Can be used over Infiniband or Ethernet, Can be tuned for speed and/or resilience and Flexible administration. It's useful for enterprise environments - virtualization; high performance computing (HPC) and it works with Mac, Linux and Windows clients. Conclusions are: (1) GlusterFS proved to have widespread capabilities as a virtual file system; (2) Scalability is very dependent upon the underlying hardware; (3) Lack of built-in encryption and security paradigm; and (4) Best suited in a general purpose computing environment.

Boyer, Eric B. [Los Alamos National Laboratory; Broomfield, Matthew C. [Los Alamos National Laboratory; Perrotti, Terrell A. [Los Alamos National Laboratory

2012-07-30T23:59:59.000Z

200

Announcement of Cloud & Accessibility Public Working Group ...  

Science Conference Proceedings (OSTI)

... Web server / Content Management; Identity Management; Document Retrieval / Library Systems. ... Dial up information: Phone: 877-953-0273. ...

2013-05-29T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Invisible helping hands : how can capital markets access the poor and promote entrepreneurial spirits? : an analysis of international microfinance investment potential and a proposal for securitization in a microfinance global pool  

E-Print Network (OSTI)

Donor grants and soft loans have been utilized by many microfinance institutions (MFIs) to support their operations. However, such grants and loans, already of limited size and availability, are becoming harder to access ...

Ueno, Daisuke, M.B.A. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

202

Building high availability with SteelEye LifeKeeper for SAP NetWeaver on SUSE Linux enterprise server  

E-Print Network (OSTI)

Building high availability with SteelEye LifeKeeper for SAP NetWeaver on SUSE Linux enterprise server

2008-01-01T23:59:59.000Z

203

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

204

Software development guidelines for Visual Basic and SQL Server  

Science Conference Proceedings (OSTI)

Development Guidelines are programming directions that focus not on the logic of the program but on its physical structure and appearance. These directions make the code easier to read, understand, and maintain. These guidelines are put in place to create a consistent set of conventions to follow that will standardize the development process. With these guidelines in place the readability and understanding others have when reviewing the code is greatly enhanced. Use these guidelines as a general rule when writing any set of logical statements. Development Guidelines are put into place in an effort to standardize the structure and style of the development process. They are not intended to limit or channel the developer's own creativity and flexibility. These guidelines will cover general development syntax, organization and documentation. The general information covers the high level areas of development, no matter what the environment. This guide will detail specific Visual Basic guidelines, following the same standard naming conventions set by Microsoft, with some minor additions. The guideline will finish with conventions specific to a Database or Microsoft's SQL Server specific environment.

IBSEN, T.G.

2000-07-26T23:59:59.000Z

205

Tank waste remediation system year 2000 dedicated file server project HNF-3418 project plan  

Science Conference Proceedings (OSTI)

The Server Project is to ensure that all TWRS supporting hardware (fileservers and workstations) will not cause a system failure because of the BIOS or Operating Systems cannot process Year 2000 dates.

SPENCER, S.G.

1999-04-26T23:59:59.000Z

206

Property:Building/SPElectrtyUsePercLargeComputersServers | Open Energy  

Open Energy Info (EERE)

SPElectrtyUsePercLargeComputersServers SPElectrtyUsePercLargeComputersServers Jump to: navigation, search This is a property of type String. Large computers / servers Pages using the property "Building/SPElectrtyUsePercLargeComputersServers" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 4.04016909393 + Sweden Building 05K0002 + 0.0 + Sweden Building 05K0003 + 0.0 + Sweden Building 05K0004 + 5.91955840631 + Sweden Building 05K0005 + 1.27160904517 + Sweden Building 05K0006 + 1.81235608552 + Sweden Building 05K0007 + 17.4089448462 + Sweden Building 05K0008 + 0.0 + Sweden Building 05K0009 + 0.983508828426 + Sweden Building 05K0010 + 6.66995976895 + Sweden Building 05K0011 + 1.71269481591 + Sweden Building 05K0012 + 2.03730351612 + Sweden Building 05K0013 + 0.0 +

207

Property:Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers |  

Open Energy Info (EERE)

LargeComputersServers LargeComputersServers Jump to: navigation, search This is a property of type String. Large computers / servers Pages using the property "Building/SPBreakdownOfElctrcityUseKwhM2LargeComputersServers" Showing 25 pages using this property. (previous 25) (next 25) S Sweden Building 05K0001 + 2.88701226026 + Sweden Building 05K0002 + 0.0 + Sweden Building 05K0003 + 0.0 + Sweden Building 05K0004 + 3.90838206628 + Sweden Building 05K0005 + 0.697674418605 + Sweden Building 05K0006 + 1.18332311465 + Sweden Building 05K0007 + 11.4098804421 + Sweden Building 05K0008 + 0.0 + Sweden Building 05K0009 + 0.556088941246 + Sweden Building 05K0010 + 10.0228832952 + Sweden Building 05K0011 + 0.471022727273 + Sweden Building 05K0012 + 0.774049003718 + Sweden Building 05K0013 + 0.0 +

208

V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Network Satellite Server Inter-Satellite Sync Remote 3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May 24, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server PLATFORM: Red Hat Network Satellite (v. 5.3 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 5) Red Hat Network Satellite (v. 5.4 for RHEL 6) Red Hat Network Satellite (v. 5.5 for RHEL 5) Red Hat Network Satellite (v. 5.5 for RHEL 6) ABSTRACT: The system does not properly validate all Inter-Satellite Sync operations REFERENCE LINKS: SecurityTracker Alert ID: 1028587 RHSA-2013:0848-1 CVE-2013-2056 IMPACT ASSESSMENT: Medium DISCUSSION: It was discovered that Red Hat Network Satellite did not fully check the

209

T-702: Apache web servers that allows a DOS attack | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apache web servers that allows a DOS attack 2: Apache web servers that allows a DOS attack T-702: Apache web servers that allows a DOS attack August 25, 2011 - 8:00pm Addthis PROBLEM: A denial of service vulnerability has been found in the way the multiple overlapping ranges are handled by apache PLATFORM: Apache 1.3 all versions, Apache 2 all versions ABSTRACT: Apache web servers that allows a DOS attack. reference LINKS: Apache Advisory Apache Archives CVE-2011-3192 IMPACT ASSESSMENT: High Discussion: Vulnerability commonly manifests itself when static content is made available with compression on the fly through mod_deflate - but other modules which buffer and/or generate content in-memory are likely to be affected as well. Impact: The attack can be done remotely and with a modest number of requests leads

210

T-649: Red Hat Network Satellite Server Request Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Network Satellite Server Request Validation Flaw 9: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks June 17, 2011 - 3:43pm Addthis PROBLEM: A vulnerability was reported in Red Hat Network Satellite Server. A remote user can conduct cross-site request forgery attacks. PLATFORM: Versions 5.4.x ABSTRACT: The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user. reference LINKS: SecurityTracker Alert ID: 1025674 RHSA-2011:0879-1 RHN Support CVE-2009-4139 IMPACT ASSESSMENT:

211

T-668: Vulnerability in a BlackBerry Enterprise Server component...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PLATFORM: Affected Software >> BlackBerry Enterprise Server (BES) version(s) 5.0.0 for APIMS Exchange (Admin API Option Only), BESExpress version 5.0.2 & 5.0.3 IBM Lotus Domino...

212

70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Package  

Science Conference Proceedings (OSTI)

A comprehensive program of textbook, lab manual and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to configure, manage, and troubleshoot a Microsoft Windows Server 2003 ...

Microsoft Official Academic Course

2010-02-01T23:59:59.000Z

213

TAPO: Thermal-aware power optimization techniques for servers and data centers  

Science Conference Proceedings (OSTI)

A large portion of the power consumption of data centers can be attributed to cooling. In dynamic thermal management mechanisms for data centers and servers, thermal setpoints are typically chosen statically and conservatively, which leaves significant ... Keywords: power leakage power, TAPO, thermal aware power optimization techniques, data centers, server centers, power consumption, dynamic thermal management mechanisms, thermal setpoints, power budget, heating ventilation and air conditioning, HVAC, circuit leakage power

Wei Huang; M. Allen-Ware; J. B. Carter; E. Elnozahy; H. Hamann; T. Keller; C. Lefurgy; Jian Li; K. Rajamani; J. Rubio

2011-07-01T23:59:59.000Z

214

T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: VMware vFabric tc Server Lets Remote Users Login Using 2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords. reference LINKS: SecurityTracker Alert ID: 1025923 VMware VFabric Download CVE-2011-0527 IMPACT ASSESSMENT: Medium Discussion: If the system stores passwords used for JMX authentication in an obfuscated form, a remote user can use the password in obfuscated form (or in plain

215

Central limit theorem for a many-server queue with random service rates  

E-Print Network (OSTI)

Given a random variable $N$ with values in ${\\mathbb{N}}$, and $N$ i.i.d. positive random variables $\\{\\mu_k\\}$, we consider a queue with renewal arrivals and $N$ exponential servers, where server $k$ serves at rate $\\mu_k$, under two work conserving routing schemes. In the first, the service rates $\\{\\mu_k\\}$ need not be known to the router, and each customer to arrive at a time when some servers are idle is routed to the server that has been idle for the longest time (or otherwise it is queued). In the second, the service rates are known to the router, and a customer that arrives to find idle servers is routed to the one whose service rate is greatest. In the many-server heavy traffic regime of Halfin and Whitt, the process that represents the number of customers in the system is shown to converge to a one-dimensional diffusion with a random drift coefficient, where the law of the drift depends on the routing scheme. A related result is also provided for nonrandom environments.

Atar, Rami

2008-01-01T23:59:59.000Z

216

Analysis of the power consumption of a multimedia server under different dvfs policies  

E-Print Network (OSTI)

Abstract—Dynamic voltage and frequency scaling (DVFS) has been a useful power management strategy in embedded systems, mobile devices, and wireless sensor networks. Recently, it has also been proposed for servers and data centers in conjunction with service consolidation and optimal resource-pool sizing. In this paper, we experimentally investigate the scope and usefulness of DVFS in a server environment. We set up a multimedia server which will be used in two different scenarios. In the first scenario, the server will host requests to download video files of known and available formats. In the second scenario, videos of unavailable formats can be accepted; in which case the server employs a transcoder to convert between AVI, MPEG and SLV formats before the videos are downloaded. The workload we generate has a uniform arrival rate and an exponentially distributed video size. We use four dynamic scaling policies which are widely used with existing mainstream Linux operating systems. Our observation is that while the gain of DVFS is clear in the first scenario (in which a predominantly IO-bound application is used), its use in the second scenario is rather counterproductive. Index Terms—Energy consumption of servers, dynamic voltage and frequency scaling, power consumption analysis, dynamic power management, energy consumption I.

Waltenegus Dargie

2012-01-01T23:59:59.000Z

217

Role Based Access Control  

Science Conference Proceedings (OSTI)

... Nash and Poland [10] discuss the application of role based access control to cryptographic authentication devices commonly used in the banking ...

218

Access Grid - CECM  

E-Print Network (OSTI)

"The Access Grid (AG) is the ensemble of resources that can be used to support ... We shall also illustrate the basic capture capacities that Smart Technology's ...

219

Science Open Access Journals  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. Results are consolidated and returned in relevance-ranked order, and users are...

220

Making VRML Accessible  

Science Conference Proceedings (OSTI)

... Paper - Making VRML Accessible for People with Disabilities by Sandy Ressler and Qiming Wang to Appear in Proceeding of ASSETS 98. ...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Optimal placement of proxies with server capacity constraints  

E-Print Network (OSTI)

Tenzekhti,F. Day,K. Ould-Khaoua,M. Proceedings of the 3rd International Conference on Information Technology (ACIT' 2002), The University of Qatar- Doha, Dec. 16-19, 2002. pp 672-679

Tenzekhti, F.; Day, K.; Ould-Khaoua, M.

222

Accessibility validation with RAVEN  

Science Conference Proceedings (OSTI)

Testing is, for most, a necessary evil in the software life cycle. One very important form of testing is the evaluation of software products according to mandated criteria or guidelines such as those that specify level of accessibility. Such evaluations ... Keywords: AOP, GUI, Java, accessibility, reflection, rich-client

Barry Feigenbaum; Michael Squillace

2006-05-01T23:59:59.000Z

223

Accessing HPSS at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Accessing HPSS Accessing HPSS Accessing HPSS Once you have successfully generated an HPSS token you can access NERSC's HPSS in the different ways listed below. HSI and HTAR are usually the best ways to transfer data in and out of HPSS but other methods are also included. Access Method When to use this method Features Limitations HSI When a full-featured unix-like interface is desired high performance (parallel); unix-like user interface; firewall mode client is specific to HPSS version and might not work at other sites; HTAR When you have large collections of smaller (~10MB or less) files high performance (parallel); creates a tar file directly in HPSS along with an index file; more efficient for large collections of file same client limitations as HSI; also does not have firewall mode so using on a remote site with a firewall will require modification of firewall rules

224

Global Access to Energy and Fresh Water - Nuclear Engineering Division  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Access to Energy and Fresh Water Global Access to Energy and Fresh Water International Safety Projects Overview Hydrogen as an Energy Carrier Global access to energy and fresh water International cooperation on safety of nuclear plants Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr International Safety Projects Global Access to Energy and Fresh Water Bookmark and Share Water Water shortages, unreliable water supplies, and poor water quality have been considered in recent years to be major obstacles to sustainable development and poverty alleviation that require urgent attention. Over 1 billion people lack access to safe drinking water. In such areas, water shortages are increasingly limiting development options.

225

Privacy Statement/SecurityNotice/Accessibility Statement  

Science Conference Proceedings (OSTI)

... Cookies are small files that Web servers place on a user's hard drive. They can serve several functions: they allow the Web ...

2013-07-19T23:59:59.000Z

226

IEA-Electricity Access Database | Open Energy Information  

Open Energy Info (EERE)

IEA-Electricity Access Database IEA-Electricity Access Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: IEA-Electricity Access Database Agency/Company /Organization: International Energy Agency (IEA) Topics: Co-benefits assessment, - Energy Access Resource Type: Dataset Website: www.iea.org/weo/electricity.asp Language: English IEA-Electricity Access Database Screenshot References: Electricity Access Database[1] "In a continuing effort to improve our understanding of the electrification process, we have updated, for the fifth time, the database on electrification rates that we first built for WEO-2002. The database shows detailed data on urban and rural electrification collected from industry, national surveys and international sources. Based on this updated analysis,

227

ENGINEERING InternatIonal  

E-Print Network (OSTI)

and multilateral, for example, the asian development Bank, International atomic energy agency (united nations and the Sydney cBd, our city campus is easily accessible by bus and train. close to cosmopolitan inner-city suburbs such as glebe, Surry Hills and darling Harbour, the city campus is surrounded by places to shop

University of Technology, Sydney

228

T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

02: BlackBerry Enterprise Server Input Validation Flaw in 02: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks T-602: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks April 14, 2011 - 5:07am Addthis PROBLEM: BlackBerry Enterprise Server Input Validation Flaw in BlackBerry Web Desktop Manager Permits Cross-Site Scripting Attacks PLATFORM: BlackBerry Enterprise Server Express versions 5.0.1 and 5.0.2 for Microsoft Exchange, 5.0.2 for IBM Lotus Domino, 5.0.0 through 5.0.3 for Microsoft Exchange and IBM Lotus Domino, and version 5.0.1 for Novell GroupWise. OS Platform(s): Windows (2000), Windows (2003), Windows (2008) ABSTRACT: The BlackBerry Web Desktop Manager not properly filter HTML code from

229

The Broadband Access Facility  

Science Conference Proceedings (OSTI)

The deployment of broadband access networks will revolutionise many aspects of society in the early years of the next millennium. Manufacturers, telecommunications providers and cable television operators world-wide are investing heavily on research ...

J. Kelly; R. Adnams; M. Enrico; M. Whittle

2000-01-01T23:59:59.000Z

230

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Drupal Core Access Bypass and Arbitrary PHP Code Execution 52: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core Bugtraq ID: 56993 Secunia Advisory SA51517 CVE-2012-5651 CVE-2012-5652 CVE-2012-5653 IMPACT ASSESSMENT: Medium DISCUSSION: An attacker can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid in launching further attacks.

