Powered by Deep Web Technologies
Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

2

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

3

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

4

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

5

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

6

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

7

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

8

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

9

Handleiding eduroam op Apple iOS6  

E-Print Network (OSTI)

Handleiding eduroam op Apple iOS6 Version: 1.0 eduroam Date: 24-04-2013 #12;2 Inleiding Deze handleiding beschrijft hoe u met uw Apple iPad of iPhone met iOS6 een verbinding met eduroam kan opzetten

Galis, Frietson

10

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

11

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

12

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

13

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

14

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

15

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

16

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

17

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

18

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

19

V-080: Apple iOS Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple iOS Multiple Vulnerabilities 0: Apple iOS Multiple Vulnerabilities V-080: Apple iOS Multiple Vulnerabilities January 30, 2013 - 12:56am Addthis PROBLEM: Apple iOS Multiple Vulnerabilities PLATFORM: Apple iOS 6.x for iPhone 3GS and later Apple iOS for iPad 6.x Apple iOS for iPod touch 6.x ABSTRACT: Two security issues and multiple vulnerabilities have been reported in Apple iOS REFERENCE LINKS: Article: HT5642 APPLE-SA-2013-01-28-1 iOS 6.1 Software Update Secunia Advisory SA52002 CVE-2011-3058 CVE-2012-2619 CVE-2012-2824 CVE-2012-2857 CVE-2012-2889 CVE-2012-3606 CVE-2012-3607 CVE-2012-3621 CVE-2012-3632 CVE-2012-3687 CVE-2012-3701 CVE-2013-0948 CVE-2013-0949 CVE-2013-0950 CVE-2013-0951 CVE-2013-0952 CVE-2013-0953 CVE-2013-0954 CVE-2013-0955 CVE-2013-0956 CVE-2013-0958 CVE-2013-0959 CVE-2013-0962 CVE-2013-0963 CVE-2013-0964

20

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...  

Energy Savers (EERE)

Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or...

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

22

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: Apple iOS Certificate Chain Validation Flaw Lets Certain 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

23

T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Certificate Chain Validation Flaw Lets Certain 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5 through 4.2.9 for iPhone 4 (CDMA) iOS 3.0 through 4.3.4 for iPhone 3GS and iPhone 4 (GSM) iOS 3.1 through 4.3.4 for iPod touch (3rd generation) and later iOS 3.2 through 4.3.4 for iPad ABSTRACT: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions. reference LINKS: SecurityTracker Alert ID: 1025837

24

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

25

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

26

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...  

Office of Environmental Management (EM)

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-239:...

27

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

28

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

29

END USER LICENCE AGREEMENT iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE iSTORE") DOWNLOADS OF THE JAMES COOK UNIVERSITY MOBILE APP  

E-Print Network (OSTI)

1 END USER LICENCE AGREEMENT ­ iTUNES STORE, APPLE APP STORE AND iBOOKSTORE ("APPLE i and JCU only. Apple Inc. is not a party to this Agreement. JCU, and not Apple Inc., is solely responsible or control that runs the iOS operating system software provided by Apple Inc. ("Device"); (b) for Your own

30

IO6490  

Office of Legacy Management (LM)

1 ' f. (5 4 . . i IO6490 - -Landfill, ' cleanup plan' is. expected by August peruneat OfEnergy tiy they hope mlxaamfaricclcanupplan for four radioactive oitcs m the puwn of...

31

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

32

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

33

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe  

E-Print Network (OSTI)

Sketch Retrieval via Dense Stroke Features bottle apple apple apple apple apple swan giraffe mug giraffe giraffe giraffe bottle swan giraffe swan swan swan swan apple apple apple apple bottle bottle swan

Yang, Ming-Hsuan

34

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

35

T-611: Cisco IOS OCSP Revoked Certificate Security Issue | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IOS OCSP Revoked Certificate Security Issue 1: Cisco IOS OCSP Revoked Certificate Security Issue T-611: Cisco IOS OCSP Revoked Certificate Security Issue April 27, 2011 - 2:07am Addthis PROBLEM: A security issue has been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an error in the OCSP functionality and can lead to a revoked certificate being successfully authenticated. PLATFORM: Cisco IOS 15.0, 15.1 Operating System ABSTRACT: The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug

36

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

37

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

38

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

39

PDSF I/O Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

IO Resources IO Resources Motivation Many users must run jobs that read datasets that are too large to transfer to the scratch directory. When large numbers of these jobs run...

40

I/O Library List  

NLE Websites -- All DOE Office Websites (Extended Search)

IO Library List IO Library List Package Platform Version Module Install Date Date Made Default ADIOS plain edison 1.4.1 adiosplain1.4.1 2013-01-22 2013-01-22 ADIOS plain hopper...

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

42

Mobile PHRs Compliance with Android and iOS Usability Guidelines  

Science Journals Connector (OSTI)

Mobile Personal Health Records (PHRs) have achieved a particularly strong market share since the appearance of more powerful mobile devices and popular worldwide mobile application markets such as Apple's App Store and Android's Google Play. However, ... Keywords: Android, PHR, Usability, iOS, mHealth

Belén Cruz Zapata, Antonio Hernández Niñirola, Ali Idri, José Luis Fernández-Alemán, Ambrosio Toval

2014-08-01T23:59:59.000Z

43

Cray IO COE  

NLE Websites -- All DOE Office Websites (Extended Search)

IO COE IO COE Performance of MPIIO on DVS+GPFS Yushu Yao Collaboration with: Mike Aamodt, Katie Antypas, Tina Butler, Mark Cruciani, Jason Hick, David Knaak, Rei Lee, Rose Olson, Mike Welcome 1 Wednesday, July 25, 12 WHY 2 Wednesday, July 25, 12 Scratch 35GB/S LSI 7900 OSS OSS OSS OSS OSS OSS ... ... LSI 7900 LSI 7900 ... ... LSI 7900 LSI 7900 ... ... DDN DDN DDN DDN PROJECT DVS DDN DDN DDN DDN GSCRATCH Data Analysis Visualization ... ... PNSD PNSD PNSD CMP CMP CMP ... CMP CMP CMP ... ... ... ... Carver ... Euclid ... ... Reason 1. Users Love Global File Systems FAST MPIIO!!! 3 Wednesday, July 25, 12 0 3 6 9 12 Carver FilePerProc Hopper FilePerProc Carver MPIIO Hopper MPIIO 1.8 7 11 11 0.8 11 12 12 Read Write GB/Sec Performance using IOR (Jan 2012) 20 nodes with 4PE/node Reason 2. Well, DVS+MPIIO Was Super SLOW

44

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

45

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

46

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

47

EFG IO?-90)  

Office of Legacy Management (LM)

.?GE = 1325 d .?GE = 1325 d +3-891 EFG IO?-90) ' United States Government *memorandum DATE: FEB 6 1991 . . I ;' 1 , q' *_* Departrnkt of Energy --. -* r- i .,. 1 .' ;I "--' I ,_ % I : [ -- ,: -.. ! j i 1: \ REPLY TO ATTN OF: EM-421 SUBJECT: Authority Determination-- Former Beryllium Production Facility in Luckey, ' Ohio TO: The File The attached review documents the basis for determining whether DOE has authority for taking remedial action at the former beryllium production facility in Luckey, Ohio, under the Formerly Utilized Sites Remedial Action Program (FUSRAP). The following factors are significant in reaching determination: o The land was owned by the government at the time that the facility produced beryllium. o The facility was controlled by the AK both directly and indirectly.