231

T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

48: Avaya IP Office Manager TFTP Server Lets Remote Users 48: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory June 16, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Avaya IP Office Manager. A remote user can view files on the target system. PLATFORM: Versions 5.0.x - 6.1.x ABSTRACT: The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software. reference LINKS: ASA-2011-156 SecurityTracker Alert ID: 1025664 Secunia Advisory: SA43884 Avaya Support IMPACT ASSESSMENT: Medium Discussion: Avaya IP Office Manager is an application for viewing and editing an IP Office system's configuration. It can be used to securely connect to and

232

Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 -  

NLE Websites -- All DOE Office Websites (Extended Search)

Rolling Debian 6 Updates for Interactive Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 - 11/9 Rolling Debian 6 Updates for Interactive Machines and Web Servers 11/2 - 11/9 November 7, 2012 (0 Comments) The JGI computational resources are being updated to Debian 6 this week and next. Because of the staff-intensive work required to update the login nodes, interactive nodes, and the web servers, these machines will be updated between 11/02 and 11/09. The genepool cluster nodes will be updated during the scheduled quarterly maintenance on 11/13 between 7:00AM and 7:00PM. The work on the interactive nodes will begin each day at 9:00AM, and should conclude by 5:00PM. Debian6 Update Schedule 11/02/2012 - 11/09/2012 Friday, 2012-11-02 gpint01 - Previously down for hardware maintenance *complete

233

Martingale proofs of many-server heavy-traffic limits for Markovian queues  

E-Print Network (OSTI)

This is an expository review paper illustrating the ``martingale method'' for proving many-server heavy-traffic stochastic-process limits for queueing models, supporting diffusion-process approximations. Careful treatment is given to an elementary model -- the classical infinite-server model $M/M/\\infty$, but models with finitely many servers and customer abandonment are also treated. The Markovian stochastic process representing the number of customers in the system is constructed in terms of rate-1 Poisson processes in two ways: (i) through random time changes and (ii) through random thinnings. Associated martingale representations are obtained for these constructions by applying, respectively: (i) optional stopping theorems where the random time changes are the stopping times and (ii) the integration theorem associated with random thinning of a counting process. Convergence to the diffusion process limit for the appropriate sequence of scaled queueing processes is obtained by applying the continuous mappin...

Pang, Guodong; Whitt, Ward

2007-01-01T23:59:59.000Z

234

The Earth System Grid Federation: An open infrastructure for access to distributed geospatial data  

Science Conference Proceedings (OSTI)

The Earth System Grid Federation (ESGF) is a multi-agency, international collaboration that aims at developing the software infrastructure needed to facilitate and empower the study of climate change on a global scale. The ESGF's architecture employs ... Keywords: Peer to peer computing,Meteorology,Protocols,Software,Security,Servers,Indexes,CMIP5,Earth System Grid Federation (ESGF),peer-to-peer (P2P),Node,security,search,discovery,climate science

Sandro Fiore, Zed Pobre, Roland Schweitzer, Gavin M. Bell, Galen Shipman, Rachana Ananthakrishnan, Daniel Crichton, Sebastian Denvil, Mark Morgan, Feiyi Wang, Neill Miller, Estanislao Gonzalez, Luca Cinquini, Chris Mattmann, John Harney

2012-10-01T23:59:59.000Z

235

Mozambique-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Biofuels, Land Access and Rural Livelihoods Biofuels, Land Access and Rural Livelihoods Jump to: navigation, search Name Mozambique-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Biomass, - Biofuels, Forestry, Agriculture Topics Implementation, Co-benefits assessment, - Energy Access, Resource assessment, Background analysis Resource Type Publications, Case studies/examples Website http://www.iied.org/pubs/pdfs/ Country Mozambique UN Region Eastern Africa References Mozambique-Biofuels, Land Access and Rural Livelihoods[1] Mozambique-Biofuels, Land Access and Rural Livelihoods Screenshot Background "This report documents how the spread of biofuels is affecting land access for poorer groups in Mozambique, and what actions are being taken,

236

Access to Climate Change Technology by Developing Countries | Open Energy  

Open Energy Info (EERE)

Access to Climate Change Technology by Developing Countries Access to Climate Change Technology by Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Access to Climate Change Technology by Developing Countries Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Energy, Land Focus Area: Renewable Energy Topics: Finance, Implementation Resource Type: Publications, Guide/manual Website: ictsd.org/downloads/2009/11/access-to-climate-change-technology-by-dev Access to Climate Change Technology by Developing Countries Screenshot References: Developing Country-Access to CC Tech[1] "The paper critically examines various approaches that have been suggested for achieving greater access to climate change technology by developing countries, including compulsory licensing, patent pools, patent databases

237

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431: Appendices  

Science Conference Proceedings (OSTI)

This report is the appendices to a companion report, prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

2007-08-02T23:59:59.000Z

238

Report to Congress on Server and Data Center Energy Efficiency: Public Law 109-431  

Science Conference Proceedings (OSTI)

This report was prepared in response to the request from Congress stated in Public Law 109-431 (H.R. 5646),"An Act to Study and Promote the Use of Energy Efficient Computer Servers in the United States." This report assesses current trends in energy use and energy costs of data centers and servers in the U.S. (especially Federal government facilities) and outlines existing and emerging opportunities for improved energy efficiency. It also makes recommendations for pursuing these energy-efficiency opportunities broadly across the country through the use of information and incentive-based programs.

Alliance to Save Energy; ICF Incorporated; ERG Incorporated; U.S. Environmental Protection Agency; Brown, Richard E; Brown, Richard; Masanet, Eric; Nordman, Bruce; Tschudi, Bill; Shehabi, Arman; Stanley, John; Koomey, Jonathan; Sartor, Dale; Chan, Peter; Loper, Joe; Capana, Steve; Hedman, Bruce; Duff, Rebecca; Haines, Evan; Sass, Danielle; Fanara, Andrew

2007-08-02T23:59:59.000Z

239

Customer A arrives at a service facility with 3 servers at time t = 0 and finds all the servers are busy and 4 other customers waiting for service in the queue. The service discipline is  

E-Print Network (OSTI)

state is defined as n, the number of total customers in the queue, n = 0, 1, 2, · · · , 8. The stateQuestion 1 Customer A arrives at a service facility with 3 servers at time t = 0 and finds all the servers are busy and 4 other customers waiting for service in the queue. The service discipline is FCFS

Shihada, Basem

240

Performance and scalability of OpenMP programs on the sun FireTM e25k throughput computing server  

Science Conference Proceedings (OSTI)

The Sun FireTM K is the first generation of high-end servers built to the Throughput Computing strategy of Sun Microsystems. The server can scale up to 72 UltraSPARC® IV processors with Chip MultiThreading (CMT) technology, and execute ...

Myungho Lee; Brian Whitney; Nawal Copty

2004-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

TACOMA: Server and workload management in internet data centers considering cooling-computing power trade-off and energy proportionality  

Science Conference Proceedings (OSTI)

A two-tier Internet data center management scheme, TACOMA, with thermal-aware server provisioning (TASP) in one tier, and thermal-aware workload distribution (TAWD) in the other is proposed. TASP and TAWD coordinate to maximize the energy ... Keywords: Data center, and cooling computing power trade-off, energy saving, energy-proportional systems, thermal aware server provisioning, thermal aware workload distribution

Zahra Abbasi; Georgios Varsamopoulos; Sandeep K. S. Gupta

2012-06-01T23:59:59.000Z

242

Client-Server Based LBS Architecture: A Novel Positioning Module for Improved Positioning Performance  

Science Conference Proceedings (OSTI)

This work presents a new efficient positioning module that operates over client-server LBS architectures. The aim of the proposed module is to fulfil the position information requirements for LBS pedestrian applications by ensuring the availability of ... Keywords: Accuracy and Integrity, EGNOS, GPS, LBS, Positioning Module

Mohammad AL Nabhan; Suleiman Almasri; Vanja Garaj; Wamadeva Balachandran; Ziad Hunaiti

2010-07-01T23:59:59.000Z

243

A Review and Analysis of Commercial User Modeling Servers for Personalization on the World Wide Web  

Science Conference Proceedings (OSTI)

The aim of this article is to present and discuss selected commercial user modeling systems against the background of deployment requirements in real-world environments. Following the recent trend towards personalization on the World Wide Web, these ... Keywords: commercial user modeling, company profiles, customer relationship management, deployment requirements, electronic commerce, one-to-one marketing, personalization, product reviews, user modeling servers

Josef Fink; Alfred Kobsa

2000-02-01T23:59:59.000Z

244

Towards a pluralist internet using a virtual machine server for network customization  

Science Conference Proceedings (OSTI)

The Internet success is frequently credited to its basic pillars, the end-to-end argument and the TCP/IP protocol stack. Nevertheless, this simple architecture does not facilitate the addition of new services such as mobility, security, and quality of ... Keywords: future internet, virtual machine server, virtualization

Rafael dos Santos Alves; Miguel Elias M. Campista; Luís Henrique M. K. Costa; Otto Carlos M. B. Duarte

2012-11-01T23:59:59.000Z

245

Klienten und Server mit TCL Axel-Tobias Schreiner, Universitt Osnabrck  

E-Print Network (OSTI)

Klienten und Server mit TCL Axel-Tobias Schreiner, Universität Osnabrück Im letzten Heft hat Dieter Glau� die Tool Command Language TCL vorgestellt und gezeigt, wie leicht man damit X vielen Erweiterungen, die auf TCL aufbaut und ebenfalls im Netz frei verfügbar ist. Mit tcl-dp kann man

Schreiner, Axel-Tobias

246

JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers  

E-Print Network (OSTI)

JETC: Joint Energy Thermal and Cooling Management for Memory and CPU Subsystems in Servers Raid In this work we propose a joint energy, thermal and cooling management technique (JETC) that significantly re to thermal de- pendencies between CPU and memory and non-linearity in cooling energy. This motivates us

Simunic, Tajana

247

Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems  

E-Print Network (OSTI)

Balancing Peer and Server Energy Consumption in Large Peer-to-Peer File Distribution Systems. This paper investigates the most energy efficient way to distribute a file to a large number of recipients] has been paid to its energy consumption. This paper considers large scale file distribution

Andrew, Lachlan

248

DESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH  

E-Print Network (OSTI)

for incoming calls to the exported remote object. The others are worker threads for handling each accepted-time worker threads for handling incoming calls to exported remote objects. We have modified the run() methodDESIGN REAL-TIME JAVA REMOTE METHOD INVOCATION: A SERVER-CENTRIC APPROACH Sangig Rho Samsung

Choi, Byung K.

249

Comparing Simplification and Image-Based Techniques for 3D Client-Server Rendering Systems  

E-Print Network (OSTI)

Comparing Simplification and Image-Based Techniques for 3D Client-Server Rendering Systems W transfer and rendering load of the methods. Byte size and expected lifetime of simplifications. An example result is that in typical viewing and rendering conditions and for objects with a radius

Jansen, Erik

250

Deploying a massively multiplayer online game with a low-latency server infrastructure  

Science Conference Proceedings (OSTI)

The massively multiplayer online game (MMOG) industry has become an important e-commerce segment due to its impact on the economy. A MMOG requires the deployment of dozens to hundreds of n-tiered servers around the world to support millions of concurrent ... Keywords: Facility, Location, Massively multiplayer online games, Model

Yi Sun; Jack Y. Leu

2011-03-01T23:59:59.000Z

251

Barely Alive Memory Servers: Keeping Data Active in a Low-Power State  

E-Print Network (OSTI)

is not operational. PowerNap requires server software to avoid unwanted transitions to active state (e.g., due low power states with different levels of energy savings; (2) transition overheads are not significant others can be transitioned to a low-power state (barely-alive, Somniloquy, or off state). The behavior

Bianchini, Ricardo

252

Data collection system design in SSM networks with unicast feedback: server message definition  

Science Conference Proceedings (OSTI)

The system for mass data collection with cumulative acknowledge is described in this paper. A server message for cumulative acknowledgement is specified. The system is development for single source multicast networks. These networks are characterized ... Keywords: RTCP, RTP, SSM and ASM networks, data collection, unicast feedback

Martin Koutny; Pavel Silhavy; Jiri Hosek

2009-02-01T23:59:59.000Z

253

Data decomposition of Monte Carlo particle transport simulations via tally servers  

Science Conference Proceedings (OSTI)

An algorithm for decomposing large tally data in Monte Carlo particle transport simulations is developed, analyzed, and implemented in a continuous-energy Monte Carlo code, OpenMC. The algorithm is based on a non-overlapping decomposition of compute ... Keywords: Data decomposition, Exascale, Monte Carlo, Neutron transport, Tally server

Paul K. Romano, Andrew R. Siegel, Benoit Forget, Kord Smith

2013-11-01T23:59:59.000Z

254

A power, packaging, and cooling overview of the IBM eServer z900  

Science Conference Proceedings (OSTI)

This paper provides an overview of the power, packaging, and cooling aspects of the IBM eServer z900 design. The semiconductor processor chips must be supported and protected in a mechanical structure that has to provide electrical interconnects while ...

P. Singh; S. J. Ahladas; W. D. Becker; F. E. Bosco; J. P. Corrado; G. F. Goth; S. Iruvanti; M. A. Nobile; B. D. Notohardjono; J. H. Quick; E. J. Seminaro; K. M. Soohoo; C. Wu

2002-11-01T23:59:59.000Z

255

Green Task Scheduling Algorithms with Speeds Optimization on Heterogeneous Cloud Servers  

Science Conference Proceedings (OSTI)

Currently, a large number of cloud computing servers waste a tremendous amount of energy and emit a considerable amount of carbon dioxide. Thus, it is necessary to significantly reduce pollution and substantially lower energy usage. This paper seeks ... Keywords: Green Computing, Task Scheduling, Energy Reduction, Power-Aware Methods, Pollution Reduction

Luna Mingyi Zhang; Keqin Li; Yan-Qing Zhang

2010-12-01T23:59:59.000Z

256

Medusa: a novel stream-scheduling scheme for parallel video servers  

Science Conference Proceedings (OSTI)

Parallel video servers provide highly scalable video-on-demand service for a huge number of clients. The conventional stream-scheduling scheme does not use I/O and network bandwidth efficiently. Some other schemes, such as batching and stream merging, ... Keywords: multicast, stream batching, stream merging, unicast, video-on-demand

Hai Jin; Dafu Deng; Liping Pang

2004-01-01T23:59:59.000Z

257

Managing versions of web documents in a transaction-time web server  

Science Conference Proceedings (OSTI)

This paper presents a transaction-time HTTP server, called TTApache that supports document versioning. A document often consists of a main file formatted in HTML or XML and several included files such as images and stylesheets. A change to any of the ... Keywords: observant system, transaction time, versioning

Curtis E. Dyreson; Hui-ling Lin; Yingxia Wang

2004-05-01T23:59:59.000Z

258

Using certes to infer client response time at the web server  

Science Conference Proceedings (OSTI)

As businesses continue to grow their World Wide Web presence, it is becoming increasingly vital for them to have quantitative measures of the mean client perceived response times of their web services. We present Certes (CliEnt Response Time Estimated ... Keywords: Web server, client perceived response time

David Olshefski; Jason Nieh; Dakshi Agrawal

2004-02-01T23:59:59.000Z

259

A collaborative P2P scheme for NAT Traversal Server discovery based on topological information  

Science Conference Proceedings (OSTI)

In the current Internet picture more than 70% of the hosts are located behind Network Address Translators (NATs). This is not a problem for the client/server paradigm. However, the Internet has evolved, and nowadays the largest portion of the traffic ... Keywords: AS, Measurements, NAT, Relay, Simulation, p2p

Rubén Cuevas; Ángel Cuevas; Albert Cabellos-Aparicio; Loránd Jakab; Carmen Guerrero

2010-08-01T23:59:59.000Z

260

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Using Microfinance to Expand Access to Energy Services | Open Energy  

Open Energy Info (EERE)

Using Microfinance to Expand Access to Energy Services Using Microfinance to Expand Access to Energy Services Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Using Microfinance to Expand Access to Energy Services Agency/Company /Organization: United States Agency for International Development Sector: Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Finance Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: waterwiki.net/images/6/65/File_Energy_Summary_FINAL.pdf Language: English References: Using Microfinance to Expand Access to Energy Services[1] Logo: Using Microfinance to Expand Access to Energy Services "To carry out this research, SES and the SEEP Network invited MFIs in Africa, Asia, Latin America and the Caribbean (LAC) to participate in an

262

Server Consolidation SQL Server 2008 Server Consolidation  

E-Print Network (OSTI)

Michigan State University. All rights reserved. 2 #12;Available Reports in the Business Intelligence System State University. All rights reserved. 12 #12;Available Reports in the Business Intelligence System State University. All rights reserved. 13 #12;Available Reports in the Business Intelligence System

Narasayya, Vivek

263

Access Grid | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Grid Access Grid Access Grid The Access Grid is the ensemble of resources that can be used to support human interaction across the grid. It consists of multimedia display, presentation and interactive environments, interfaces to grid middleware, and interfaces to visualization environments. The Access Grid will support large-scale distributed meetings, collaborative work sessions, seminars, lectures, tutorials and training. The Access Grid design point is group-to-group communication (thus differentiating it from desktop to desktop based tools that focus on individual communication). The Access Grid environment must enable both formal and informal group interactions. Large-format displays integrated with intelligent or active meeting rooms are a central feature of the Access Grid nodes. Access Grid nodes are

264

Evaluation of a server-client architecture for accelerator modeling and simulation  

Science Conference Proceedings (OSTI)

Traditional approaches to computational modeling and simulation often utilize a batch method for code execution using file-formatted input/output. This method of code implementation was generally chosen for several factors, including CPU throughput and availability, complexity of the required modeling problem, and presentation of computation results. With the advent of faster computer hardware and the advances in networking and software techniques, other program architectures for accelerator modeling have recently been employed. Jefferson Laboratory has implemented a client/server solution for accelerator beam transport modeling utilizing a query-based I/O. The goal of this code is to provide modeling information for control system applications and to serve as a computation engine for general modeling tasks, such as machine studies. This paper performs a comparison between the batch execution and server/client architectures, focusing on design and implementation issues, performance, and general utility towards accelerator modeling demands.

Bowling, B.A.; Akers, W.; Shoaee, H.; Watson, W.; Zeijts, J. van; Witherspoon, S.

1997-11-01T23:59:59.000Z

265

VEHICLE ACCESS PORTALS  

NLE Websites -- All DOE Office Websites (Extended Search)

East Jemez Road (Map 1) East Jemez Road (Map 1) VEHICLE ACCESS PORTALS Traffic Lane 1: Closed except for emergencies and maintenance operations. Traffic Lanes 2-7: Drivers required to stop and present LANL badges or other form of valid identification to Protective Force officers. Drivers may proceed upon direction of the officers. Note: Commercial delivery vehicle drivers must also pres- ent their inspection passes from Post 10. More Information: spp-questions@lanl.gov Non-work Hours Vehicles entering LANL at the East Jemez VAPs during non-work hours (between 7

266

FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM At the Clean Energy Ministerial in Washington, D.C. on July 19 th and 20 th , leaders from the International Finance Corporation (IFC), Italy, and the United States launched a new program to bring clean, high-quality energy services to the 1.6 billion people current lacking access to modern energy - simultaneously alleviating poverty, improving human health, and reducing emissions of greenhouse gases.

267

ARCS – Access Rate Control System  

protected steel housing. ... Access Rate Control System This rugged, maintenance- ... Y-12 is seeking an industry partner to fully com-

268

Topic: Emergency Egress and Access  

Science Conference Proceedings (OSTI)

Topic: Emergency Egress and Access. Fire Research Seminar Series. NIST WTC Recommendations Are Basis for New Set of Revised Codes. ...

2012-08-20T23:59:59.000Z

269

Robustness of Ethernet-Based Real-Time Networked Control System with Multi-Level Client/Server Architecture  

E-Print Network (OSTI)

The importance of real-time communication at the device level in a factory automation setup is a widely researched area. This research is an effort to experimentally verify if Ethernet can be used as a real-time communication standard in a factory automation setup, by observing the effects of packet delays, packet loss, and network congestion on the performance of a networked control system (NCS). The NCS experimental setup used in this research involves real-time feedback control of multiple plants like DC motors and a magnetic-levitation system connected to one or more controllers. A multi-client-multi-server architecture on a local area network (LAN) was developed using user datagram protocol (UDP) as the communication protocol. Key observations are as follows. (1) The multi-client-single-server system showed the highest packet delays compared to single-client-single-server architecture. (2) In the singleclient- single-server system, as the Ethernet link utilization increased beyond 82 percent, the average packet delays and steady-state error of the DC motor speed-control system increased by 2231 percent and 304 percent, respectively. (3) Even under high link utilization, adding an additional server to the NCS reduced average packet delays considerably. (4) With large packet sizes, higher packet rates were automatically throttled by Ethernet’s flow control mechanism affecting the real-time communication negatively. (5) In the multiclient- multi-server architecture, average packet delays at higher packet rates, and at higher packet lengths were found to be 40 percent lesser than the those of the single-clientsingle- server system and 87.5 percent lesser than those of the multi-client-single-server system.

Bibinagar, Naveen Kumar

2010-08-01T23:59:59.000Z

270

Open Access Transmission Tariff  

NLE Websites -- All DOE Office Websites (Extended Search)

Transmission | OATT Transmission | OATT Skip Navigation Links Transmission Functions Infrastructure projects Interconnection OASIS OATT Western Open Access Transmission Service Tariff Revision Western Area Power Administration submitted its revised Open Access Transmission Service Tariff with the Federal Energy Regulatory Commission on Sept. 30, 2009. The tariff became effective on Dec. 1, 2009, as modified by Western's March 2, 2011 compliance filing. The revised tariff was developed to comply with FERC Order No. 890 and to be consistent with Western's statutory and regulatory requirements. It addresses changes in transmission services and planning. FERC issued an order on Dec. 2, 2010, granting Western's petition for a Declaratory Order approving the tariff as an acceptable reciprocity tariff, subject to Western making a compliance filing within 30 days to address items in Attachment C, Attachment P and Attachment Q. Western made its compliance filing on March 2, 2010, addressing FERC's Dec. 2, 2010, order. FERC accepted Western's March 2, 2011 compliance filing on April 25, 2011. Western has made several ministerial filings to its OATT as part of FERC's eTariff viewer system, the last of these was approved on March 29, 2013. Further detail can be found in the links below.Current OATT

271

Workshop Offers US Industry Access to International R&D ...  

Science Conference Proceedings (OSTI)

... includes more than 300 companies and 200 ... especially interested in increasing American participation ... to lifecycle sustainability, energy efficiency to ...

2012-03-05T23:59:59.000Z

272

Proposed Open Access Requirement for International Electric Transmissi...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

is given of the Department of Energy's (DOE or Department) intention to amend existing Presidential permits issued for the construction, operation, maintenance, or connection of...

273

NSLS User Access | Training  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Training Training for New Users and Users with Expired Training and/or Badges: All new users and users with expired badges must complete or update the training modules shown below prior to access to the experimental floor. The training can be completed online prior to arrival at the NSLS and is strongly recommended to save considerable time during check-in at the Guest, User, Visitor (GUV) Center in Building 400. Please note each training module is followed by an exam which asks for your name and guest number. If you do not already have a guest number, leave this entry blank. All new users and users with expired badges MUST arrive on a weekday (no weekends or holidays) and check in at the GUV Center so that your training can be verified and to receive a photo ID badge (new or updated). The GUV

274

Template Discontinuation Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR SUBJECT FOR SUBJECT FROM: Personnel Security Program Manager SUBJECT: Discontinuation of Access Eligibility Determination Reference is made to your Questionnaire for National Security Positions signed on [insert date], which was forwarded to this office in connection with a Department of Energy security clearance request. A review of that form disclosed recent use of illegal drugs. [Insert a brief description of the circumstances such as: Specifically, you listed marijuana use 1 time in 5/02; 1 time in 2/03; and 1 time in 3/07.] This office has discontinued the personnel security processing of your security clearance due to your illegal drug usage within twelve months of the signing of your security clearance application.

275

Remote I/O : fast access to distant storage.  

SciTech Connect

As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

1997-12-17T23:59:59.000Z

276

REMOTE ACCESS SERVICES | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Access the information you need... Anywhere. Anytime. Different service providers within the Department offer remote access services based on your specific work requirements. If you need assistance, please contact your individual service provider. Energy IT Services (EITS) Remote Access Services Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network Instructions Citrix Workplace Instructions Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN Office of Intelligence and Counterintelligence (IN) Remote Access Services Outlook Web Access Office of Science (SC) Remote Access Services Citrix Workplace Help for EITS Customers

277

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Core Plan OPEN ACCESS PLUS MEDICAL BENEFITS ............................................................................................................................................11 Open Access Plus Medical Benefits

278

Server Help  

NLE Websites -- All DOE Office Websites (Extended Search)

AAAAAA. Salt Concentration The millimolar concentration of salt (usually KCl) in the PCR. Primer3 uses this argument to calculate oligo melting temperatures. DNA Concentration...

279

U.S. CMS - U.S. CMS @ Work - Software and Computing Subproject - Access to  

NLE Websites -- All DOE Office Websites (Extended Search)

In This Section: In This Section: Data Operations Facility Operations Tier-1 Access to Mass Storage EOS EOS is a disk based mass storage system being evaulated on the LPC cluster. It is mounted on the LPC interactive nodes and the LPC batch nodes at the path /eos/uscms/store/user/ Users may request a directory there by sending email to cms-t1@fnal.gov. Unix file commands (cp and mv) work to move files into and out of EOS (which is different from dcache). Running cp between two paths in EOS however does not work. You should also be able to read and write files from programs like Root and CMSSW as well. SRM access - there is also an SRM endpoint available at srm://cmseos.fnal.gov:8443/srm/v2/server?SFN=/eos/uscms and the command to use is: srmcp -2 -debug file:////uscms/home/catalind/eos-a

280

Laboratory Access | Sample Preparation Laboratories  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Access Planning Ahead Planning Ahead Please complete the Beam Time Request (BTR) and Support Request forms thourgh the User Portal. Thorough chemical and sample information must be included in your BTR. Support Request forms include a list of collaborators that require laboratory access and your group's laboratory equipment requests. Researcher safety is taken seriously at SLAC. Please remember that radioactive materials, nanomaterials, and biohazardous materials have additional safety requirements. Refer to the SSRL or LCLS Safety Offices for further guidance. Upon Arrival Upon Arrival Once you arrive you must complete training and access forms before accessing the Sample Preparation Laboratories (SPL). All Sample Prep Lab doors are locked with access key codes. Once your SPL

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Client/Server distributed processing using SunOS remote procedure protocol  

SciTech Connect

Over the last ten years the development of PC's and workstations has changed the way computing is performed. Previously, extensive computations were performed on large high speed mainframe machines with substantial storage capacity. Large capital and operational costs were associated with these machines. The advent of more powerful workstations has brought more computational cycles to the users at lower cost than was achieved with busy timesharing systems. However, many users still can't afford individual special purpose hardware or gigabytes of storage. A successful distributed processing environment must share these resources. Client/Server models have been proposed to address the issues of shared resources. They are not a new idea, but their implementation has been difficult. With the introduction of SUN's public domain Remote Procedure Call (RPC) Protocol and SUN's interface generator, RPCGEN, their implementation has been made easier. SUN has developed a set of C'' callable routines that handle the Client/Server operations. The availability of Network File System (NFS) on the SRL CRAY and the arrival of Wollongong's latest version of NFS has allowed applications and information sharing between computing platforms. This paper reviews the Client/Server model with respect to SUN's RPC implementation. The discussion will focus on the RPC connection between local and remote machines, the RPC Paradigm for making remote procedure calls, and the programming levels of the RPC libraries. The paper will conclude with summaries of two applications developed at SRL using the protocol and their effect on our computing environment. These include the Nuclear Plant Analyzer and an animation of fluids using behavioral simulation of atom-like particles.

Hammer, K.E.; Gilman, T.L.

1990-01-01T23:59:59.000Z

282

Optical access port  

DOE Patents (OSTI)

A 0.025 m diameter optical access port system is provided for a high-pressure (20.4 bars) and high-temperature (538{degrees}C) fixed-bed coal gasification process stream. A pair of proximal channels lead into the pipe containing the process stream with the proximal channels disposed on opposite sides of the pipe and coaxial. A pair of ball valves are attached to respective ends of proximal channels for fluidly closing the respective channels in a closed position and for providing a fluid and optical aperture in an open position. A pair of distal channels are connected to respective ball valves. These distal channels are also coaxial with each other and with the proximal channels. Each distal channel includes an optical window disposed therein and associated sealing gaskets. A purge gas is introduced into each distal channel adjacent a respective optical window. The purge gas is heated by a heater before entry into the distal channels. Preferably the optical windows are made of fused silica and the seals are Grafoil gaskets which are pressed against the optical window. 3 figs.

Lutz, S.A.; Anderson, R.J.

1988-09-14T23:59:59.000Z

283

Access Control Policy Tool (ACPT)  

Science Conference Proceedings (OSTI)

... In regard to cyber security, privacy, and information sharing, access control is one of the crucial elements in protecting the nation's critical IT ...

2013-01-15T23:59:59.000Z

284

Foreign National Access Request Form  

NLE Websites -- All DOE Office Websites (Extended Search)

will be allowed access to the ANL facility prior to approval by the Security and Counterintelligence Division. The visitor must have a valid passport and visa (or supplemental...

285

Science Open Access Journals - About  

Office of Scientific and Technical Information (OSTI)

SOAJ allows the user to search multiple open access publications with a single query. The query is sent simultaneously to each individual database searched by SOAJ,...

286

Furman University OPEN ACCESS PLUS MEDICAL  

E-Print Network (OSTI)

8:54 AM Furman University OPEN ACCESS PLUS MEDICAL BENEFITS ­ Basic Plan OPEN ACCESS PLUS MEDICAL ...................................................................................................................................................10 Open Access Plus Medical Benefits Basic Plan ...............................................................................................................................................................12 Open Access Plus Medical Benefits Core Plan

287

Asymptotic Approximations for Stationary Distributions of Many-Server Queues with Abandonment  

E-Print Network (OSTI)

A many-server queueing system is considered in which customers arrive according to a renewal process, and have service and patience times that are drawn from two independent sequences of independent, identically distributed random variables. Customers enter service in the order of arrival and are assumed to abandon the queue if the waiting time in queue exceeds the patience time. The state $Y^{(N)}$ of the system with $N$ servers is represented by a four-component process that consists of the backward recurrence time of the arrival process, a pair of measure-valued processes, one that keeps track of the waiting times of customers in queue and the other that keeps track of the amounts of time customers present in the system have been in service, and a real-valued process that represents the total number of customers in the system. Under general assumptions, it is first shown that $Y^{(N)}$ is a Feller process, admits a stationary distribution and is ergodic. The main result shows that when the associated fluid...

Kang, Weining

2010-01-01T23:59:59.000Z

288

Military students access top R&D  

NLE Websites -- All DOE Office Websites (Extended Search)

Military students access top R&D Military students access top R&D Military students access top R&D Cadets and midshipmen spend summer expanding their scientific knowledge at world-class Los Alamos facilities August 27, 2013 Military students access top R&D Micah Dose, a midshipman at the U.S. Naval Academy and a SARA intern in the Laboratory's ARIES program, peers inside the glovebox where plutonium pits are dis-assembled at Los Alamos. ARIES is the only program in the nation that disassembles and destroys surplus plutonium pits. The pits are transformed into plutonium oxide powder suitable for being made into fuel for civilian nuclear reactors. "There are a lot of summer training programs out there, but most are class-like," said U.S. Air Force cadet Dale Becker, mentored by the Physics

289

Internal Communication  

NLE Websites -- All DOE Office Websites (Extended Search)

9 Internal Communication Process 11_0303 Page 1 of 6 9 Internal Communication Process 11_0303 Page 1 of 6 EOTA - Business Process Document Title: Internal Communication Process Document Number: P-009 Rev 11_0303 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001 Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): N/A P-009 Internal Communication Process 11_0303 Page 2 of 6 Revision History: Rev. Description of Change A Initial Release 09_0902 Modified process to better fit current practice. 10_0831 Added verbiage to clarify process. Added initiation phrase to process steps. 11_0303 Added QAM to the last step and made minor editorial updates. P-009 Internal Communication Process 11_0303 Page 3 of 6 I. Purpose

290

U.S. OpenLabs: Promoting Clean Energy Development through Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

OpenLabs Feature: Interactive Map of U.S. National Laboratory International Initiatives U.S. OpenLabs Promoting Clean Energy Development through Access to Tools, Data, and...