48

Carrot Apple Salad Ingredients  

E-Print Network (OSTI)

Carrot Apple Salad Ingredients: 4 carrots 2 apples, finely chopped 1/2 cup crushed pineapple in water, drained 2 tablespoons apple juice, frozen concentrate Directions 1. Wash carrots and use a grater to shred into small pieces. Add to medium bowl. 2. Leave the skin on the apple and cut in half through

Liskiewicz, Maciej

49

Buenos Apple Nachos Ingredients  

E-Print Network (OSTI)

Buenos Apple Nachos Ingredients: 1 apple 3 strawberries 1 tablespoon peanut butter 1 tablespoon vanilla low-fat yogurt Directions 1. Leave the skin on the apple and cut in half through the core of strawberries. Slice into thin slic- es, and spread on top of apples. 3. Put peanut butter in a small micro

Liskiewicz, Maciej

50

Apple Fruit Salad Ingredients  

E-Print Network (OSTI)

Apple Fruit Salad Ingredients: 2 Golden Delicious apples 2 Red Delicious apples 2 banana 1 1/2 cups Directions 1. Leave the skin on the apple and cut in half through the core. Then cut each piece in half again

Liskiewicz, Maciej

51

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

52

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

53

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

54

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

55

Book Editors IOS Press, 2003  

E-Print Network (OSTI)

Abstract. Model checking has been successfully employed for verification of industrial hardware systems failures (accidental or mali- cious) can have catastrophic effects, including loss of human life been successfully employed to verify and detect bugs in non-trivial hardware systems, e.g., IEEE

Clarke, Edmund M.

56

Special Inquiry: IO1HQ005 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IO1HQ005 Special Inquiry: IO1HQ005 April 23, 2001 Special Review of the Yucca Mountain Project, IO1HQ005 Special Inquiry: IO1HQ005 More Documents & Publications Special Inquiry:...

57

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com  

E-Print Network (OSTI)

RECAPITI AZIENDALI Apple m EducationtalentIT@apple.com 1 www.apple.com/jobs/it/retail CHI SIAMO Gli Apple Store non sono soltanto negozi tra i più innovativi al mondo, ma anche tra i più dinamici e, coinvolgenti, collaborative e dinamiche, con una spiccata passione per Apple e i suoi prodotti. OPPORTUNIT�

De Cindio, Fiorella

58

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

59

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

60

Cynthia Sandberg: Love Apple Farm  

E-Print Network (OSTI)

me about the name, Love Apple Farm. Where does that comegrowbetterveggies/about-love-apple-farm.html See http://Photo by Tana Butler Love Apple Farm Cynthia Sandberg is

Rabkin, Sarah

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Apple Trees for Every Garden  

E-Print Network (OSTI)

Grower Press. Organic Apple Production Manual. Publication #of dwarf and semi-dwarf apple varieties can be seen in theGardener Apple Trees for Every Garden Orin Martin manages

Martin, Orin

2008-01-01T23:59:59.000Z

62

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

63

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system. March 9, 2012 U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

64

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were...

65

V-025: Bugzilla Multiple Cross Site Scripting and Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to version 3.6.12, 4.0.9, or 4.2.4 or apply patches. Addthis Related Articles V-080: Apple iOS Multiple Vulnerabilities T-568: Mozilla Firefox Bugs Let Remote Users Conduct...

66

Cinnamon Muffin 100% Apple Juice  

E-Print Network (OSTI)

31 ½ Apple Cinnamon Muffin 100% Apple Juice 5oz Milk Chef Michele Pastorello Milk Choices: Whole White 4oz Juice Choices: 100% Apple 100% Orange NO SCHOOL May 17th SCHOOL CLOSED May 28th Updated 4 100% Orange Juice 5oz Milk Cream of Wheat Sliced Pears 5oz Milk Turkey Sausage Biscuit 100% Apple

Delgado, Mauricio

67

AIDP -Apple Interface Design Project  

E-Print Network (OSTI)

AIDP - Apple Interface Design Project AIDP - Apple Interface Design Project m 92-95 m Joy Mountford m Design Centre, Advanced Technology Group m Apple's Industrial Design Group "Encourage ProjectThe Project m Bridge the gulf between the physical and virtual worlds - Apple m Design a new way

Tollmar, Konrad

68

Tuna Apple Salad Sandwiches Ingredients  

E-Print Network (OSTI)

Tuna Apple Salad Sandwiches Ingredients: 6 1/2 ounces tuna in water, canned 1 stalk celery 1 apple and chop in small pieces. Wash and cut apple in half and in half again. Cut out core and chop into small pieces. 3. Add celery and apple to tuna. Stir well. 4. Add mayonnaise and lemon juice. Stir well. 5

Liskiewicz, Maciej

69

Apple Scab of Flowering Crabapples  

E-Print Network (OSTI)

Apple Scab of Flowering Crabapples Flowering crabapples add color and beauty to many home leaves and defoliation by early summer. The cause of this problem is a fungus disease known as apple scab. The same disease is also a common problem on eating apples, refer to BP-1 (Apple Scab in the Home Fruit

70

I/O Formats at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

I/O Formats I/O Formats I/O Formats Software I/O continues to be one of the main bottlenecks for scientific applications. Here are two software packages that many application developers use to manage input/output of heterogeneous types of binary application data used on many different platforms. HDF5 and NETCDF are both implemented on top of MPI-IO and have gained popularity as alternatives to basic POSIX API. HDF5 is a machine-independent and self-documenting file format. Each HDF5 file "looks" like a directory tree, with subdirectories, and leaf nodes that contain the actual data. This means that data can be found in a file by referring to its name, rather than its location in the file. NetCDF is a file format and support library developed at the National Center for Atmospheric Research (NCAR).

71

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

72

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

73

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

74

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

75

I/O Libraries at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

improved support for parallel IO. Read More H5Part H5Part is a simplified 'veneer' API that sits on top of HDF5 and supports several commonly used data models. Read More ...

76

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

77

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

78

Reflectivematerials enhance `Fuji'apple  

E-Print Network (OSTI)

Reflectivematerials enhance `Fuji'apple color Harry Andris o Carlos H. Crisosto Red color developmentis an important factor for consumer acceptance of California 'Fuji' apples. Several attempts to im not affect fla- vor, it is an important factor for con- sumer acceptance of apples. Cyanidin is the immediate

Crisosto, Carlos H.

79

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs  

E-Print Network (OSTI)

approaches are ineffective Micro-code patching Compiler workarounds OS hacks Firmware #12;http Condition L1, ALU, Memory, etc. Hang, data corruption IO failure, wrong data A (BCD) Signal Snoop L1 hit IO

Torrellas, Josep

80

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide September 4, 2007 #12; Apple Inc. © 2007 Apple Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, Mac, and QuickTime are trademarks of Apple Inc., registered in the U.S. and other countries. Apple TV, iPhone, and Safari are trademarks of Apple Inc. i

Bieber, Michael

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

82

Century Learning through Apple Technology  

E-Print Network (OSTI)

21st Century Learning through Apple Technology July 4 ­ 5, 2013 This exciting institute will appeal to educators who wish to enhance their teaching in support of 21st century learning using Apple technology. This institute begins with a keynote address that looks at how new technologies can enhance 21st century learning

83

Apple Education iTunes U User's Guide  

E-Print Network (OSTI)

Apple Education iTunes U User's Guide December 11, 2006 #12; Apple Computer, Inc. © 2006 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, iPod, iTunes, and Mac are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Safari is a trademark of Apple Computer, Inc. i

Li, Teng

84

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International.  