291

Analysing the Java Package/Access Concepts in Isabelle/HOL  

E-Print Network (OSTI)

, but this internal structure only plays a role in the lookup process for a package. For accessibility concerns modifiers are described as enumeration: datatype acc-modi = Private | Package | Protected | Public an ordering on the access mod- ifiers, from most restrictive to most liberal: Private Package Protected

292

International Forest Policy Database | Open Energy Information  

Open Energy Info (EERE)

International Forest Policy Database International Forest Policy Database Jump to: navigation, search Tool Summary LAUNCH TOOL Name: International Forest Policy Database Agency/Company /Organization: GTZ Sector: Land Focus Area: Forestry Topics: Policies/deployment programs Resource Type: Dataset Website: www.etfrn.org/etfrn/topics/policy/index.html International Forest Policy Database Screenshot References: GTZ International Forest Policy Database[1] Overview "This topic page is being developed in cooperation with GTZ-IWP, the International Forest Policy project of the German organisation for international cooperation. GTZ-IWP has contributed considerably to the ETFRN NEWS 41/42 on national forest programmes. During this cooperation both GTZ and ETFRN identified a need for a central point of access to information on international forest

293

Greenpeace International  

E-Print Network (OSTI)

report 2 nd edition 2011 japan energy scenario“will we look into the eyes of our children and confess that we had the opportunity, but lacked the courage? that we had the technology, but lacked the vision?” Greenpeace International,

Energy Council; Erec Arthouros Zervos; Sven Teske; Junichi Sato; Hisayo Takada; Image Rice Fields In Kamikatsu; Wolfram Krewitt Dr. Thomas; Sydney Jay Rutovitz; Nicky Ison; Iida Hironao Matsubara

2011-01-01T23:59:59.000Z

294

Recovery Act: SeaMicro Volume Server Power Reduction Research Development  

Science Conference Proceedings (OSTI)

Cloud data centers are projected to be the fastest growing segment of the server market through 2015, according to IDC. Increasingly people and businesses rely on the Cloud to deliver digital content quickly and efficiently. Recovery Act funding from the Department of Energy has helped SeaMicro's technologies enhance the total cost of operation, performance and energy efficiency in large data center and Cloud environments. SeaMicro's innovative supercomputer fabric connects thousands of processor cores, memory, storage and input/output traffic. The company's fabric supports multiple processor instruction sets. Current systems featuring SeaMicro technology typically use one quarter the power and take one sixth the space of traditional servers with the same compute performance, yet deliver up to 12 times the bandwidth per core. Mozilla and eHarmony are two customers successfully using SeaMicro's technology. Numerous non-public customers have been successfully using the SeaMicro product in test and production facilities. As a result of the Recovery Act funding from the U.S. Department of Energy, more than 50 direct jobs were created at SeaMicro. To date, they primarily have been high-value, engineering jobs. Hardware, software and manufacturing engineering positions have been created, as well as sales and sales engineering. The positions have allowed SeaMicro to significantly accelerate engineering development and accelerate commercialization. As a result, commercialization and delivery to market are months ahead of initial schedule. Additional jobs were indirectly created through the development of the SeaMicro product. Through many years of research and hard work prior to receipt of public funding, SeaMicro was awarded 2 patents for its work. SeaMicro's product led the way for industry leaders to reconsider the market for low power servers and create new product lines. With valuable support of the U.S. Department of Energy and through SeaMicro's product, the market has been reshaped by the company's unique approach and ground breaking technology.

Gary Lauterbach

2012-03-22T23:59:59.000Z

295

Remote Access to Brookhaven, Information Services Division (ISD),  

NLE Websites -- All DOE Office Websites (Extended Search)

ISD Homepage ISD Homepage Site Details ISD Staff Remote Access Other Information BNL Site Index Can't View PDFs? Remote Access to Brookhaven External BNL users who need internet access to the internal ISD website which includes the Research Library, Records Management, Publications and Technical Editing must have a Virtual Private Network (VPN) account to connect to the BNL Internal Campus Network. This account can be setup by the Accounts Management Office. Available Options Remote Access Policy Broad-Band Connection: must use VPN with a CryptoCard Token Anti-Virus Procedures All Windows PCs should be running one of Brookhaven's official anti-virus software packages when connecting remotely to the BNL Internal Campus Network. Anti-Virus procedures are an important component of BNL's host-based security architecture. Anti-Virus software is the component of this architecture that provides a protection mechanism against malicious code. Malicious codes are programs, such as Trojan horses or viruses, that run on a host system without the authorization of the system user. These codes typically come from e-mail attachments, or can be downloaded along with programs from the Internet, or through an infected floppy disk. Properly installed anti-virus software can minimize these vulnerabilities.

296

Information Technology Special Provision UT-B Contracts Div Page 1 of 1  

E-Print Network (OSTI)

, wireless access points, and network appliances. Servers include, but are not limited to, database servers

297

Notices Accessible Format: Individuals with  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

472 Federal Register 472 Federal Register / Vol. 77, No. 83 / Monday, April 30, 2012 / Notices Accessible Format: Individuals with disabilities can obtain this document in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document

298

Network Access to Multimedia Information  

Science Conference Proceedings (OSTI)

This report summarises the requirements of research and academic network users for network access to multimedia information. It does this by investigating some of the projects planned or currently underway in the community. Existing information systems ...

C. Adie

1994-05-01T23:59:59.000Z

299

Categorical Exclusion for Access Road  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Road Access Road Improvements along the Pinnacle Peak- Prescott 230-kV Transmission Line between Structures 16813 and 170/1 Yavapai County. Arizona * RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Proposed Action: Western proposes to improve access roads along a portion of the Pinnacle Peak to Prescott 230-kV Transmission Line (Structures 168/3 and 170/1). which are currently impassable. to maintain worker safety and the reliability of the bulk electric system. Western plans to blade and grade the existing access road where it enters and leaves three washes so that Western's maintenance vehicles can drive across the washes. We will remove dirt from the road prism by starting at wash edges and pulling dirt up slope in order to create ramps with grades suitable for our equipment.

300

Fast Access to Distributed Atomic Memory  

Science Conference Proceedings (OSTI)

We study efficient and robust implementations of an atomic read-write data structure over an asynchronous distributed message-passing system made of reader and writer processes, as well as a number of servers implementing the data structure. We determine ... Keywords: Byzantine failures, atomic registers, distributed algorithms, fault-tolerance, shared-memory emulations, time-complexity

Partha Dutta; Rachid Guerraoui; Ron R. Levy; Marko Vukoli?

2010-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

FRA, LLC Internal Audit Charter  

NLE Websites -- All DOE Office Websites (Extended Search)

I. In I. In A. M policies a office wh Laborator FRA Aud the Board performan Prime Co B. O FRA and Practice Auditors, 1 2 3 4 5 C. A the FRA access to their miss full and p concerns nternal Aud Mission. All and controls hich reports a ry, works in dit Committe d of Directo nce of the in ontract betwe Objectives. T d Laboratory of Internal , that: . Internal a protecting . Internal ac unallowab . Operation i.e., opera . Appropria . Internal co assure effi security. Authority. Th President an all FRA per sion to the ex private acces and findings dit Charter: Fermi Resea are subject t administrativ consultation ee. This prov ors, with an nternal contro een FRA and The objective managemen Auditing an accounting c g the assets of ccounting co ble costs.

302

XML access control using static analysis  

Science Conference Proceedings (OSTI)

Access control policies for XML typically use regular path expressions such as XPath for specifying the objects for access-control policies. However such access-control policies are burdens to the query engines for XML documents. To relieve this burden, ... Keywords: Access control, XML, XPath, XQuery, automaton, query optimization, schema, static analysis, value-based access control, view schema

Makoto Murata; Akihiko Tozawa; Michiharu Kudo; Satoshi Hada

2006-08-01T23:59:59.000Z

303

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

304

Discrete-time GeoX/G/1 queue with unreliable server and multiple adaptive delayed vacations  

Science Conference Proceedings (OSTI)

In this paper we consider a discrete-time Geo^X/G/1 queue with unreliable server and multiple adaptive delayed vacations policy in which the vacation time, service time, repair time and the delayed time all follow arbitrary discrete distribution. By ... Keywords: Discrete-time queueing model, Multiple adaptive delayed vacation, Stochastic decomposition, Transient and steady-state distributions, Unreliable, primary, secondary

Yinghui Tang; Xi Yun; Shujuan Huang

2008-10-01T23:59:59.000Z

305

Argon: performance insulation for shared storage servers Matthew Wachs, Michael Abd-El-Malek, Eno Thereska, Gregory R. Ganger  

E-Print Network (OSTI)

-value, drawing on the analogy of the thermal resis- tance measure in building insulation. With an R-value of 1Argon: performance insulation for shared storage servers Matthew Wachs, Michael Abd-El-Malek, Eno) of the throughput it would get alone. Argon uses automatically- configured prefetch/write-back sizes to insulate

306

Internal Dosimetry  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MEASUREMENT MEASUREMENT SENSITIVE DOE-STD-1121-2008 Change Notice No.1 October 2013 DOE STANDARD INTERNAL DOSIMETRY U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document is available on the Department of Energy Technical Standards Program Web Site at http://energy.gov/hss/information-center/department-energy- technical-standards-program ii Change Notice 1. Internal Dosimetry DOE-STD-1121-2008 Page/Section Change Throughout Change: airborne contamination To: airborne radioactivity Section 1.5, p. 4 Change: HPS N 13.1-1999 To: HPS N 13.1-2011 Section 1.5, p. 4 Change: HPS N 13.6-1999 To: HPS N 13,.6-2010 Section 1.5, p. 4 Delete: HPS N 13.14-1994, Internal Dosimetry Programs for

307

MACS as a tool for international inspections  

SciTech Connect

The MACS/ACRS (Managed Access by Controlled Sensing/Access by Controlled Remote Sensing) system is a collection of communication devices, video capability, and distance-measuring equipment which can effectively substitute for the physical presence of a challenge inspector within a facility. The MACS design allows growth of the prototype, developed in response to the Chemical Weapons Convention (CWC), into a versatile device for inspection of sensitive nuclear facilities under other international arrangements, for example the proposed Fissile Material Cutoff Convention. A MACS/ACRS-type system in a standard, international-recognized configuration could resolve sensitive information and safety concerns through providing a means of achieving the goals of an inspection while excluding the inspector. We believe the technology used to develop MACS for the Defense Nuclear Agency, followed by ACRS for the Department of Energy, is universally adaptable for minimally-intrusive managed-access international inspections of sensitive sites.

Curtiss, J.A.; Indusi, J.P.

1995-08-01T23:59:59.000Z

308

HM-ACCESS Project | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HM-ACCESS Project HM-ACCESS Project Framework for the Use of Electronic Shipping Papers for the Transport of Hazardous Materials HM-ACCESS Project (Framework for the Use of...

309

2e Carbon Access | Open Energy Information  

Open Energy Info (EERE)

Access Jump to: navigation, search Name 2e Carbon Access Place New York, New York Zip 10280 Sector Carbon Product 2E Carbon Access is an enterprise focused solely on bringing...

310

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Neustar, Inc. ("Neustar") hereby submits comments in response to the captioned Request for Information ("RFI") of the Department of Energy ("DOE"). The...

311

Remote Access of Computer Controlled Experiments.  

E-Print Network (OSTI)

??In this paper, we present a way for students to access and operate laboratory equipment, controlled by a laboratory computer via a remote access program.… (more)

Nilsson, Kristian; Zackrisson, Johan

2008-01-01T23:59:59.000Z

312

USAID Toolkit for Increasing Energy Access | Open Energy Information  

Open Energy Info (EERE)

form form View source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Page Edit with form History Facebook icon Twitter icon » USAID Toolkit for Increasing Energy Access Jump to: navigation, search Tool Summary LAUNCH TOOL Name: USAID Toolkit for Increasing Energy Access Agency/Company /Organization: United States Agency for International Development (USAID) Partner: United Nations Framework Convention on Climate Change (UNFCCC), UNEP, United Nations Foundation Sector: Energy Focus Area: Renewable Energy, Energy Efficiency, People and Policy Phase: Evaluate Options, Develop Goals, Prepare a Plan, Create Early Successes, Evaluate Effectiveness and Revise as Needed Topics: Co-benefits assessment, - Energy Access

313

Opportunities for Process Monitoring Techniques at Delayed Access Facilities  

Science Conference Proceedings (OSTI)

Except for specific cases where the International Atomic Energy Agency (IAEA) maintains a continuous presence at a facility (such as the Japanese Rokkasho Reprocessing Plant), there is always a period of time or delay between the moment a State is notified or aware of an upcoming inspection, and the time the inspector actually enters the material balance area or facility. Termed by the authors as “delayed access,” this period of time between inspection notice and inspector entrance to a facility poses a concern. Delayed access also has the potential to reduce the effectiveness of measures applied as part of the Safeguards Approach for a facility (such as short-notice inspections). This report investigates the feasibility of using process monitoring to address safeguards challenges posed by delayed access at a subset of facility types.

Curtis, Michael M.; Gitau, Ernest TN; Johnson, Shirley J.; Schanfein, Mark; Toomey, Christopher

2013-09-20T23:59:59.000Z

314

Remote Access to the BNL Network, Cyber Security, Information Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

Virtual Private Network (VPN) Virtual Private Network (VPN) at Brookhaven CryptoCard tokens (hard or soft) will not supported after December 31, 2010. Please switch to RSA SecurID tokens as soon as possible. Contact the ITD Helpdesk at x5522 (631-344-5522) or send an email to itdhelp@bnl.gov if you have questions or concerns. The VPN service allows remote users to securely access the Brookhaven internal network through their own personal Internet Service Provider, so that it appears as if their home computer is right on the BNL internal network. Requirements Some form of internet connectivity. Only BNL employees can access this service. You must have a RSA SecurID token. Desktop VPN Client Clientless VPN Obtain a RSA SecurID Token RSA SecurID User Guide Last Modified: September 23, 2013

315

INTERNATIONAL AGREEMENTS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTERNATIONAL INTERNATIONAL AGREEMENTS Signed by Secretary Spencer Abraham January 2001-December 2004 TABLE OF CONTENTS Joint Statement of ntent between the Department of Energy of the United States ofAmerica and The Ministry of Energy and Mines of the Republic ofPeru on Cooperation in the Field of Energy -Tab 1 Fifth Hemispheric Energy Ministers Meeting Mexico City, Mexico - March 9, 2001. Mexico Declaration - Energy: A Crucial Factor for Integration and Sustainable Development in the Hemisphere - Tab 2 Extension of the Agreement for Energy Cooperation between the Department of Energy of the United States ofAmerica and the Secretariat ofEnergy of the United Mexican States, and its Four Annexes - Tab3 Implementing Agreement between the Department ofEnergy of the United States ofAmerica and the

316

USRI Admins Accessing USRI Reports  

E-Print Network (OSTI)

button #12;Step 6: Search by Instructor Search Area Enter: Instructors ID; or Instructors full or partC Access Enter the following: User name, and Password with secure ID#s #12;Step 3: Click on the following: Mandatory Parameters Selections Select Term; Select Course Career; Select Releasable Type; Click

Habib, Ayman

317

Flexible access control for javascript  

Science Conference Proceedings (OSTI)

Providing security guarantees for systems built out of untrusted components requires the ability to define and enforce access control policies over untrusted code. In Web 2.0 applications, JavaScript code from different origins is often combined on a ... Keywords: delimited histories, javascript, same-origin policy, security

Gregor Richards, Christian Hammer, Francesco Zappa Nardelli, Suresh Jagannathan, Jan Vitek

2013-10-01T23:59:59.000Z

318

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly

319

NBP_RFI_Data_Access.PDF | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF NBPRFIDataAccess.PDF More Documents & Publications Silver Spring Networks comments on DOE NBP RFI: Data Access...

320

PIA - Foreign Access Central Tracking System (FACTS) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central Tracking System (FACTS) PIA - Foreign Access Central...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

ETTP Security Access Control System (ESACS) | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

322

Two-Parameter Heavy-Traffic Limits for Infinite-Server Queues  

E-Print Network (OSTI)

In order to obtain Markov heavy-traffic approximations for infinite-server queues with general non-exponential service-time distributions and general arrival processes, possibly with time-varying arrival rates, we establish heavy-traffic limits for two-parameter stochastic processes. We consider the random variables $Q^e(t,y)$ and $Q^r(t,y)$ representing the number of customers in the system at time $t$ that have elapsed service times less than or equal to time $y$, or residual service times strictly greater than $y$. We also consider $W^r(t,y)$ representing the total amount of work in service time remaining to be done at time $t+y$ for customers in the system at time $t$. The two-parameter stochastic-process limits in the space $D([0,\\infty),D)$ of $D$-valued functions in $D$ draw on, and extend, previous heavy-traffic limits by Glynn and Whitt (1991), where the case of discrete service-time distributions was treated, and Krichagina and Puhalskii (1997), where it was shown that the variability of service tim...

Pang, Guodong

2008-01-01T23:59:59.000Z

323

MCSA/MCSE Self-Paced Training Kit (Exam 70-290): Managing and Maintaining a Microsoft Windows Server 2003 Environment, Second Edition  

Science Conference Proceedings (OSTI)

Get in-depth exam preparation for the updated Exam 70-290, a core MCSA/MCSE exam for Windows Server 2003-and build real-world job skills. Includes case studies, troubleshooting labs, and more.

Dan Holme; Orin Thomas

2006-05-01T23:59:59.000Z

324

T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution  

Energy.gov (U.S. Department of Energy (DOE))

Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

325

SunShot Initiative: Access to Capital  

NLE Websites -- All DOE Office Websites (Extended Search)

Access to Capital to someone by Access to Capital to someone by E-mail Share SunShot Initiative: Access to Capital on Facebook Tweet about SunShot Initiative: Access to Capital on Twitter Bookmark SunShot Initiative: Access to Capital on Google Bookmark SunShot Initiative: Access to Capital on Delicious Rank SunShot Initiative: Access to Capital on Digg Find More places to share SunShot Initiative: Access to Capital on AddThis.com... Concentrating Solar Power Photovoltaics Systems Integration Balance of Systems Reducing Non-Hardware Costs Lowering Barriers Fostering Growth Access to Capital Photo of a room full of people seated in rows with a few standing in the background. Two hands in the crowd are holding up sheets of paper with 'Like'. Participants at the SunShot Summit breakout session "Big and Small Ideas:

326

Scalla: Structured Cluster Architecture for Low Latency Access  

Science Conference Proceedings (OSTI)

Scalla is a distributed low-latency file access system that incorporates novel techniques that minimize latency and maximize scalability over a large distributed system with a distributed namespace. Scalla's techniques have shown to be effective in nearly a decade of service for the high-energy physics community using commodity hardware and interconnects. We describe the two components used in Scalla that are instrumental in its ability to provide low-latency, fault-tolerant name resolution and load distribution, and enable its use as a high-throughput, low-latency communication layer in the Qserv system, the Large Synoptic Survey Telescope's (LSST's) prototype astronomical query system. Scalla arguably exceeded its three main design objectives: low latency, scaling, and recoverability. In retrospect, these objectives were met using a simple but effective design. Low latency was met by uniformly using linear or constant time algorithms in all high-use paths, avoiding locks whenever possible, and using compact data structures to maximize the memory caching efficiency. Scaling was achieved by architecting the system as a 64-ary tree. Nodes can be added easily and as the number of nodes increases, search performance increases at an exponential rate. Recoverability is inherent in that no permanent state information is maintained and whatever state information is needed it can be quickly constructed or reconstructed in real time. This allows dynamic changes in a cluster of servers with little impact on over-all performance or usability. Today, Scalla is being deployed in environments and for uses that were never conceived in 2001. This speaks well for the systems adaptability but the underlying reason is that the system can meet its three fundamental objectives at the same time.

Hanushevsky, Andrew; Wang, Daniel L.; /SLAC

2012-03-20T23:59:59.000Z

327

Internal Dosimetry  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21-2008 21-2008 October 2008 DOE STANDARD INTERNAL DOSIMETRY U.S. Department of Energy AREA SAFT Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. NOT MEASUREMENT SENSITIVE ii This document is available on the Department of Energy Technical Standards Program Web Site at http://www.hss.energy.gov/nuclearsafety/techstds/ DOE-STD-1121-2008 iii FOREWORD 1. This Department of Energy (DOE) standard is approved for use by all DOE Components and their contractors. 2. Constructive comments (recommendations, additions, deletions) and any pertinent data that may improve this document should be sent to Office of Worker Safety and Health Policy (HS-11) U.S. Department of Energy Washington, DC 20585

328

deDacota: toward preventing server-side XSS via automatic code and data separation  

Science Conference Proceedings (OSTI)

Web applications are constantly under attack. They are popular, typically accessible from anywhere on the Internet, and they can be abused as malware delivery systems. Cross-site scripting flaws are one of the most common types of vulnerabilities that ... Keywords: code and data separation, content security policy, cross-site scripting, csp, xss

Adam Doupé, Weidong Cui, Mariusz H. Jakubowski, Marcus Peinado, Christopher Kruegel, Giovanni Vigna

2013-11-01T23:59:59.000Z

329

NEC's Itanium prototype server (see Figure 1), code-named AzusA after a river  

E-Print Network (OSTI)

aimed at reliability, availability, and serviceability. These features include cell hot- plug capability 200 ns for a local memory access or local CPU cache hit, and less than 300 ns for a remote (other cell. Availability As in PCI cards, a cell in a partitioned con- figuration can be hot swapped while other domains

Skadron, Kevin

330

Integrity and access control in untrusted content distribution networks  

E-Print Network (OSTI)

A content distribution network (CDN) makes a publisher's content highly available to readers through replication on remote computers. Content stored on untrusted servers is susceptible to attack, but a reader should have ...

Fu, Kevin E. (Kevin Edward), 1976-

2005-01-01T23:59:59.000Z

331

An Access Definition and Query Language : Towards a Unified Access Control Model.  

E-Print Network (OSTI)

??In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of… (more)

Sonnenbichler, Andreas

2013-01-01T23:59:59.000Z

332

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access NBP RFI: Data Access Reply comments from Cleco Power LLC on DOE Request for Information-Implementing the National Broadband Plan by Empowering Customers and the Smart Grid:...

333

Game Accessibility: Enabling Everyone to Play  

Science Conference Proceedings (OSTI)

There is a growing push to make computer games accessible to the disabled. Keywords: Games,Assistive technology,Assistive devices,game developers,games,accessibility,disabilities,disabled,adaptive technology

Lee Garber

2013-06-01T23:59:59.000Z

334

arXiv.org help - Web Accessibility  

NLE Websites -- All DOE Office Websites (Extended Search)

Web Accessibility The arXiv.org web site is designed to work on the largest possible set of browsers and platforms, and to be accessible to users with disabilities. Our web pages...

335

Access Solar Energy LLC | Open Energy Information  

Open Energy Info (EERE)

Access Solar Energy LLC Jump to: navigation, search Name Access Solar Energy LLC Place Park CIty, Utah Zip 84060 Sector Renewable Energy, Solar Product Utah-based developers of...

336

Access Control: Policies, Models, and Mechanisms  

Science Conference Proceedings (OSTI)

Access control is the process of mediating every request to resources and data maintained by a system and determining whether the request should be granted or denied. The access control decision is enforced by a mechanism implementing regulations established ...

Pierangela Samarati; Sabrina De Capitani di Vimercati

2000-09-01T23:59:59.000Z

337

Survey of Substation Equipment Access Control Policies  

Science Conference Proceedings (OSTI)

Utility management and control of access to substations and equipment can help prevent not only unauthorized access by outside agents with ill intent, but also erroneous access to, or erroneous operation of, utility equipment by utility personnel.  This report provides the results of an EPRI–sponsored research project to identify how utilities manage access to transmission and distribution substations and equipment. BackgroundThe enhanced ...

2012-11-20T23:59:59.000Z

338

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| ... Jordan 91.087 90.500 85 76.075 ...

339

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| ... 2013 Africa 117.064 119.114 123.609 ...

340

IWA (International Workshop Agreement)  

Science Conference Proceedings (OSTI)

IWA content IWA (International Workshop Agreement) iso1rss IWA (International Workshop Agreement) Past Meeting Presentations 2nd Internati

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NCSL International Technical Exchange  

Science Conference Proceedings (OSTI)

NCSL International Technical Exchange. Purpose: The NCSL International ... Charleston, SC 29418. Technical Contact: Val Miller (301) 975-3602.

2013-02-19T23:59:59.000Z

342

International Clean Energy Analysis | Open Energy Information  

Open Energy Info (EERE)

International Clean Energy Analysis International Clean Energy Analysis Jump to: navigation, search About ICEA UNIDO small.png NREL small.png The International Clean Energy Analysis (ICEA) gateway promotes increased access to clean energy analysis tools, databases, methods and other technical resources which can be applied in developing countries. This wiki-based dynamic platform allows you to add to the inventory of clean energy organizations, tools, programs and data included on the site. We encourage you to expand the inventory of resources by clicking on "add" below the International Initiatives map. The gateway is organized by Information Toolkits which provide tools and resources to help answer a number of clean energy questions. The International Initiatives map also provides country-specific information on clean energy programs, tools and organizations. Click here to learn more about the ICEA gateway project.

343

Transmission Access Charge Informational Filing  

E-Print Network (OSTI)

of any new Participating Transmission Owner (“Participating TO”) during the proceeding six months or (2) changes to Transmission Revenue Requirements of any of the Participating TOs. 1 Because the Access Charges are determined through a formula rate mechanism, these semi-annual adjustments take place automatically. In the enclosed informational filing, the ISO is providing notice regarding the updated Access Charges that reflect the charges that will be in effect beginning January 1, 2002 in accordance with the formula rate. The adjusted charges are based on the modified Transmission Revenue Requirements, both High Voltage and Low Voltage as a result of: (1) the Offer of Settlement accepted by the Commission in Pacific Gas & Electric Company’s (“PG&E”) Docket No. ER01-66-000, (2) San Diego Gas and Electric Company’s supplemental surcharge accepted, subject to refund, in Docket No. ER01-3074-000, and (3) the annual adjustment to the Transmission Revenue Balancing Account (“TRBA”) of the Participating TOs. 1 Capitalized terms not otherwise defined herein are defined in the Master Definitions

unknown authors

2001-01-01T23:59:59.000Z

344

Substation Security and Remote Access Implementation Strategies  

Science Conference Proceedings (OSTI)

This project analyzed control system remote access solutions in a side-by-side comparison. Five systems were lab-tested against common functions used by utilities to access and manage electronic control systems. The five vendors’ products met the basic remote access requirements tested.BackgroundElectronic control systems that actuate protective equipment and physical operations in the ...

2012-12-20T23:59:59.000Z

345

A propositional policy algebra for access control  

Science Conference Proceedings (OSTI)

Security-sensitive environments protect their information resources against unauthorized use by enforcing access control mechanisms driven by access control policies. Due to the need to compare, contrast, and compose such protected information resources, ... Keywords: Access control, policy algebra, policy composition, security policy

Duminda Wijesekera; Sushil Jajodia

2003-05-01T23:59:59.000Z

346

Programmer-focused website accessibility evaluations  

Science Conference Proceedings (OSTI)

Suggested methods for conducting website accessibility evaluations have typically focused on the needs of end-users who have disabilities. However, programmers, not people with disabilities, are the end-users of evaluations reports generated by accessibility ... Keywords: accessibility, evaluation, internet, reporting

Chris Law; Julie Jacko; Paula Edwards

2005-10-01T23:59:59.000Z

347

A systematic approach to static access control  

Science Conference Proceedings (OSTI)

The Java Security Architecture includes a dynamic mechanism for enforcing access control checks, the so-called stack inspection process. While the architecture has several appealing features, access control checks are all implemented via dynamic ... Keywords: Type systems, access control, stack inspection

François Pottier; Christian Skalka; Scott Smith

2005-03-01T23:59:59.000Z

348

Mission-Aware Medium Access Control in Random Access Networks  

E-Print Network (OSTI)

We study mission-critical networking in wireless communication networks, where network users are subject to critical events such as emergencies and crises. If a critical event occurs to a user, the user needs to send necessary information for help as early as possible. However, most existing medium access control (MAC) protocols are not adequate to meet the urgent need for information transmission by users in a critical situation. In this paer, we propose a novel class of MAC protocols that utilize available past information as well as current information. Our proposed protocols are mission-aware since they prescribe different transmission decision rules to users in different situations. We show that the proposed protocols perform well not only when the system faces a critical situation but also when there is no critical situation. By utilizing past information, the proposed protocols coordinate transmissions by users to achieve high throughput in the normal phase of operation and to let a user in a critical ...

Park, Jaeok

2009-01-01T23:59:59.000Z

349

NREL-International Wind Resource Maps | Open Energy Information  

Open Energy Info (EERE)

International Wind Resource Maps International Wind Resource Maps Jump to: navigation, search Tool Summary Name: NREL-International Wind Resource Maps Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy Focus Area: Wind Topics: Resource assessment Website: www.nrel.gov/wind/international_wind_resources.html NREL-International Wind Resource Maps Screenshot References: International Wind Resource Maps [1] Logo: NREL-International Wind Resource Maps This resource provides access to NREL-developed wind resource maps and atlases for several countries. NREL's wind mapping projects have been supported by the U.S. Department of Energy, U.S. Agency for International Development, and United Nations International Programme. "NREL is helping to develop high-resolution projections of wind resources

350

Energy poverty: how to make modern energy access universal? | Open Energy  

Open Energy Info (EERE)

Energy poverty: how to make modern energy access universal? Energy poverty: how to make modern energy access universal? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy poverty: how to make modern energy access universal? Agency/Company /Organization: International Energy Agency Partner: United Nations Development Programme (UNDP), United Nations Industrial Development Organization (UNIDO) Sector: Energy Focus Area: Renewable Energy Phase: Bring the Right People Together, Create a Vision, Evaluate Options, Develop Goals Topics: Co-benefits assessment, - Energy Access Resource Type: Technical report User Interface: Website Website: www.worldenergyoutlook.org/docs/weo2010/weo2010_poverty.pdf Cost: Free Language: English The focus of this report is on expanding access to modern energy services

351

How to Request & Access Beam Time | Stanford Synchrotron Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

How to Request & Access Beam Time How to Request & Access Beam Time Step 1: Submit a proposal that summarizes proposed research plans. Step 2: Submit beam time requests. Step 3: Review & accept beam time allocations. Instructions for users allocated beam time on SSRL X-ray/VUV beam lines. Accept Beam Time & Submit Support Request Registration & Assistance User Agreements User Financial Accounts, Supplies, Gases, Domestic & International Shipments User Computer Accounts User Safety Preparing for Arrival/Lodging/Check-In Acknowledgements, Publications, Science Highlights & News Feedback Step 1: Submit a proposal that summarizes proposed research plans. Review the guidelines for proposals and scheduling procedures. Standard proposals can be submitted through the user portal three times each year:

352

Tanzania-Biofuels, Land Access and Rural Livelihoods | Open Energy  

Open Energy Info (EERE)

Tanzania-Biofuels, Land Access and Rural Livelihoods Tanzania-Biofuels, Land Access and Rural Livelihoods Agency/Company /Organization International Institute for Environment and Development Sector Energy, Land Focus Area Renewable Energy, Biomass, Forestry, Agriculture Topics Co-benefits assessment, Implementation, Resource assessment, Background analysis Resource Type Publications Website http://www.iied.org/pubs/pdfs/ Country Tanzania UN Region "Sub-Saharan Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

353

Deputy Secretary Poneman's Remarks at the International Conference on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

International Conference International Conference on Access to Civil Nuclear Energy Deputy Secretary Poneman's Remarks at the International Conference on Access to Civil Nuclear Energy March 8, 2010 - 12:00am Addthis Paris, France - Today, U.S. Deputy Secretary of Energy Daniel Poneman addressed the plenary session at the International Conference on Access to Civil Nuclear Energy in Paris, France. His remarks as prepared for delivery are below: On behalf of the President of the United States, I would like to thank President Sarkozy for hosting this important conference. Nuclear energy has a vital role to play in our low-carbon future. President Obama has said that "we must harness the power of nuclear energy on behalf of our efforts to combat climate change, and to advance peace and

354

Remarks of Deputy Secretary Poneman at the International Conference on  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Remarks of Deputy Secretary Poneman at the International Conference Remarks of Deputy Secretary Poneman at the International Conference on Access to Civil Nuclear Energy Remarks of Deputy Secretary Poneman at the International Conference on Access to Civil Nuclear Energy March 8, 2010 - 12:38pm Addthis Paris, France - Today, U.S. Deputy Secretary of Energy Daniel Poneman addressed the plenary session at the International Conference on Access to Civil Nuclear Energy in Paris, France. His remarks as prepared for delivery are below: On behalf of the President of the United States, I would like to thank President Sarkozy for hosting this important conference. Nuclear energy has a vital role to play in our low-carbon future. President Obama has said that "we must harness the power of nuclear energy on behalf of our efforts to combat climate change, and to advance peace and

355

Alert State Detection and Switching Order Generation at a 400/120 kV Substation using Knowledge Server  

E-Print Network (OSTI)

At the operator level a new, PC-based SCADA system was introduced at the electrical substation of the Paks Nuclear Power Plant. An AI-based, intelligent advisory system was developed and connected to the SCADA system as knowledge server. The paper describes some of the advisory functions and their realizations in rules and procedures. Besides increasing reliability and safety of energy supply the basic goal of the system is to assist the operator in faster and more effective reactions, and to assist the plant engineer to better understand and evaluate any possible events.