E-Print Network (OSTI)

Ordering from Apple Royal Holloway University have a special agreement with Apple Distribution International. The overall management of the Agreement is via the Universities' Apple Computer Group (UACG at the National Apple Higher Education Agreement price. This pricing can be found at: https://ecommerce.apple

Royal Holloway, University of London

85

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

86

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

87

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

88

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

89

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

90

IOFSL: I/O Forwarding Scalability Layer | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

IOFSL: I/O Forwarding Scalability Layer IOFSL: I/O Forwarding Scalability Layer IOFSL is used to aggregate I/O operations, enabling large-scale application tracing for performance analysis of file systems IOFSL is used to aggregate I/O operations, enabling large-scale application tracing for performance analysis of file systems The IOFSL (I/O Forwarding Scalability Layer) project will design, build, and distribute a scalable, unified high-end computing I/O forwarding software layer that will be adopted and supported by DOE Office of Science and NNSA. This software layer will Provide function shipping at the file system interface level (without requiring middleware) that enables asynchronous coalescing and I/O without jeopardizing determinism for computation; Offload file system function from simple or full OS client processes

91

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

92

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 5/27/14 unh computer store university of new hampshire phone: (603) 862-1328 · faxBook Air AppleCare for MacBook Air AppleCare Protection Plan for Mac extends your coverage to three years Battery life varies by use and configuration. See www.apple.com/batteries for more information. 2 Compared

93

EU Verbraucherrechte Apple One-Year Limited  

E-Print Network (OSTI)

EU Verbraucherrechte Apple One-Year Limited Warranty AppleCare Protection Plan CC Service Pack, Kabel. Zusätzlich bei allen Macs: 1x Time Capsule oder 1x Airport Gerät sowie 1x Apple Display Macs u sowie 1x Apple Display Material- u. Herstellungsfehler. Keine Leistung für Verschlei�teile wie Akku

Fiebig, Peter

94

Fungicide control of apple scab: 2010 field trial  

E-Print Network (OSTI)

communications. 2010 Apple scab field trial, Department ofduring leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathology

Eynard, James; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

95

Potential of Mineral Uptake Efficiency by Some Apple Rootstocks  

E-Print Network (OSTI)

1999. Drought tolerance of apple rootstocks: Production andwater relations of five apple rootstocks. Acta Horticultureon Mineral Composition of Apple Leaves. J. Am. Soc. Hort.

Amiri, Mohammad E; Fallahi, Esmail

2009-01-01T23:59:59.000Z

96

Did Apple’s refusal to license proprietary information enabling interoperability with its iPod music player constitute an abuse under Article 82 of the EC Treaty?  

E-Print Network (OSTI)

Did Apple’s refusal to license proprietary informationtechnology that allowed Apple, as the creator of amises en œuvre par la société Apple Computer, Inc. dans les

Mazziotti, Giuseppe

2005-01-01T23:59:59.000Z

97

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

98

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

99

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

100

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

102

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

103

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

104

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced  

E-Print Network (OSTI)

Green Bean Apple Salad 1. 3 small apples, cored and thinly sliced 2. 1 lb green beans 3. ½ red keep apples from browning). Remove stems from fresh green beans, place in pot with 1 inch of water into rings. Mix apples, onions, cucumbers, green beans together. Add a splash of lemon juice, olive oil

Jawitz, James W.

105

Fire blight of apple blossoms Fireblight of apples and pears, caused by the  

E-Print Network (OSTI)

Fire blight of apple blossoms Fireblight of apples and pears, caused by the bacterium Erwinia. W. Lightner. 1990. Predicting apple blossom infections by Erwinia amylovora using the Maryblyt model for forecasting fire blight disease in apples and pears. University of Maryland, College Park, MD. #12;

106

Towards scalable I/O architecture for exascale systems  

Science Journals Connector (OSTI)

High performance computing (HPC) has crossed the Petaflop mark and is reaching the Exaflop range quickly. The exascale system is projected to have millions of nodes, with thousands of cores for each node. At such an extreme scale, the substantial amount ... Keywords: exascale systems, high performance computing, many-task computing, parallel I/O, parallel file systems, scalable I/O architecture, storage

Yong Chen

2011-11-01T23:59:59.000Z

107

Efficient data IO for a Parallel Global Cloud Resolving Model  

Science Journals Connector (OSTI)

Execution of a Global Cloud Resolving Model (GCRM) at target resolutions of 2-4 km will generate, at a minimum, 10s of Gigabytes of data per variable per snapshot. Writing this data to disk, without creating a serious bottleneck in the execution of the ... Keywords: Data formatting, Geodesic grid, Global Cloud Resolving Model, Grid Specifications, High performance IO, Parallel IO libraries

Bruce Palmer; Annette Koontz; Karen Schuchardt; Ross Heikes; David Randall

2011-12-01T23:59:59.000Z

108

Managing variability in the IO performance of petascale storage systems.  

SciTech Connect

Significant challenges exist for achieving peak or even consistent levels of performance when using IO systems at scale. They stem from sharing IO system resources across the processes of single large-scale applications and/or multiple simultaneous programs causing internal and external interference, which in turn, causes substantial reductions in IO performance. This paper presents interference effects measurements for two different file systems at multiple supercomputing sites. These measurements motivate developing a 'managed' IO approach using adaptive algorithms varying the IO system workload based on current levels and use areas. An implementation of these methods deployed for the shared, general scratch storage system on Oak Ridge National Laboratory machines achieves higher overall performance and less variability in both a typical usage environment and with artificially introduced levels of 'noise'. The latter serving to clearly delineate and illustrate potential problems arising from shared system usage and the advantages derived from actively managing it.

Wolf, Matthew; Zheng, Fang; Klasky, Scott; Schwan, Karsten; Oldfield, Ron A.; Lofstead, Gerald Fredrick, II; Liu, Qing; Kordenbrock, Todd

2010-11-01T23:59:59.000Z

109

Apple Price List unh computer store  

E-Print Network (OSTI)

Apple Price List 6/16/14 unh computer store university of new hampshire phone: (603) 862-1328 · fax for home) Upgrade: 4GB memory to 8GB memory & 128GB storage to 256GB storage $200.00 Apple USB Super http://computerstore.unh.edu/support.shtml for more details on warranty coverage. com #12;Apple Price

110

Malcolm Guite The Magic Apple Tree  

E-Print Network (OSTI)

Malcolm Guite The Magic Apple Tree Someday make a journey through the rain Through sodden streets in darkening December A journey to the magic apple tree. And journey also, darkling, through your past Journey records. You glimpsed it once within the garden wall, The image of an ancient apple tree, The fall

Robertson, Stephen

111

> GC-62 HQS Io002  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3/01 THI 13:35 FAX CA --- 3/01 THI 13:35 FAX CA --- > GC-62 HQS Io002 Statement of Considerations REQUEST BY 3M FOR AN ADVANCE WAIVER OF DOMESTIC AND FOREIGN RIGHTS IN SUBJECT INVENTIONS MADE IN THE COURSE OF OR SUBCONTRACT NO. 4500011817 UNDER DOE PRIME CONTRACT NO. DE-ACOS- 00OR22725; DOE WAIVER DOCKET W(A)-00-012 [ORO-752] Petitioner, 3M, has made a timely request for an advance waiver to worldwide rights in Subject Inventions made in the course of or under Subcontract No. 4500011817 under DOE Prime Contract DE-AC05-000R22725 with UT-Battelle, LLC. The scope of this work is to produce long (10-100 meter) High Temperature Superconductive (HTS) tapes. HTS tapes will be produced under varying conditions, tested and analyzed. A selection will be made between the ion beam-assisted

112

Infrared polarization measurements of Io in 1986  

SciTech Connect

New polarization measurements of Io were made with two different polarimeters at 3.8 and 4.8 microns. The measurements, at phase angles of about 2 deg, detect the polarization of reflected sunlight at both wavelengths. Only upper limits can be determined for the volcanic activity in 1986, but these limits show that there has been a remarkable decrease in activity, particularly of the Loki volcano, at these short wavelengths. The 1984 data (Goguen and Sinton (1985) are reanalyzed with the new model, which includes polarization of reflected sunlight. The large amount of thermal emission from the Loki volcano in 1984 produced a polarization that was dominant over that of reflected sunlight. 29 references.

Sinton, W.M.; Goguen, J.D.; Nagata, T.; Ellis, H.B. Jr.; Werner, M.