Nacsa Kovcs Nacsa

2001-01-01T23:59:59.000Z

356

Utility Data Accessibility Map | Open Energy Information  

Open Energy Info (EERE)

Utility Data Accessibility Map Utility Data Accessibility Map Jump to: navigation, search Residential Commercial Benchmarking Energy Efficiency Delivery of Data Time Period Frequency of Data Access to Data Residential frequency of data access Ua Utility Data Access Map Having access to your electricity use data is a very important step in understanding your overall energy usage. Comparing historical data to your current usage is one way to see trends and determine ways for reducing electricity costs and improving overall efficiency. We asked all U.S. electric utility companies to tell us how accessible their electricity use data is for both residential and commercial customers. The results are updated live based on the responses we have to date. As more utilities provide information, the utility boundaries will be automatically colored

357

Chapter_12_Special_Access_Programs  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 2 Special Access Programs This chapter describes the DOE Special Access Program (SAP) at DOE HQ and implements the requirements of: * Executive Order 13526, Classified National Security Information, Section 4.3, Special Access Programs, and Section 5.4, General Responsibilities, subparagraph (d). * DOE Order 471.5, Special Access Programs. A SAP is a program established for a specific class of classified information that imposes safeguarding and access requirements exceeding those normally required for information at the same classification level. Terms and activities such as Limited Access, Controlled Access, and Limited Distribution programs are not authorized. HQ Implementation Procedures SAP administration for both DOE and NNSA is handled through the Executive

358

Access Fund Partners LP | Open Energy Information  

Open Energy Info (EERE)

Access Fund Partners LP Access Fund Partners LP Jump to: navigation, search Name Access Fund Partners, LP Place San Juan Capistrano, California Zip 92675 Product Boutique investment banking and investment advisory firm with clean energy focus References Access Fund Partners, LP[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Access Fund Partners, LP is a company located in San Juan Capistrano, California . References ↑ "Access Fund Partners, LP" Retrieved from "http://en.openei.org/w/index.php?title=Access_Fund_Partners_LP&oldid=341703" Categories: Clean Energy Organizations Companies Organizations Stubs What links here Related changes Special pages Printable version

359

On the impact of Gold Open Access journals  

Science Conference Proceedings (OSTI)

Gold Open Access (=Open Access publishing) is for many the preferred route to achieve unrestricted and immediate access to research output. However, true Gold Open Access journals are still outnumbered by traditional journals. Moreover availability of ... Keywords: Directory of Open Access journals (DOAJ), Gold Open Access, Impact analysis, Impact evolution, Journal citation reports (JCR), Journal impact factor, Open Access publishing, SJR, SNIP, Ulrichsweb

Christian Gumpenberger; María-Antonia Ovalle-Perandones; Juan Gorraiz

2013-07-01T23:59:59.000Z

360

On the availability of replicated contents in the web with server capacity constraints  

E-Print Network (OSTI)

Tenzekhti,F. Day,K. Ould-Khaoua,M. Obaidat,M.S. Proc. 2004 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTSâ?? 04), San Jose, California, July 25-29, 2004 pp 813-820 Society for Computer Simulation

Tenzekhti, F.; Day, K.; Ould-Khaoua, M.

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

362

SPEED CONTROL SYSTEM FOR AN ACCESS GATE - Energy Innovation Portal  

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first ...

363

SLAC Lightsource User Access Guidelines and Agreement  

NLE Websites -- All DOE Office Websites (Extended Search)

Lightsource User Access Guidelines & Agreement Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC Lightsource User Access Guidelines and Agreement LCLS / SSRL User Research Administration approval (signature/date): LCLS Safety Office approval (signature/date): SSRL Safety Office approval (signature/date): XFO Operations approval (signature/date): Revision Record Revision Date Revised Section(s) Affected Description of Change R001 October 4 th , 2010 User Form Updated SLAC Lightsource User Access Agreement Form R000 Sept 14, 2009 Original Release SLAC Lightsource User Access Guidelines & Agreement August 3, 2011 SLAC-I-030-306-001-00-R002 1 SLAC LIGHTSOURCE USER ACCESS GUIDELINES & AGREEMENT Introduction Welcome to SSRL and LCLS, SLAC's lightsource user facilities. We hope that your stay here will be

364

Site Access Policy | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Laboratory About Work with Argonne Safety News Community Events Careers Directory Energy Environment Security User Facilities Science Technology Visiting Argonne Site Access...

365

Presenting Accessibility to Mobility-Impaired Travelers  

E-Print Network (OSTI)

Behaviors of the Mobility-Disabled Consumer." Journal ofCampus Access Guide at the Disabled Student Program at UCto dental services for disabled people. A questionnaire

Nuernberger, Andrea

2008-01-01T23:59:59.000Z

366

Adjudicative Guidelines for Determining Eligibility for Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to help a foreign person, group, or country by providing that information; (c) counterintelligence information, that may be classified, indicates that the individual's access to...

367

Expanding Researcher Access to EIA Microdata  

U.S. Energy Information Administration (EIA)

personal computers at remote locations. EIA’s research access program is much more limited than those offered by other statistical agencies.

368

ORISE Resources: Puerto Rico Equal Access Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Minority AIDS Council (NMAC) and Office of AIDS Research (OAR) Puerto Rico Equal Access Program (PREAP). This PREAP training was specifically developed for the Puerto Rican...

369

Technology and Access to Knowledge - CECM  

E-Print Network (OSTI)

Feb 9, 1998 ... Technology and Access to Knowledge. Mathematics as a branch of human knowledge is several millenia old, and though each individual ...

370

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for approximately 11 percent of all electric energy sold in the United States. NBP RFI: Data Access More Documents & Publications Re: DOE Request for Information - Implementing the...

371

Content-Based Access to Unstructured Information  

Science Conference Proceedings (OSTI)

... of automatic systems that can provide content-based access to information that has not been explicitly structured for machine consumption. ...

2012-01-03T23:59:59.000Z

372

Sustainability failures of rural telecenters: Challenges from the sustainable access in rural india (sari) project  

Science Conference Proceedings (OSTI)

We have examined longitudinally an ICT for a development project in rural India, closely watching activities and surveying users at as many as 100 Internet facilities in more than 50 different villages. The Sustainable Access in Rural India (SARI) project ... Keywords: India, Information technology, international development, rural development, sustainability failure, telecenters

Michael L. Best; Rajendra Kumar

2008-10-01T23:59:59.000Z

373

Issues in knowledge access, retrieval and sharing - Case studies in a Caribbean health sector  

Science Conference Proceedings (OSTI)

In knowledge sharing forums different actors access each others knowledge to assist in their own decision making process. However, in absence of a formal knowledge management system this knowledge may not be available for use/reuse. In this research, ... Keywords: Healthcare sector, Internal knowledge-transaction costs, Knowledge flows, Knowledge items, Knowledge sharing

Gunjan Mansingh; Kweku-Muata Osei-Bryson; Han Reichgelt

2009-03-01T23:59:59.000Z

374

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| ... Jordan 112.4 107.7 103.5 96.5 ...

375

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| ... Jordan 1.907 1.909 2.101 2.197 ...

376

Internal Audit Process  

NLE Websites -- All DOE Office Websites (Extended Search)

7 Internal Audit Process 110304 Page 1 of 7 EOTA - Business Process Document Title: Internal Audit Process Document Number: P-007 Rev. 110304 Document Owner: Elizabeth Sousa...

377

International Energy Statistics  

U.S. Energy Information Administration (EIA)

> Countries > International Energy Statistics: International Energy Statistics; Petroleum. Production| ... Germany 135.7 139.1 124.7 153.7 ...

378

Intern Programs | PARTI  

NLE Websites -- All DOE Office Websites (Extended Search)

Physics of Accelerators and Related Technology for International Students (PARTI) About Apply Visa Info For Current Interns Program Description Fermilab's PARTI program offers...

379

Data Center Access Policies and Version 2.0  

E-Print Network (OSTI)

Data Center Access Policies and Procedures Version 2.0 Tuesday, April 6, 2010 University://uits.arizona.edu #12;Table of Contents UITS Data Center Access Policies and Procedures!3 .Introduction!3 Overview!3 Data Center Access!3 Data Center Access - Levels of Access!4 Periodic Review and Termination of Access

Watkins, Joseph C.

380

Archive Access and Accessibility: A Progress Report on Social Networking at Work  

E-Print Network (OSTI)

bubble demo: http://lah.soas.ac.uk/projects/dev/bubble-player/wilbur.html 34 Access is also about perceptions ? perceptions of interfaces – like Facebook, ELAR “reduces distance and power disparities, supports interactions” ? difficult access mistaken...

Nathan, David

2010-12-10T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Three web accessibility evaluation perspectives for RIA  

Science Conference Proceedings (OSTI)

With the increasing popularity of Rich Internet Applications (RIAs), several challenges arise in the area of web accessibility evaluation. A particular set of challenges emerges from RIAs dynamic nature: original static Web specifications can change ... Keywords: automated evaluation, web accessibility, web browser processing, web science

Nádia Fernandes, Ana Sofia Batista, Daniel Costa, Carlos Duarte, Luís Carriço

2013-05-01T23:59:59.000Z

382

Web Accessibility Office of Diversity and Inclusion  

E-Print Network (OSTI)

Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

Jones, Michelle

383

National Radiobiology Archives Distributed Access user's manual  

SciTech Connect

This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

1991-11-01T23:59:59.000Z

384

Improving Access to Web Content at Google  

E-Print Network (OSTI)

1 Improving Access to Web Content at Google Loretta Guarino Reid (LorettaGuarino@google.com) Srinivas Annam (AnnamS@google.com) March 12, 2008 #12;2 Overview Accessibility developments for : · Gmail · Search · Toolbar · Maps & Transit · Books · Video & Captions · Short Topics ­ Calendar, Google Groups

Cortes, Corinna

385

Distributed user access control in sensor networks  

Science Conference Proceedings (OSTI)

User access control in sensor networks defines a process of granting user the access right to the information and resources. It is essential for the future real sensor network deployment in which sensors may provide users with different services in terms ...

Haodong Wang; Qun Li

2006-06-01T23:59:59.000Z

386

Locally Accessible Information and Distillation of Entanglement  

E-Print Network (OSTI)

A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

2004-03-18T23:59:59.000Z

387

DOE, IAEA Partner for Greater Access to Nuclear Energy R&D | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

DOE, IAEA Partner for Greater Access to Nuclear Energy R&D DOE, IAEA Partner for Greater Access to Nuclear Energy R&D NEWS MEDIA CONTACT: Cathey Daniels, (865) 576-9539 FOR IMMEDIATE RELEASE October 27, 2009 DOE, IAEA Partner for Greater Access to Nuclear Energy R&D Oak Ridge, TN - The findings from years of nuclear energy research supported by the Department of Energy (DOE) and predecessor agencies are being made searchable on the World Wide Web, due to a collaborative project between DOE and the International Atomic Energy Agency (IAEA). By adding valuable nuclear-related research to the online collections of both the DOE and the IAEA, access to this knowledge by researchers, academia and the public interested in the peaceful aspects of nuclear energy is greatly facilitated. As part of its knowledge preservation mandate, the IAEA, through the

388

EDITORIAL Health and Disaster Diplomacy in North Korea: Ensuring Access and Accountability in Complex Political Environments  

E-Print Network (OSTI)

affected vulnerable civilian populations and have been complicated by political restrictions on humanitarian access. 1 In areas frequently embroiled in war and political instability, aid agencies often face the challenge of negotiating with militant authorities in order to secure access. This is not a new problem. The challenge of negotiating access with militant authorities has been discussed and has led to philosophical disagreements between leading humanitarian organizations such as Médecins sans Frontières and the International Committee of the Red Cross/Red Crescent. This challenge remains, and aid agencies still struggle to maintain adequate operational access when working under politically constrained conditions. As humanitarian minimum standards, such as those advocated by the Sphere Project, acquire increasing global acceptance, these agencies also will be charged to demonstrate effectiveness and to ensure accountability, even in the complex and constrained climate of war and civil instability.

Eugene S. Yim; Michael J. Vanrooyen; Eugene Sun Yim

2009-01-01T23:59:59.000Z

389

Ethiopia Energy Access Project | Open Energy Information  

Open Energy Info (EERE)

Ethiopia Energy Access Project Ethiopia Energy Access Project Jump to: navigation, search Name of project Ethiopia Energy Access Project Location of project Ethiopia Energy Services Lighting, Cooking and water heating, Information and communications Year initiated 2005 Organization World Bank Website http://documents.worldbank.org Coordinates 9.145°, 40.489673° References The World Bank[1] The Energy Access Project for Ethiopia will establish a sustainable program for expanding the population's access to electricity and improving the quality and adequacy of electricity supply, reduce environmental degradation and improve energy end-use efficiency; reduce the barriers to the wide spread adoption of renewable energy technologies, and provide technical support for institutional and capacity building of key sector

390

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Jordan 10 10 11 11 11 10 ...

391

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan (s) (s) (s) (s ...

392

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. ... Total Renewable Electricity Net Generation ... Bosnia and Herzegovina 0.039 ...

393

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. ... Total Renewable Electricity Installed Capacity ... Bosnia and Herzegovina 2.411 ...

394

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Electricity Prices ; Petroleum Prices ; Natural Gas Prices ; ...