1988-09-01T23:59:59.000Z

113

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

114

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

115

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

116

Io hot spots - infrared photometry of satellite occultations  

SciTech Connect

Io's active hot spots, which are presently mapped on the basis of IR photometry of this moon's occultation by other Gallilean satellites, are obtained with greatest spatial resolution near the sub-earth point. A model is developed for the occultation lightcurves, and its fitting to the data defines the apparent path of the occulting satellite relative to Io; the mean error in apparent relative position of occulting satellites is of the order of 178 km. A heretofore unknown, 20-km diameter hot spot is noted on Io's leading hemisphere. 31 references.

Goguen, J.D.; Matson, D.L.; Sinton, W.M.; Howell, R.R.; Dyck, H.M.

1988-12-01T23:59:59.000Z

117

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2009 Michigan Apple Research Committee Michigan Apple Shippers MSU Extension MSU AgBioResearch NW MICHIGAN APPLE MATURITY REPORT #1 September 16, 2009 General Comments - This year the NWMHRS will be testing apples

118

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2007 Nikki Horticulture Society Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU Ag Pome Fruit Code-a-phone/Apple Maturity Line (231) 947-3063 NW MICHIGAN APPLE MATURITY REPORT #1 August

119

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

120

Task-Structured Probabilistic I/O Automata  

E-Print Network (OSTI)

In the Probabilistic I/O Automata (PIOA) framework, nondeterministicchoices are resolved using perfect-information schedulers,which are similar to history-dependent policies for Markov decision processes(MDPs). These ...

Canetti, Ran

2006-03-31T23:59:59.000Z

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Current parallel I/O limitations to scalable data analysis.  

SciTech Connect

This report describes the limitations to parallel scalability which we have encountered when applying our otherwise optimally scalable parallel statistical analysis tool kit to large data sets distributed across the parallel file system of the current premier DOE computational facility. This report describes our study to evaluate the effect of parallel I/O on the overall scalability of a parallel data analysis pipeline using our scalable parallel statistics tool kit [PTBM11]. In this goal, we tested it using the Jaguar-pf DOE/ORNL peta-scale platform on a large combustion simulation data under a variety of process counts and domain decompositions scenarios. In this report we have recalled the foundations of the parallel statistical analysis tool kit which we have designed and implemented, with the specific double intent of reproducing typical data analysis workflows, and achieving optimal design for scalable parallel implementations. We have briefly reviewed those earlier results and publications which allow us to conclude that we have achieved both goals. However, in this report we have further established that, when used in conjuction with a state-of-the-art parallel I/O system, as can be found on the premier DOE peta-scale platform, the scaling properties of the overall analysis pipeline comprising parallel data access routines degrade rapidly. This finding is problematic and must be addressed if peta-scale data analysis is to be made scalable, or even possible. In order to attempt to address these parallel I/O limitations, we will investigate the use the Adaptable IO System (ADIOS) [LZL+10] to improve I/O performance, while maintaining flexibility for a variety of IO options, such MPI IO, POSIX IO. This system is developed at ORNL and other collaborating institutions, and is being tested extensively on Jaguar-pf. Simulation code being developed on these systems will also use ADIOS to output the data thereby making it easier for other systems, such as ours, to process that data.

Mascarenhas, Ajith Arthur; Pebay, Philippe Pierre

2011-07-01T23:59:59.000Z

122

Pianola: A script-based I/O benchmark  

SciTech Connect

Script-based I/O benchmarks record the I/O behavior of applications by using an instrumentation library to trace I/O events and their timing. A replay engine can then reproduce these events from the script in the absence of the original application. This type of benchmark reproduces real-world I/O workloads without the need to distribute, build, or run complex applications. However, faithfully recreating the I/O behavior of the original application requires careful design in both the instrumentation library and the replay engine. This paper presents the Pianola script-based benchmarking system, which includes an accurate and unobtrusive instrumentation system and a simple-to-use replay engine, along with some additional utility programs to manage the creation and replay of scripts. We show that for some sample applications, Pianola reproduces the qualitative features of the I/O behavior. Moreover, the overall replay time and the cumulative read and write times are usually within 10% of the values measured for the original applications.

May, J

2008-09-18T23:59:59.000Z

123

Apple Computer: The iCEO Seizes the Internet  

E-Print Network (OSTI)

sales. Table 3: Milestones in Apple direct online retailingDate Event mid-1994 Apple launches first web site Nov. 19971998 Sept. 1998 Jan. 1999 Apple Store (U.S. ) opens; first

West, Joel

2002-01-01T23:59:59.000Z

124

Fungicide control of apple scab: 2007 trial results  

E-Print Network (OSTI)

from Adaskaveg et al. (2007). Apple trial, 2007. W.D. Gublerpp. MacHardy, W.E. 1996. Apple Scab. Biology, Epidemiology,Pest Management for Apples & Pears. 2 nd ed. University of

Janousek, Christopher N; Lorber, Jacob D; Wunderlich, Lynn; Gubler, W D

2010-01-01T23:59:59.000Z

125

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

126

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

127

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

128

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

129

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

130

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco IOS IPSec IKE Unspecified Denial of Service 8: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x ABSTRACT: The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. REFERENCE LINKS: Vendor Advisory Secunia Advisory SA48607 CVE-2012-0381 iMPACT ASSESSMENT: High discussion: The March 28, 2012, Cisco IOS Software Security Advisory bundled

131

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31 - 16340 of 28,905 results. 31 - 16340 of 28,905 results. Article Four Days Left to Buy Energy-Efficient Products for a 2009 Tax Credit! You may want to see if there are any deals out there for energy-efficient purchases-but time is running out if you want to get a tax credit when you file your 2009 taxes in April. http://energy.gov/energysaver/articles/four-days-left-buy-energy-efficient-products-2009-tax-credit Article U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. http://energy.gov/cio/articles/u-165-apple-ios-bugs-let-remote-users-execute-arbitrary-code-and-spoof-address-bar-urls

132

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

133

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

134

Baked Apple and Sweet Potato Casserole Ingredients  

E-Print Network (OSTI)

Baked Apple and Sweet Potato Casserole Ingredients: Non-stick cooking spray 5 sweet potatoes 4 aside. 2. Wash sweet potatoes with a vegetable brush, and use a knife and cutting board to cut into potato into small pieces. Add to large baking dish. 3. Cut apples down the center and in half again, down

Liskiewicz, Maciej

135

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

136

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

137

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

138

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

139

Michigan Apple Committee 2013/14 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2013/14 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets that helps achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

140

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2006 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2008 Michigan Apple Research Committee Michigan apple Shippers MSU Extension MSU AgBioResearch Current pricing information can be obtained at the following web sites: http://www.bhfm.com/ NW Michigan Pome Fruit Code-a-phone/Apple

142

Michigan Apple Committee 2014/15 Request for Proposals  

E-Print Network (OSTI)

1 Michigan Apple Committee 2014/15 Request for Proposals The Michigan Apple Committee (MAC the profitability of apple growing through improving production information and techniques; developing new markets subcommittee established the following as its charter in early 2009: To help the Michigan Apple Committee

Douches, David S.

143

ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO  

E-Print Network (OSTI)

ADIOS ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE CO NATIONAL RADIO ASTRONOMY OBSERVATORY TABLES ADIOS - ANALOG-DIGITAL INPUT OUTPUT SYSTEM FOR APPLE COMPUTER TABLE FOR CONTENTS Page I Module and Apple Card (Photograph) Figure 3 Complete Apple/ADIOS System (Photograph) Figure 4 Analog

Groppi, Christopher

144

Michigan Apple Committee 2012/13 Request for Proposals  

E-Print Network (OSTI)

Michigan Apple Committee 2012/13 Request for Proposals The Michigan Apple Committee (MAC) announces of apple growing through improving production information and techniques; developing new markets and new achieve this mission. In keeping with the spirit of the MAC's mission, the Michigan Apple Research

145

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 August 25, 2010  

E-Print Network (OSTI)

SW MICHIGAN APPLE MATURITY REPORT ISSUE 1 ­ August 25, 2010 Bill Shane, Diane Brown-Rytlewski, and Mark Longstroth Michigan State University This is the first of weekly apple maturity report for SW. See the Michigan State University apple web site (apples.msu.edu) for more information, including

146

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a  

E-Print Network (OSTI)

Apple Defect Segmentation by Artificial Neural Networks Devrim Unay a Bernard Gosselin a a TCTS Lab-colored apple fruits performed by several artificial neural networks. Pixel-wise classification approach apple defects. 1 Introduction Quality of apple fruits depends on size, color, shape and presence

Dupont, Stéphane

147

Introduction to Apple Mail with IMAP Version 4 October 2008  

E-Print Network (OSTI)

Introduction to Apple Mail with IMAP Version 4 ­ October 2008 Massachusetts Institute of Technology #12;Apple Mail Quick Start Guide Page 2 Getting Started This Quick Start class assumes that: 1. Apple Mail is configured for use at MIT. If you need help with configuration please see Apple Mail at MIT

Gabrieli, John

148

Michigan Apple Committee Research Priorities for 2014/15  

E-Print Network (OSTI)

Michigan Apple Committee Research Priorities for 2014/15 Following are the 2014/15 priorities of the Michigan Apple Committee. (In priority order.) 1. Increase demand To conduct consumer related research that will help sell Michigan Apples more profitably. a. Market research b. Value ­ convenience, apples versus

Douches, David S.

149

agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report  

E-Print Network (OSTI)

1 agbioresearch.msu.edu MSU Fruit Team Apple Maturity Report Northwest Region Reports - 2005 Jim Project GREEEN Michigan State Horticulture Society Michigan Apple Research Committee Michigan apple sites: www.ams.usda.gov/marketnews.htm www.bhfm.com NW Michigan Pome Fruit Code-a-phone/Apple Maturity

150

Synthetic and organic fungicide control of apple scab: 2009 field trial  

E-Print Network (OSTI)

during leaf fall to control apple scab (Venturia inaequalis)mixtures on scab control in apple orchards. Plant Pathologyscab development in an organic apple orchard. Agriculture,

Janousek, Christopher N; Bay, Ian S; Gubler, W. Douglas

2009-01-01T23:59:59.000Z

151

EFFECT OF TWO ROOTSTOCK SELECTIONS ON THE SEASONAL NUTRITIONAL VARIABILITY OF BRAEBURN APPLE  

E-Print Network (OSTI)

potasium and magnesium into apple fruit in high densityof Golden delicious apple trees. Acta Horticulturae 448:107-in leaves of different apple rootstocks and Elise Scion

Hirzel, Juan Fernando; Best, Stanley

2009-01-01T23:59:59.000Z

152

Abiotic and biotic factors affecting light brown apple moth, Epiphyas postvittana, in California  

E-Print Network (OSTI)

mortality of lightbrown apple moth. In: O’Callaghan, M. (tryoni and the light brown apple moth Epiphyas postvittanaof the light brown apple moth, Epiphyas postvittana (

Buergi, Linda Patricia

2012-01-01T23:59:59.000Z

153

U-016: Cisco IOS Software HTTP Service Loading Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am...

154

NERSC and HDF Group Optimize HDF5 Library to Improve I/O Performance  

NLE Websites -- All DOE Office Websites (Extended Search)

NERSC and HDF Group Optimize HDF5 Library to Improve IO Performance NERSC and HDF Group Optimize HDF5 Library to Improve IO Performance June 28, 2010 A common complaint among air...

155

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop  

E-Print Network (OSTI)

Apple Maturity Protocol Tests for apple flesh firmness and starch conversion are important tools for monitoring crop maturity. Flesh firmness, as measured with a pressure gauge, determines how long apples can adequate firmness for fresh market or processing uses. A second common assay for apple maturity

156

Enforcing I/O sequences for PLC validation purposes Anais Guignard  

E-Print Network (OSTI)

Enforcing I/O sequences for PLC validation purposes Anais Guignard Automated Production Research Validation of the behavior of a Programmable Logic Controller (PLC) by comparison of observed I/O se- quences to sequences built from a formal specification model requires that the consequences of the PLC I/O scan- ning

Paris-Sud XI, Université de

157

Towards I/O analysis of HPC systems and a generic architecture to collect access patterns  

Science Journals Connector (OSTI)

In high-performance computing applications, a high-level I/O call will trigger activities on a multitude of hardware components. These are massively parallel systems supported by huge storage systems and internal software layers. Their complex interplay ... Keywords: Causality tree, I/O analysis, I/O path

Marc C. Wiedemann; Julian M. Kunkel; Michaela Zimmer; Thomas Ludwig; Michael Resch; Thomas Bönisch; Xuan Wang; Andriy Chut; Alvaro Aguilera; Wolfgang E. Nagel; Michael Kluge; Holger Mickler

2013-05-01T23:59:59.000Z

158

Photoelectron Spectroscopy and Theoretical Study of M(IO3)2&ndash...  

NLE Websites -- All DOE Office Websites (Extended Search)

It is found that the structure of H(IO3)2- can be written as IO3-(HIO3), in which the H atom is tightly bound to one of the IO3- groups and forms an iodic acid (HIO3) molecule;...

159

An application-level parallel I/O library for Earth system models  

Science Journals Connector (OSTI)

We describe the design and implementation of an application-level parallel I/O (PIO) library for the reading and writing of distributed arrays to several common scientific data formats. PIO provides the flexibility to control the number of I/O tasks ... Keywords: Earth System Modeling, Parallel I/O, memory efficient, netCDF, parallel computing

John M. Dennis; Jim Edwards; Ray Loy; Robert Jacob; Arthur A. Mirin; Anthony P. Craig; Mariana Vertenstein

2012-02-01T23:59:59.000Z

160

A Scalable Message Passing Interface Implementation of an Ad-Hoc Parallel I/o system  

Science Journals Connector (OSTI)

In this paper we present the novel design, implementation, and evaluation of an ad-hoc parallel I/O system (AHPIOS). AHPIOS is the first scalable parallel I/O system completely implemented in the Message Passing Interface (MPI). The MPI implementation ... Keywords: distributed file systems, parallel I/O, parallel systems, parallelism and concurrency

Florin Isaila; Francisco Javier Garcia Blas; Jesús Carretero; Wei-Keng Liao; Alok Choudhary

2010-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

ROMIO: A High-Performance, Portable MPI-IO Implementation  

NLE Websites -- All DOE Office Websites (Extended Search)

ROMIO: A High-Performance, Portable MPI-IO Implementation ROMIO: A High-Performance, Portable MPI-IO Implementation Overview Note: The version of ROMIO described on this page is an old one. We haven't released newer versions of ROMIO as independent packages for a while; they were included as part of MPICH2 and MPICH-1. You can get the latest version of ROMIO when you download MPICH2 or MPICH-1. ROMIO is a high-performance, portable implementation of MPI-IO, the I/O chapter in MPI-2. Version 1.2.5.1 of ROMIO (January 2003) is freely available. The new features in this version are listed here. ROMIO runs on at least the following machines: IBM SP; Intel Paragon; HP Exemplar; SGI Origin2000; Cray T3E; NEC SX-4; other symmetric multiprocessors from HP, SGI, DEC, Sun, and IBM; and networks of workstations (Sun, SGI, HP, IBM, DEC, Linux, and FreeBSD). Supported file

162

Evaluating Memory Energy Efficiency in Parallel I/O Workloads  

E-Print Network (OSTI)

Evaluating Memory Energy Efficiency in Parallel I/O Workloads Jianhui Yue,Yifeng Zhu , Zhao Cai the ever- widening gap between disk and processor speeds, memory energy efficiency becomes an increasingly management policies heavily influence the overall memory energy efficiency. In partic- ular, under the same

Zhu, Yifeng

163

Towards an energy-aware scientific I/O interface  

Science Journals Connector (OSTI)

Intelligently switching energy saving modes of CPUs, NICs and disks is mandatory to reduce the energy consumption.Hardware and operating system have a limited perspective of future performance demands, thus automatic control is suboptimal. However, it ... Keywords: ADIOS, Energy efficiency, Performance analysis, Performance optimization, Scientific I/O API

Julian M. Kunkel; Timo Minartz; Michael Kuhn; Thomas Ludwig

2012-11-01T23:59:59.000Z

164

A New I/O Scheduler for Solid State Devices  

E-Print Network (OSTI)

parameters of solid state drives. Using the information from the parameter extraction, we present a new I/O scheduler design which utilizes the structure of solid state devices to efficiently schedule writes. The new scheduler, implemented on a 2.6 Linux...