395

ESCORT: a decentralized and localized access control system for mobile wireless access to secured domains  

Science Conference Proceedings (OSTI)

In this work we design and implement ESCORT, a backward compatible, efficient, and secure access control system, to facilitate mobile wireless access to secured wireless LANs. In mobile environments, a mobile guest may frequently ... Keywords: decentralized access control, identity privacy, location privacy, mobile privacy, wireless security

Jiejun Kong; Shirshanka Das; Edward Tsai; Mario Gerla

2003-09-01T23:59:59.000Z

396

Internal Audit Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Internal Audit Services Internal Audit Services Berkeley Lab Internal Audit Services Internal Audit Services Berkeley Lab Contacts Organizational Chart IAS Search Staff Only Lab Search Phone Book A-Z Index Privacy and Security Notice "Internal Auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance processes." The Institute of Internal Auditors Standards for the Professional Practice of Internal Auditing About IAS | Audit Committee | Audit Planning | Ethics & Investigations | External Audit Coordination Advisory Services | Other Relevant Audit Links | Contacts | Organizational

397

Internal Audit Preparation Worksheet  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Internal Audit Preparation Job Aid 11_0304 Page 1 of 5 2 Internal Audit Preparation Job Aid 11_0304 Page 1 of 5 EOTA - Business Form Document Title: Internal Audit Preparation Job Aid Document Number: F-012 Rev. 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: P-007, Internal Audit Process Notify of Changes: Internal Auditors Referenced Document(s): F-011 Internal Audit Report F-012 Internal Audit Preparation Job Aid 11_0304 Page 2 of 5 Revision History: Rev. Description of Change A Initial Release 11_0304 Change title from Worksheet to Job Aid and changed revision from alpha to numeric for consistency. F-012 Internal Audit Preparation Job Aid 11_0304 Page 3 of 5 Internal Audit Preparation Worksheet F-012 Internal Audit Preparation Job Aid 11_0304 Page 4 of 5

398

Abstract--There are many essential applications for quorum systems in ad-hoc networks, such as that of location servers in  

E-Print Network (OSTI)

other without being in transmission range by relaying their messages through intermediate nodes. Routing a function that maps a node's G. H. Owen is a researcher with the University of Portsmouth's School of location server have been proposed to provide this information. Li [2] divides the area into grid- squares

Augusto, Juan Carlos

399

Comparing the FAT-CAT webserver against other orthology prediction web servers Description of benchmark dataset: We compared the FAT-CAT webserver against the top orthology  

E-Print Network (OSTI)

Comparing the FAT-CAT webserver against other orthology prediction web servers Description of benchmark dataset: We compared the FAT-CAT webserver against the top orthology databases providing broad (four human and one chicken, all from the manually curated SwissProt database), one plant and one

Sjölander, Kimmen

400

Emergence of Cooperative Internet Server Sharing Among Internet Search Agents Caught in the n-Person Prisoner’s Dilemma Game  

Science Conference Proceedings (OSTI)

Information on the Internet can be collected by autonomous agents that send out queries to the servers that may have the information sought. From a single agent’s perspective, sending out as many queries as possible maximizes the chances of finding ... Keywords: n-Person Iterated Dilemma Game, Emergence of cooperation, Internet search agents, Multiagent systems

Jae C. Oh

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

International Rates | OpenEI Community  

Open Energy Info (EERE)

International Rates International Rates Home > Groups > Utility Rate Nsbowde's picture Submitted by Nsbowde(12) Member 10 July, 2012 - 11:27 Per the town hall discussion yestereday, I have a link to a tariff database assembled by the Energy Regulators Regional Association. There is no free access and reproduction of the information without ERRA consent is prohibited, but nonetheless here it is. I have some friends in ERRA, so maybe future collaboration could be possible. http://www.erranet.org/Products/TariffDatabase Nick Groups: Utility Rate Login to post comments Nsbowde's blog Comments Rmckeel Rmckeel1 year 26 weeks ago International rates Thanks for the info, Nick! On a side note, when we move our blog over to OpenEI communities, content like this blog entry will be more visible on

402

International Open Data Sites | Data.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

International Open Data Sites International Open Data Sites This map requires Flash. If you are seeing this text, then you may want to install the Flash Player plugin http://get.adobe.com/flashplayer/ or prefer to view the map info as text only (for accessibility reasons). International data.gov websites United States - Data.gov State Data Sites: http://www.data.gov/statedatasites Alabama - Alabama: http://open.alabama.gov/ Argentina - Bahía Blanca: http://bahiablanca.opendata.junar.com/home/ Argentina - Buenos Aires, Argentina: http://data.buenosaires.gob.ar/ Argentina - Misiones Province, Argentina: http://www.datos.misiones.gov.ar/ Arizona - Arizona: http://openbooks.az.gov/app/transparency/index.html Arizona - Scottsdale: http://data.scottsdaleaz.gov/ Australia - Australia: http://data.gov.au/

403

Rail Access to Yucca Mountain: Critical Issues  

SciTech Connect

The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

Halstead, R. J.; Dilger, F.; Moore, R. C.

2003-02-25T23:59:59.000Z

404

PARS II User Account Access Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Office of Management Office of Management Office of Engineering and Construction Management User Account Access Guide for PARS II Version 1.5 June 25, 2011 Submitted by: Energy Enterprise Solutions 20440 Century Blvd. Suite 150 Germantown, MD 20874 Phone 301-916-0050 Fax 301-916-0066 www.eesllc.net June 25, 2011 (V1.5) PARS II User Account Access Guide ii This page intentionally left blank. June 25, 2011 (V1.5) PARS II User Account Access Guide iii Title Page Document Name: User Account Access Guide for PARS II Version Number: V1.5 Publication Date: June 25, 2011 Contract Number: DE-AT01-06IM00102 Project Number: 1ME07 CLIN 4 Prepared by: Scott Burns, Energy Enterprise Solutions, LLC Reviewed by: Judith Bernsen, Energy Enterprise Solutions, LLC

405

Dynamic spectrum access -- concepts and future architectures  

Science Conference Proceedings (OSTI)

New trends and developments in radio technology are enhancing the future capabilities of devices to access electromagnetic spectrum using the full range of dimensions associated with the spectrum. This increased capability, together with current developments ...

M. Nekovee

2006-04-01T23:59:59.000Z

406

Decision Analysis of Dynamic Spectrum Access Rules  

SciTech Connect

A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

2011-12-01T23:59:59.000Z

407

Accessing speech data using strategic fixation  

Science Conference Proceedings (OSTI)

When users access information from text, they engage in strategic fixation, visually scanning the text to focus on regions of interest. However, because speech is both serial and ephemeral, it does not readily support strategic fixation. This paper describes ...

Steve Whittaker; Julia Hirschberg

2007-04-01T23:59:59.000Z

408

Fair resource allocation in multiple access channels  

E-Print Network (OSTI)

We consider the problem of resource allocation in a multiple access channel. Our objective is to obtain rate and power allocation policies that maximize a general concave utility function of average transmission rates over ...

ParandehGheibi, Ali

2008-01-01T23:59:59.000Z

409

JOBAID-ACCESSING AND MODIFYING TALENT PROFILE  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

410

North Carolina Capital Access Program (North Carolina)  

Energy.gov (U.S. Department of Energy (DOE))

The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

411

Radio over fiber in multimedia access networks  

Science Conference Proceedings (OSTI)

Dominant broadband access technologies today are Digital Subscriber Line (DSL) and hybrid fiber coaxial (HFC) networks. DSL leads, with global subscribers exceeding 100 million, while cable-modem subscribers worldwide total 55 million in 2005 [1]. Recently, ...

Xavier Fernando

2006-09-01T23:59:59.000Z

412

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

413

Testing and distribution of the RPS2 proposal submission system Robert E. Douglas, Jr.  

E-Print Network (OSTI)

/server system implemented using Tcl/Tk. The client can transparently access servers on the user's machine

Douglas Jr., Robert E.

414

45-nm silicon-on-insulator CMOS technology integrating embedded DRAM for high-performance server and ASIC applications  

Science Conference Proceedings (OSTI)

The 45-nm technology, called 12S and developed for IBM POWER7®, is an extremely robust and versatile technology platform that allows for a rich set of features that include embedded dynamic random access memory (DRAM), performance and ...

S. S. Iyer; G. Freeman; C. Brodsky; A. I. Chou; D. Corliss; S. H. Jain; N. Lustig; V. McGahay; S. Narasimha; J. Norum; K. A. Nummy; P. Parries; S. Sankaran; C. D. Sheraw; P. R. Varanasi; G. Wang; M. E. Weybright; X. Yu; E. Crabbe; P. Agnello

2011-05-01T23:59:59.000Z

415

Essays in international trade  

E-Print Network (OSTI)

This thesis is a collection of essays on the effect of trade costs on international trade. Chapter 1 derives and empirically examines how factor proportions determine the structure of commodity trade when international ...

Romalis, John

2001-01-01T23:59:59.000Z

416

International aeronautical user charges  

E-Print Network (OSTI)

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

417

AOCS: supporting international standards  

Science Conference Proceedings (OSTI)

Trade standards improve efficiency of production and ease international commerce. They can also affect profitability. AOCS: supporting international standards inform Magazine algae algal AOCS biomass business chemistry cottonseed date detergents f

418

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 0 0 0 0 0 0 0 ...

419

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | Annual Monthly/Quarterly. Capacity | Bunker Fuels | ...

420

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 0 0 0 0 0 Kuwait ...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Jordan 0.213 Kuwait 63.500 Lebanon 0 Oman ...

422

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | Annual Monthly/Quarterly. Capacity | Bunker Fuels | Stocks |

423

RFI Comments - ASIS International  

Science Conference Proceedings (OSTI)

... Sincerely, /s/ Jack Lichtenstein Vice President, Government Affairs & Public Policy ASIS International 1625 Prince Street Alexandria, VA 22314

2013-04-10T23:59:59.000Z

424

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... 2013 JAN FEB MAR APR MAY JUN ...

425

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... 2013 Middle East 802.157 Bahrain 0.125 ...

426

Sun Fire ™ Midrange Server Updated Best Practices for Firmware 5.18.x  

E-Print Network (OSTI)

Sun Microsystems, Inc. has intellectual property rights relating to technology embodied in the product that is described in this document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S. patents listed at http://www.sun.com/patents and one or more additional patents or pending patent applications in the U.S. and in other countries. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, Sun BluePrints, SunSolve, SunSolve Online, JumpStart, Sun Fire, SunDocs, and Solaris are trademarks or registered trademarks or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun ™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK

Ken Kambic; Pts Engineering Group; James Hsieh; Pts Engineering Group

2005-01-01T23:59:59.000Z

427

The Internship: Hollywood Plot is a Reality for One SRR Intern | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Internship: Hollywood Plot is a Reality for One SRR Intern The Internship: Hollywood Plot is a Reality for One SRR Intern The Internship: Hollywood Plot is a Reality for One SRR Intern June 20, 2013 - 12:00pm Addthis Johnny Whitaker, a college intern at Savannah River Remediation (SRR), uses system analysis and design to help develop a web-accessible inventory system for SRR subject matter experts. Johnny Whitaker, a college intern at Savannah River Remediation (SRR), uses system analysis and design to help develop a web-accessible inventory system for SRR subject matter experts. In the summer comedy The Internship, two middle-aged men vie for jobs and new careers in the tech industry as Google interns. They are starting over and moving forward, just like one Savannah River Remediation (SRR) intern. Johnny Whitaker has a sense of humor, but he's taking his new venture

428

The Internship: Hollywood Plot is a Reality for One SRR Intern | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The Internship: Hollywood Plot is a Reality for One SRR Intern The Internship: Hollywood Plot is a Reality for One SRR Intern The Internship: Hollywood Plot is a Reality for One SRR Intern June 20, 2013 - 12:00pm Addthis Johnny Whitaker, a college intern at Savannah River Remediation (SRR), uses system analysis and design to help develop a web-accessible inventory system for SRR subject matter experts. Johnny Whitaker, a college intern at Savannah River Remediation (SRR), uses system analysis and design to help develop a web-accessible inventory system for SRR subject matter experts. In the summer comedy The Internship, two middle-aged men vie for jobs and new careers in the tech industry as Google interns. They are starting over and moving forward, just like one Savannah River Remediation (SRR) intern. Johnny Whitaker has a sense of humor, but he's taking his new venture

429

Property:EnergyAccessYearInitiated | Open Energy Information  

Open Energy Info (EERE)

EnergyAccessYearInitiated EnergyAccessYearInitiated Jump to: navigation, search Property Name EnergyAccessYearInitiated Property Type Date Description Year Initiated Pages using the property "EnergyAccessYearInitiated" Showing 10 pages using this property. B Benin: Increased Access to Modern Energy Project + 2009 + Burkina Faso Energy Access Project + 2007 + E Ethiopia Energy Access Project + 2005 + G Ghana Energy Development and Access Project (GEDAP) + 2007 + M Mongolia Renewable Energy and Rural Electricity Access Project + 2006 + P Papua New Guinea Improved Energy Access for Rural Communities + 2012 + R Republic of Yemen Energy Access Project + 2006 + S Sri Lanka Credit to Connect + 2011 + T Tanzania Energy Development and Access Expansion Project + 2007 + V Viet Nam Rural Electrification + 2009 +

430

Center for Nanoscale Materials User Access Program Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Materials User Access Program Overview Materials User Access Program Overview CNM User Access Program Overview 1. Objective ............................................................................................................................................... 1 2. Submission Guidelines .......................................................................................................................... 1 2.1 Proposal Content ............................................................................................................................ 1 3. Proposal Review Process ....................................................................................................................... 2 3.1 Proposal Evaluation Board .............................................................................................................. 2

431

Environment/Health/Safety/Security (EHSS): Building Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Building Access Building Access Access Control - On-site access is controlled by either keys or by LBNL's automated access control system. LBNL's automated access control system is used for exterior perimeter doors to most buildings, as well as some individual labs, offices, and equipment. The access system is linked to the LBNL Human Resources PeopleSoft database and is updated with the employees' or affiliates' current appointment status at the Laboratory. . If your LBNL appointment end date has expired, then your access will be suspended. Security Access Managers (SAM) Administrators - LBNL's automated access control system is a decentralized access permission control structure managed by each Division or major program via Security Access Managers (SAM) Administrators and In-putters. Go here for the current

432

An empirical comparison of monitoring algorithms for access anomaly detection  

Science Conference Proceedings (OSTI)

One of the major disadvantages of parallel programming with shared memory is the nondeterministic behavior caused by uncoordinated access to shared variables, known as access anomalies. Monitoring program execution to detect access anomalies ...

A. Dinning; E. Schonberg

1990-02-01T23:59:59.000Z

433

Web accessibility testing: when the method is the culprit  

Science Conference Proceedings (OSTI)

Testing accessibility of a web site is still an art. Lack of appropriate definitions of accessibility and of standard testing methods are some of the reasons why Web accessibility is so difficult to achieve The paper describes a heuristic walkthrough ...

Giorgio Brajnik

2006-07-01T23:59:59.000Z

434

International energy efficiency and renewable energy resources on the Internet  

SciTech Connect

A variety of sources of information on energy efficiency and renewable energy technologies are available on the Internet`s World Wide Web. These resources are sponsored and maintained by a myriad of organizations across the country and world. One expeditious way to access these resources is by using the U.S. Department of Energy`s Energy Efficiency and Renewable Energy Network (EREN). This network is a user-friendly computer link to Internet based information on energy conservation and renewable energy technologies and techniques. Numerous international sources of information can be accessed through EREN including the International Energy Agency`s Centre for the Analysis and Dissemination of Demonstrated Energy Technologies (CADDET) and the Greenhouse Gas Technology Information Exchange (GREENTIE). CADDET`s Register of demonstrated energy technologies provides an extensive guide to energy efficient and renewable energy technologies, and GREENTIE`s Directory of supplier information helps users access technology providers and experts.

Brown, M.A. [Oak Ridge National Lab., TN (United States); Meyer, R.D. [USDOE, Washington, DC (United States)

1996-10-01T23:59:59.000Z

435

NBP RFI: Data Access Honeywell Responses To Request for Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

436

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript of...

437

RE: NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

RE: NBP RFI: Data Access RE: NBP RFI: Data Access Comments from Southern California Edison on DOE Request for Information-Implementing the National Broadband Plan by Empowering...

438

Environment/Health/Safety/Security (EHSS): Site Access  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Access Office Site Access Office Contact Information | Feedback Most-viewed links: Badging Getting a badge - new, stolen, or replacement. Building Access On-site access, key requests, Security Access Managers. Visitor Access Visitor passes, general information. Parking at the Lab Permits, parking map, vehicles registration, parking policy. Other information: FAQ Frequently Asked Questions. Foreign National Access Information on access to DOE sites. Gate Information Information on the different Lab gates. Getting to the Lab Directions and options for getting to Berkeley Lab: buses, carpooling, rapid transit, biking. Guest House Guest House information. Lost and Found Lost and found information and contacts. Meeting and Conference Meeting and conference procedures and general information.