Dunn, Marcus P.

2010-10-12T23:59:59.000Z

165

An Apple a Day -- A Futuristic Parable  

Science Journals Connector (OSTI)

...thousands of sidewalk apple vendors. Second, studies of competition and regulation showed that the costs of apple production actually went up more rapidly in regulated industries than in competitive ones (see J. Zwanziger and G. Melnick, "Competition and Regulation in the Wholesale Fruit Industry," Free... It all began about 20 years ago, in early 1994, when somebody joked with Hillary Rodham Clinton that “an apple a day keeps the doctor away,” noting that this would provide the best cost control imaginable. The idea took root as if both Johnny and Joanie ...

Phelps C.E.

1994-03-17T23:59:59.000Z

166

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

167

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

168

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

169

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

170

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

171

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

172

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

173

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

174

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

175

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

176

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

177

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

178

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

179

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

180

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

182

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

183

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

184

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

185

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

186

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

187

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

188

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

189

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

190

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

191

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

192

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

193

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

194

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

195

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

196

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

197

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

198

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

199

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

200

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

202

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

203

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

204

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

205

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

206

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

207

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

208

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

209

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

210

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

211

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

212

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

213

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

214

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

215

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

216

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

217

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

218

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

219

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

220

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

222

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

223

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

224

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

225

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

226

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

227

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

228

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

229

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

230

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

231

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

232

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

233

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

234

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

235

Characterization of Io's volcanic activity by infrared polarimetry  

SciTech Connect

The thermal emission from Io's volcanic hot spots is linearly polarized.Infrared measurements at 4.76 micrometers show disk-integrated polarization as large as 1.6 percent. The degree and position angle of linear polarization vary with Io's rotation in a manner characteristic of emission from a small number of hot spots. A model incorporating three hot spots best fits the data. The largest of these hot spots lies to the northeast of Loki Patera, as mapped from Voyager, and the other spot on the trailing hemisphere is near Ra Patera. The hot spot on the leading hemisphere corresponds to no named feature on the Voyager maps. The value determined for the index of refraction of the emitting surface is a lower bound; it is similar to that of terrestrial basalts and is somewhat less than that of sulfur. 25 references.

Goguen, J.D.; Sinton, W.M.

1985-10-01T23:59:59.000Z

236

Performance Impact of I/O on QMCPack Simulations at the Petascale and Beyond  

SciTech Connect

Traditional petascale applications, such as QMCPack, can scale their computations to completely utilize modern supercomputers like Titan, but they cannot scale their I/O. To preserve scalability, scientists cannot save data at the granularity needed to enable scientific discovery and are forced to use large intervals between two checkpoint calls. In this paper, we work to increase the granularity of the I/O in QMCPack simulations without increasing the I/O associated overhead or compromising the scalability of the simulations. Our solution redesigns the I/O algorithms used by QMCPack to gather finer-grained data at high frequencies and integrate the ADIOS API to select effective I/O methods without major code changes. The extension of a tool such as Skel to mimic the variable I/O in QMCPack allows us to predict the I/O performance of the code when using ADIOS methods at the petascale. We show how I/O libraries like ADIOS allow us to increase the amount of scientific data extracted from QMCPack simulations at the granularity desired by the scientists while keeping the I/O overhead below 10%. We also show how the impact of checkpoint I/O for the QMCPack code using ADIOS is below 5% when using preventive tactics for checkpointing at the petascale and beyond.

Herbein, Stephen N [ORNL] [ORNL; Matheny, Michael E [ORNL] [ORNL; Wezowicz, Matthew R [ORNL] [ORNL; Krogel, Jaron T [ORNL] [ORNL; Kim, Jeongnim [ORNL] [ORNL; Klasky, Scott A [ORNL] [ORNL; Taufer, Michela [ORNL] [ORNL

2014-01-01T23:59:59.000Z

237

The power of lightness. Apple iPad Price List  

E-Print Network (OSTI)

iPad Air The power of lightness. Apple iPad Price List 6/11/14 unh computer store university of new with iPad (4th generation). 2 Battery life varies by use and configuration. See www.apple with Wi-Fi + Cellular 16GB 32GB 64GB 128GB $629 $729 $829 $929 AppleCare+ for iPad AppleCare+ provides 2

238

VisIO: enabling interactive visualization of ultra-scale, time-series data via high-bandwidth distributed I/O systems  

SciTech Connect

Petascale simulations compute at resolutions ranging into billions of cells and write terabytes of data for visualization and analysis. Interactive visuaUzation of this time series is a desired step before starting a new run. The I/O subsystem and associated network often are a significant impediment to interactive visualization of time-varying data; as they are not configured or provisioned to provide necessary I/O read rates. In this paper, we propose a new I/O library for visualization applications: VisIO. Visualization applications commonly use N-to-N reads within their parallel enabled readers which provides an incentive for a shared-nothing approach to I/O, similar to other data-intensive approaches such as Hadoop. However, unlike other data-intensive applications, visualization requires: (1) interactive performance for large data volumes, (2) compatibility with MPI and POSIX file system semantics for compatibility with existing infrastructure, and (3) use of existing file formats and their stipulated data partitioning rules. VisIO, provides a mechanism for using a non-POSIX distributed file system to provide linear scaling of 110 bandwidth. In addition, we introduce a novel scheduling algorithm that helps to co-locate visualization processes on nodes with the requested data. Testing using VisIO integrated into Para View was conducted using the Hadoop Distributed File System (HDFS) on TACC's Longhorn cluster. A representative dataset, VPIC, across 128 nodes showed a 64.4% read performance improvement compared to the provided Lustre installation. Also tested, was a dataset representing a global ocean salinity simulation that showed a 51.4% improvement in read performance over Lustre when using our VisIO system. VisIO, provides powerful high-performance I/O services to visualization applications, allowing for interactive performance with ultra-scale, time-series data.

Mitchell, Christopher J [Los Alamos National Laboratory; Ahrens, James P [Los Alamos National Laboratory; Wang, Jun [UCF

2010-10-15T23:59:59.000Z

239

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 22, 2013 March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services March 21, 2013 V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system March 20, 2013 V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges Several vulnerabilities were reported in Apple iOS March 19, 2013 V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability A vulnerability has been reported in RealPlayer March 18, 2013 V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code

240

Mobile Device Guide Apple iPhone Devices  

E-Print Network (OSTI)

Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised: 1/20/11 Page 1 of 3 ConnectingPhone desktop. 1a. Expand `Mail, Contacts, Calendars' as shown. #12;Mobile Device Guide ­ Apple iPhone Devices (case sensitive). 4. Tap `next'. #12;Mobile Device Guide ­ Apple iPhone Devices CSUF Date Last Revised

de Lijser, Peter

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Curried Pumpkin Soup with Roasted Apple and Crme Frache  

E-Print Network (OSTI)

Curried Pumpkin Soup with Roasted Apple and Crème Fraîche Recipe courtesy of Gordon Hamersley teaspoon chili powder (optional) 3 medium apples, peeled, cored, and chopped 2 1/2 quarts chicken stock 1 apple, roasted and sliced for garnish crème fraîche DIRECTIONS 1. Preheat the oven to 350 degrees. 2

Spence, Harlan Ernest

242

MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2011 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

243

Publish by Abstract RNA Extraction From Different Apple Tissues  

E-Print Network (OSTI)

Publish by Abstract RNA Extraction From Different Apple Tissues Rich in Polyphenols. An efficient procedure for isolating RNA from bud, internodal shoot, flower, and fruit tissues of apple has in apple fruit and flower tissues. Isolated RNA is of high qual- ity and is undegraded as assessed

Korban, Schuyler S.