439

Wind Access and Permitting Law | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Access and Permitting Law Wind Access and Permitting Law < Back Eligibility Residential Savings Category Wind Buying & Making Electricity Program Info State Delaware Program Type...

440

Green Button Energy Data Access Expanding Across America | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Button Energy Data Access Expanding Across America Green Button Energy Data Access Expanding Across America October 17, 2012 - 6:01pm Addthis Utilities demonstrating the...

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Re~ Request for Information NBP RFI: Data Access | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Re Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

442

Request for Information NBP RFI: Data Access | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Information NBP RFI: Data Access Request for Information NBP RFI: Data Access Xcel Energy, a combination electricity and natural gas utility operating in eight Midwestern...

443

Reading Systems for eBooks Need to Become Accessible  

Science Conference Proceedings (OSTI)

Reading Systems for eBooks Need to Become Accessible. While the Publication Structure 1.0 spec is accessible, the reading systems are not. ...

2001-05-25T23:59:59.000Z

444

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

445

Solar access of residential rooftops in four California cities  

E-Print Network (OSTI)

the solar access of rooftop solar-energy systems, includingthermal collection by rooftop solar-energy equipment. It canthe solar access of rooftop solar-energy systems, including

Levinson, Ronnen

2010-01-01T23:59:59.000Z

446

Public Roundtable- Data Access and Privacy Issues Related to...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

447

Rail Access Modes and Catchment Areas for the BART System  

E-Print Network (OSTI)

parking supplies), ridership (e.g. , rail modal splits), andof California at Berkeley Rail Access Modes and CatchmentHypothesized Distributions of Rail Station Access Modes as a

Cervero, Robert

1995-01-01T23:59:59.000Z

448

City of Boulder - Solar Access Ordinance (Colorado) | Open Energy...  

Open Energy Info (EERE)

solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

449

ORISE Resources: Equal Access Initiative Computer Grants Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Equal Access Initiative Computer Grants Program The Equal Access Initiative Computer Grants Program is sponsored by the National Minority AIDS Council (NMAC) and the National...

450

V-120: EMC Smarts Network Configuration Manager Java RMI Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

451

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

452

Test Procedure for §170.302 (p) Emergency Access  

Science Conference Proceedings (OSTI)

... September 24, 2010 1 Test Procedure for §170.302 (p) Emergency Access ... 170.302(p) Emergency Access. Permit authorized users ...

2013-11-06T23:59:59.000Z

453

Office of EERE: International Team  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Office of EERE: International Team on AddThis.com... Policy & Analysis Technology-to-Market International International Partnerships & Projects Stakeholder Engagement...

454

Uniform Transboundary Pollution Reciprocal Access Act (Montana) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) Uniform Transboundary Pollution Reciprocal Access Act (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Installer/Contractor Rural Electric Cooperative Tribal Government Institutional Fuel Distributor Transportation Program Info State Montana Program Type Environmental Regulations This Act allows any entity in a Reciprocating Jurisdiction harmed by pollution originating in the state of Montana to bring an action or other proceeding against the source of that pollution in the state of Montana. Such an entity has the same rights in the state of Montana as they would if

455

NBP RFI: Data Access | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NBP RFI: Data Access NBP RFI: Data Access NBP RFI: Data Access The National Rural Electric Cooperative Association (NRECA) is the national service organization representing more than 900 not-for-profit, member-owned rural electric cooperatives ("Cooperatives"). Most of NRECA's members are distribution cooperatives, providing retail electric service to more than 42 million consumers in 47 states. NRECA members also include approximately 66 generation and transmission ("G&T") cooperatives that supply wholesale power to their distribution cooperative member-owners. Cooperatives provide service to approximately 75 percent of the nation's land mass, resulting in a consumer density of just seven consumers per mile of line, significantly less density than that of

456

Notices Electronic Access to This Document:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

457

International Clean Energy Analysis | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Gateway Edit History Facebook icon Twitter icon » International Clean Energy Analysis (Redirected from International Clean Energy Analysis) Jump to: navigation, search About ICEA UNIDO small.png NREL small.png The International Clean Energy Analysis (ICEA) gateway promotes increased access to clean energy analysis tools, databases, methods and other technical resources which can be applied in developing countries. This wiki-based dynamic platform allows you to add to the inventory of clean energy organizations, tools, programs and data included on the site. We encourage you to expand the inventory of resources by clicking on "add" below the International Initiatives map. The gateway is organized by Information Toolkits which provide tools and resources to help answer a number of clean energy questions. The International Initiatives map also provides country-specific information on clean energy programs, tools and organizations. Click here to learn more about the ICEA gateway project.

458

Security and Access Policy Security of and access to campus facilities, including campus residences  

E-Print Network (OSTI)

Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

Escher, Christine

459

Quantum internet using code division multiple access  

E-Print Network (OSTI)

A crucial open problem in large-scale quantum networks is how to efficiently transmit quantum data among many pairs of users via a common data-transmission medium. We propose a solution by developing a quantum code division multiple access (q-CDMA) approach in which quantum information is chaotically encoded to spread its spectral content, and then decoded via chaos synchronization to separate different sender-receiver pairs. In comparison to other existing approaches, such as frequency division multiple access (FDMA), the proposed q-CDMA can greatly increase the information rates per channel used, especially for very noisy quantum channels.

Jing Zhang; Yu-xi Liu; Sahin Kaya Ozdemir; Re-Bing Wu; Feifei Gao; Xiang-Bin Wang; Lan Yang; Franco Nori

2012-04-08T23:59:59.000Z

460

An overview of recent developments in the interpretation and prediction of fast internal protein dynamics  

E-Print Network (OSTI)

in proteins, and a variety of new NMR techniques have been developed to access internal mobility in proteins the description of overall dynamics and its possible coupling to internal mobility, the introduction of models Introduction Over the past decades, structures of proteins have been intensely studied, new folds

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access Internal Servers. November 25, 2011 U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny November 23, 2011 U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory A local user can access a directory on the target system. November 22, 2011 U-043: Attachmate Reflection Buffer Overflow in FTP Client Lets Remote Servers Execute Arbitrary Code A remote server can execute arbitrary code on the connected target system. November 21, 2011 U-042: Mac RealPlayer Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mac RealPlayer, which can be

462

Access to recorded interviews: A research agenda  

Science Conference Proceedings (OSTI)

Recorded interviews form a rich basis for scholarly inquiry. Examples include oral histories, community memory projects, and interviews conducted for broadcast media. Emerging technologies offer the potential to radically transform the way in which recorded ... Keywords: Interviews, access technology, oral history, speech indexing, spoken word archives

Franciska De Jong; Douglas W. Oard; Willemijn Heeren; Roeland Ordelman

2008-06-01T23:59:59.000Z

463

Open Access and UK universities: an introduction  

E-Print Network (OSTI)

both Gold and Green OA options but with a preference for Gold (= immediate access and maximum opportunity for re-use) • Preferred Green embargos: max. 6 months (STEM) & 12 months (A/H/SS) – but 12 /24 months are acceptable during transition period...

Morgan, Peter

2013-05-17T23:59:59.000Z

464

Tolerating data access latency with register preloading  

Science Conference Proceedings (OSTI)

By exploiting fine grain parallelism, superscalar processors can potentially increase the performance of future supercomputers. However, supercomputers typically have a long access delay to their first level memory which can severely restrict the performance ... Keywords: VLIW/superscalar processor, data dependence analysis, load latency, register file, register preload

William Y. Chen; Scott A. Mahlke; Wen-mei W. Hwu; Tokuzo Kiyohara; Pohua P. Chang

1992-08-01T23:59:59.000Z

465

Securing network access in wireless sensor networks  

Science Conference Proceedings (OSTI)

In wireless sensor networks, it is critical to restrict the network access only to eligible sensor nodes, while messages from outsiders will not be forwarded in the networks. In this paper, we present the design, implementation, and evaluation of a secure ... Keywords: elliptic curve cryptography, security, sensor networks

Kun Sun; An Liu; Roger Xu; Peng Ning; Douglas Maughan

2009-03-01T23:59:59.000Z

466

Providing Access to High Performance Computing Technologies  

E-Print Network (OSTI)

Providing Access to High Performance Computing Technologies Jack Dongarra 1 , Shirley Browne 2 to high performance computing technologies. One effort, the National HPCC Software Exchange, is providing scientists involved with High Performance Computing and Communications (HPCC) [1] 3 . The NHSE facilitates

Dongarra, Jack

467

Consumer Devices for eCommerce Access  

Science Conference Proceedings (OSTI)

It is widely predicted that electronic commerce will have a far-reaching impact on businesses in the next few years. For this to occur it will be essential that users are able to access and use eCommerce services when and where they wish, at times and ...

M. C. Revett; G. J. South

1999-07-01T23:59:59.000Z

468

Creating home network access for the elderly  

Science Conference Proceedings (OSTI)

Wireless broadband networks for home environment present us with many challenges unfamiliar in more public settings. At home, we encounter the end-users with little ICT experience. Probably among the most challenging members of the home network are the ... Keywords: accessibility, authentication, home networks, security, usability, user interface design

Kristiina Karvonen

2007-07-01T23:59:59.000Z

469

International Energy Outlook 2013  

Annual Energy Outlook 2012 (EIA)

International Energy Outlook 2013 Reference case projections Table A4. World gross domestic product (GDP) by region expressed in market exchange rates, Reference case, 2009-2040...

470

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Jordan -0.3 -0.1 0.1 0.7 0.6 0.2 ...

471

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Jordan -0.3 -0.1 0.1 0.7 0.6 Kuwait ...

472

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 0.225 0.220 0.231 0.251 ...

473

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 0.214 0.225 0.220 0.231 ...

474

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Jordan 17.1 6.5 3.2 37.8 26.0 10.0 ...

475

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 0.220 0.213 0.213 0.213 ...

476

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... Jordan 20.058 19.861 19.295 19.625 ...

477

International Workshop on Metrology  

NLE Websites -- All DOE Office Websites (Extended Search)

SCOPE PROGRAM WORKSHOP FEES LODGING ABSTRACTS DEADLINES BANQUET SPONSORS DIRECTIONSVISITING ARGONNE POSTER SESSION HOME International Workshop on Metrology for X-ray and Neutron...

478

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. ... Germany 41.1 35.6 30.8 28.1 30.8 31 ...

479

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. Production| Annual Monthly/Quarterly. Consumption | ... 2013 1Q 2Q 3Q 4Q 1Q 2Q ...

480

Internal Curing Bibliography Database  

Science Conference Proceedings (OSTI)

... de la Varga, I., Castro, J., Bentz, DP, and Weiss, WJ, Application of Internal Curing for Mixtures Containing High Volumes of Fly Ash, Cement and ...

2013-05-23T23:59:59.000Z

Note: This page contains sample records for the topic "access internal servers" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

International Energy Module  

Reports and Publications (EIA)

Summarizes the overall structure of the International Energy Model and its interface with other NEMS modules, mathematical specifications of behavioral relationships, and data sources and estimation methods.

Adrian Geagla

2012-11-05T23:59:59.000Z

482

International Energy Statistics  

U.S. Energy Information Administration (EIA)

International Energy Statistics; Petroleum. ... United States 100.150 ... 180.028 Virgin Islands, U.S. 0 0 0 0 0 0 ...

483

Internal Dose Estimates from  

E-Print Network (OSTI)

Appendix F Internal Dose Estimates from NTS Fallout F-1 #12;Radiation Dose to the Population...........................................................................................40 Comparison to dose estimates from global fallout

484

International Energy Module  

Reports and Publications (EIA)

Summarizes the overall structure of the International Energy Model and its interface with other NEMS modules, mathematical specifications of behavioral relationships, and data sources and estimation methods.

Adrian Geagla

2013-10-22T23:59:59.000Z

485

International Energy Studies  

NLE Websites -- All DOE Office Websites (Extended Search)

Phadke AAPhadke@lbl.gov (510) 486-6855 Links International Energy Studies Batteries and Fuel Cells Buildings Energy Efficiency Electricity Grid Energy Analysis Appliance Energy...

486

International Energy Outlook 2013  

Annual Energy Outlook 2012 (EIA)

1 U.S. Energy Information Administration | International Energy Outlook 2013 Reference case projections by end-use sector and country grouping Table F17. Delivered energy...

487

International Natural Gas Workshop  

U.S. Energy Information Administration (EIA)

International Natural Gas Workshop U.S. Energy Information Administration 1000 Independence Ave. SW, Room 2E-069 Washington, DC 20585 and a member of ...

488

Building the International Lattice Data Grid  

SciTech Connect

We present the International Lattice Data Grid (ILDG), a loosely federated grid-of-grids for sharing data from Lattice Quantum Chromodynamics (LQCD) simulations. The ILDG comprises of metadata, file-format and web-service standards, which can be used to wrap regional data-grid interfaces, allowing seamless access to catalogues and data in a diverse set of collaborating regional grids. We discuss the technological underpinnings of the ILDG, primarily the metadata and the middleware, and offer a critique of its various aspects with the hindsight of the design work and the two years of production.

Mark G. Beckett, Paul Coddington, Bálint Joó, Chris M. Maynard, Dirk Pleiter, Osamu Tatebe, Tomoteru Yoshie

2011-06-01T23:59:59.000Z

489

Biofuels International | Open Energy Information  

Open Energy Info (EERE)

Biofuels International Jump to: navigation, search Name Biofuels International Place Indiana Sector Biofuels Product Pittsburgh based biofuels project developer presently...

490

Speed control system for an access gate  

DOE Patents (OSTI)

An access control apparatus for an access gate. The access gate typically has a rotator that is configured to rotate around a rotator axis at a first variable speed in a forward direction. The access control apparatus may include a transmission that typically has an input element that is operatively connected to the rotator. The input element is generally configured to rotate at an input speed that is proportional to the first variable speed. The transmission typically also has an output element that has an output speed that is higher than the input speed. The input element and the output element may rotate around a common transmission axis. A retardation mechanism may be employed. The retardation mechanism is typically configured to rotate around a retardation mechanism axis. Generally the retardation mechanism is operatively connected to the output element of the transmission and is configured to retard motion of the access gate in the forward direction when the first variable speed is above a control-limit speed. In many embodiments the transmission axis and the retardation mechanism axis are substantially co-axial. Some embodiments include a freewheel/catch mechanism that has an input connection that is operatively connected to the rotator. The input connection may be configured to engage an output connection when the rotator is rotated at the first variable speed in a forward direction and configured for substantially unrestricted rotation when the rotator is rotated in a reverse direction opposite the forward direction. The input element of the transmission is typically operatively connected to the output connection of the freewheel/catch mechanism.

Bzorgi, Fariborz M. (Knoxville, TN)

2012-03-20T23:59:59.000Z

491

5.3 Identity Management - Data Access Authorization Policy ...  

Science Conference Proceedings (OSTI)

****WORKING DOCUMENT****. 5.3 Identity Management - Data Access Authorization Policy Management in the Cloud. ...

2010-11-02T23:59:59.000Z

492

Chemistry Central Journal Commentary Open access and medicinal chemistry  

E-Print Network (OSTI)

This is an Open Access article distributed under the terms of the Creative Commons Attribution License

Chris Swain; Chris Swain

2007-01-01T23:59:59.000Z

493

Guidelines for Handling Confidential Information by Remote Access  

E-Print Network (OSTI)

Guidelines for Handling Confidential Information by Remote Access You have signed an OHSU of your access to OHSU electronic information and/or other sanctions. Remember, using remote access of the OHSU facilities. When you are utilizing remote access, you must provide the same level of security used

Chapman, Michael S.

494

NIST Offering Free Access to Standards for First Responders  

Science Conference Proceedings (OSTI)

NIST Offering Free Access to Standards for First Responders. From NIST Tech Beat: April 26, 2011. ...

2011-04-26T23:59:59.000Z