244

MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports  

E-Print Network (OSTI)

1 MSU Fruit Team 2010 Apple Maturity Report Northwest Region Reports During the harvest season, apples from different regions are collected for maturity testing. The data is then compiled by MSU Extension educators into recommendations for harvest and storage of the most commonly grown apple varieties

245

Original article Characterisation of apple orchard management systems  

E-Print Network (OSTI)

Original article Characterisation of apple orchard management systems in a French Mediterranean) Abstract ­ The objective of our study was to characterise cropping systems in apple arboriculture in the less sensitive areas. apple orchard / on-farm survey / cultivation operation / management indicator

Paris-Sud XI, Université de

246

Original article Nutrient leaching from soil amended with apple waste  

E-Print Network (OSTI)

Original article Nutrient leaching from soil amended with apple waste Anne-Marie de COCKBORNE December 2000) Abstract ­ Among the possibilities for disposing of overproduction of apple, land application is flexible and inexpensive. Six soil columns receiving 0, 200 or 500 Mg of apple wasteha­1 were

Paris-Sud XI, Université de

247

Micropropagation Rooting and weaning of apple rootstock YP  

E-Print Network (OSTI)

Micropropagation Rooting and weaning of apple rootstock YP M Uosukainen Agricultural Research-23 May 1992, Dijon, France) Summary — Rooting and weaning of the Finnish apple rootstock YP were arbusculaires INTRODUCTION Research on micropropagation of apple trees started > 20 yr ago (Elliot, 1972; Walkey

Paris-Sud XI, Université de

248

U-016: Cisco IOS Software HTTP Service Loading Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service 16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am Addthis PROBLEM: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability . PLATFORM: Cisco IOS Software ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition. reference LINKS: CISCO Security Intelligence Operations IntelliShield ID: 24436 CVE-2011-2586 IMPACT ASSESSMENT: Medium Discussion: Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper

249

Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O  

SciTech Connect

The growth in the computational capability of modern supercomputing systems has been accompanied by corresponding increases in CPU count, total RAM, and total storage capacity. Indeed, systems such as Blue-Gene/L [3], BlueGene/P, Ranger, and the Cray XT series have grown to more than 100k processors, with 100 TeraBytes of RAM and are attached to multi-PetaByte storage systems. However, as part of this design evolution, large supercomputers have lost node-local storage elements, such as disks. While this decision was motivated by important considerations like overall system reliability, it also resulted in these systems losing a key level in their memory hierarchy, with nothing to fill the gap between local RAM and the parallel file system. While today's large supercomputers are typically attached to fast parallel file systems, which provide tens of GBs/s of I/O bandwidth, the computational capacity has grown much faster than the storage bandwidth capacity. As such, these machines are now provided with much less than 1GB/s of I/O bandwidth per TeraFlop of compute power, which is below the generally accepted limit required for a well-balanced system [8] [16]. The result is that today's limited I/O bandwidth is choking the capabilities of modern supercomputers, specifically in terms of limiting their working sets and making fault tolerance techniques, such as checkpointing, prohibitively expensive. This paper presents an alternative system design oriented on using node-local storage to improve aggregate system I/O bandwidth. We focus on the checkpointing use-case and present an experimental evaluation of SCR, a new checkpointing library that makes use of node-local storage to significantly improve the performance of checkpointing on large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching 700GB/s on 8,752 processors. Our results scale such that we expect a similarly structured system consisting of 12,500 processors to achieve aggregate I/O bandwidth of 1 TB/s.

Moody, A; Bronevetsky, G

2008-05-20T23:59:59.000Z

250

Appling County Pellets | Open Energy Information  

Open Energy Info (EERE)

Appling County Pellets Appling County Pellets Jump to: navigation, search Name Appling County Pellets Place Graham, Georgia Zip 31513 Sector Biomass Product Producer of wood pellets and other biomass products located in Georgia. Coordinates 47.055765°, -122.294774° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":47.055765,"lon":-122.294774,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

251

SynchLink: an iOS app for ISPyB  

Science Journals Connector (OSTI)

An iOS app has been developed as a front end to ISPyB, a laboratory information system for macromolecular crystallography synchrotron beamlines.

Ginn, H.M.

2014-09-04T23:59:59.000Z

252

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

253

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

254

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

255

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

256

Scalable I/O Systems via Node-Local Storage: Approaching 1 TB/sec File I/O  

SciTech Connect

In the race to PetaFLOP-speed supercomputing systems, the increase in computational capability has been accompanied by corresponding increases in CPU count, total RAM, and storage capacity. However, a proportional increase in storage bandwidth has lagged behind. In order to improve system reliability and to reduce maintenance effort for modern large-scale systems, system designers have opted to remove node-local storage from the compute nodes. Today's multi-TeraFLOP supercomputers are typically attached to parallel file systems that provide only tens of GBs/s of I/O bandwidth. As a result, such machines have access to much less than 1GB/s of I/O bandwidth per TeraFLOP of compute power, which is below the generally accepted limit required for a well-balanced system. In a many ways, the current I/O bottleneck limits the capabilities of modern supercomputers, specifically in terms of limiting their working sets and restricting fault tolerance techniques, which become critical on systems consisting of tens of thousands of components. This paper resolves the dilemma between high performance and high reliability by presenting an alternative system design which makes use of node-local storage to improve aggregate system I/O bandwidth. In this work, we focus on the checkpointing use-case and present an experimental evaluation of the Scalable Checkpoint/Restart (SCR) library, a new adaptive checkpointing library that uses node-local storage to significantly improve the checkpointing performance of large-scale supercomputers. Experiments show that SCR achieves unprecedented write speeds, reaching a measured 700GB/s of aggregate bandwidth on 8,752 processors and an estimated 1TB/s for a similarly structured machine of 12,500 processors. This corresponds to a speedup of over 70x compared to the bandwidth provided by the 10GB/s parallel file system the cluster uses. Further, SCR can adapt to an environment in which there is wide variation in performance or capacity among the individual node-local storage elements.

Bronevetsky, G; Moody, A

2009-08-18T23:59:59.000Z

257

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

258

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

259

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

260

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

262

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

263

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

264

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

265

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

266

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

267

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

268

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

269

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

270

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

271

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

272

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

273

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

274

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

275

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

276

Using Web Service Gateways and Code Generation for Sustainable IoT System Development  

E-Print Network (OSTI)

use case this paper shows how we hope to make equally sustainable IoT solutions by employing a modelUsing Web Service Gateways and Code Generation for Sustainable IoT System Development Till Riedel+ years may especially profit from an Internet of Things. Motivated by a practical industrial servicing

Beigl, Michael

277

A MECHANISM FOR THE PRODUCTION OF A DISK-SHAPED NEUTRAL SOURCE CLOUD AT IO  

E-Print Network (OSTI)

Universitaria, Coyoacan, C.P. 04510, Mexico ABSTRACT Io adds of the order of 1000 kg s-1 of ionized material emissions [Bigg, 1964]. Voyager observations have revealed many details of the massloading process at Io [e ions, and then transport across the magnetic field as neutrals, followed by subsequent ionizati

Russell, Christopher T.

278

An Optimizing Compiler for Petascale I/O on Leadership-Class Architectures  

SciTech Connect

In high-performance computing (HPC), parallel I/O architectures usually have very complex hierarchies with multiple layers that collectively constitute an I/O stack, including high-level I/O libraries such as PnetCDF and HDF5, I/O middleware such as MPI-IO, and parallel file systems such as PVFS and Lustre. Our DOE project explored automated instrumentation and compiler support for I/O intensive applications. Our project made significant progress towards understanding the complex I/O hierarchies of high-performance storage systems (including storage caches, HDDs, and SSDs), and designing and implementing state-of-the-art compiler/runtime system technology that targets I/O intensive HPC applications that target leadership class machine. This final report summarizes the major achievements of the project and also points out promising future directions Two new sections in this report compared to the previous report are IOGenie and SSD/NVM-specific optimizations.

Kandemir, Mahmut Taylan [PSU; Choudary, Alok [Northwestern; Thakur, Rajeev [ANL

2014-03-01T23:59:59.000Z

279

1CAItUS69, 519--531 (1987) Magnetospheric Plasma Sputtering of Io's Atmosphere  

E-Print Network (OSTI)

1CAItUS69, 519--531 (1987) Magnetospheric Plasma Sputtering of Io's Atmosphere M. A. Mc be used as knowledge of both the plasma flow and atmospheric composition improve. © 1987Academic Press, ln of material from Io to the plasma torus (Kumar, 1984), although the amount of atmospheric gas required

Johnson, Robert E.

280

High-Speed I/O: The Operating System As A Signalling Position paper  

E-Print Network (OSTI)

, and I/O devices. With the increasing disparity be- tween I/O bandwidth and CPU performance, this architecture ex- poses the processor and memory subsystems as the bottlenecks to system performance. Furthermore, this design does not easily lend itself to exploitation of new capabilities in peripheral devices

Yang, Junfeng

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

RFS: Efficient and Flexible Remote File Access for MPI-IO Jonghyun Lee  

E-Print Network (OSTI)

RFS: Efficient and Flexible Remote File Access for MPI-IO Jonghyun Lee Xiaosong Ma§ Robert Ross, Argonne, IL 60439, U.S.A. Department of Computer Science, North Carolina State University, Raleigh, NC% of the theoretical peak throughput. The computation slowdown caused by concurrent I/O activities was 0.2­6.2%, which

Ma, Xiaosong

282

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina  

E-Print Network (OSTI)

The standard computer models for 2014 are the Dell 9020 desktop, Dell e6440 laptop, Apple 21.5" iMac desktop and Apple 13" Mac Book Pro laptop or Apple 13" Mac Book Pro with Retina Display (see important distinctions below). Keep in mind that Dell and Apple are continuously modifying their lines, so although

Aalberts, Daniel P.

283

Cutting Edge Design or a Beginner’s Mistake? – A Semiotic Inspection of iOS7 Icon Design Changes  

Science Journals Connector (OSTI)

This work follows an ongoing discussion on the implications of skeuomorphic vs. flat design for interface design. Therefor two subsets of the standard iOS6 and iOS7 system icons were reviewed with a semiotic insp...

Christian Stickel; Hans-Martin Pohl…

2014-01-01T23:59:59.000Z

284

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

285

Light brown apple moth’s arrival in California worries commodity groups  

E-Print Network (OSTI)

control of light brown apple moth, Epi- phyas postvittana (2007a. Light brown apple moth host list. www.cdfa.ca.gov/p. CDFA. 2007b. Light brown apple moth project: Advisories.

Varela, Lucia G.; Johnson, Marshall W; Strand, Larry; Wilen, Cheryl A; Pickel, Carolyn

2008-01-01T23:59:59.000Z

286

Why the Apple Doesn’t Fall Far: Understanding Intergenerational Transmission of Human Capital  

E-Print Network (OSTI)

Kjell G. Salvanes. 2003. “Why the Apple Doesn’t Fall Far:Why the Apple Doesn't Fall Far: UnderstandingPaper Series Why the Apple Doesn’t Fall Far: Understanding

Black, Sandra; Devereux, Paul; Salvanes, Kjell

2004-01-01T23:59:59.000Z

287

New Zealand lessons may aid efforts to control light brown apple moth in California  

E-Print Network (OSTI)

1975. Integrated control of apple pests in New Zealand. 1.of the light brown apple moth Epiphyas postvittana (Walker),685–92. Dumbleton L J. 1932. The apple leaf-roller (Tortrix

Varela, Lucia G.; Walker, James T.S.; Lo, Peter L; Rogers, David J

2010-01-01T23:59:59.000Z

288

Impact of Foliar Fertilizer Containing Iodine on “Golden Delicious” Apple Trees  

E-Print Network (OSTI)

on marketable Golden Delicious/M.9 apple production. At thecontaining fertilizer on apple fruits firmness and theirold “Golden Delicious/M.9” apple trees Trees were spaced at

Szwonek, Eugeniusz

2009-01-01T23:59:59.000Z

289

The Atom and the Apple, Princeton University Press, "The Atom and the Apple is a delightful ramble through many areas of science as well as  

E-Print Network (OSTI)

The Atom and the Apple, Princeton University Press, Reviews: "The Atom and the Apple and stimulating, and it frequently challenges political correctness. . . . The Atom and the Apple provides." --Publishers Weekly (Starred Review) #12;Science Teacher Association recommends : The Atom and the Apple

Balibar, Sébastien

290

Apple Burrknot Borers in New York Revisited Pest status and chemical control of borers infesting apple burrknots in New York State  

E-Print Network (OSTI)

Apple Burrknot Borers in New York ­ Revisited Pest status and chemical control of borers infesting apple burrknots in New York State DAVID P. KAIN, RICHARD W. STRAUB AND ARTHUR M. AGNELLO Department damage to dwarf apple trees caused by American plum borer, a survey was conducted in the major apple

Agnello, Arthur M.

291

Reducing Concurrency Bottlenecks in Parallel I/O Workloads  

SciTech Connect

To enable high performance parallel checkpointing we introduced the Parallel Log Structured File System (PLFS). PLFS is middleware interposed on the file system stack to transform concurrent writing of one application file into many non-concurrently written component files. The promising effectiveness of PLFS makes it important to examine its performance for workloads other than checkpoint capture, notably the different ways that state snapshots may be later read, to make the case for using PLFS in the Exascale I/O stack. Reading a PLFS file involved reading each of its component files. In this paper we identify performance limitations on broader workloads in an early version of PLFS, specifically the need to build and distribute an index for the overall file, and the pressure on the underlying parallel file system's metadata server, and show how PLFS's decomposed components architecture can be exploited to alleviate bottlenecks in the underlying parallel file system.

Manzanares, Adam C. [Los Alamos National Laboratory; Bent, John M. [Los Alamos National Laboratory; Wingate, Meghan [Los Alamos National Laboratory

2011-01-01T23:59:59.000Z

292

Efficient data IO for a Parallel Global Cloud Resolving Model  

SciTech Connect

Execution of a Global Cloud Resolving Model (GCRM) at target resolutions of 2-4 km will generate, at a minimum, 10s of Gigabytes of data per variable per snapshot. Writing this data to disk without creating a serious bottleneck in the execution of the GCRM code while also supporting efficient post-execution data analysis is a significant challenge. This paper discusses an Input/Output (IO) application programmer interface (API) for the GCRM that efficiently moves data from the model to disk while maintaining support for community standard formats, avoiding the creation of very large numbers of files, and supporting efficient analysis. Several aspects of the API will be discussed in detail. First, we discuss the output data layout which linearizes the data in a consistent way that is independent of the number of processors used to run the simulation and provides a convenient format for subsequent analyses of the data. Second, we discuss the flexible API interface that enables modelers to easily add variables to the output stream by specifying where in the GCRM code these variables are located and to flexibly configure the choice of outputs and distribution of data across files. The flexibility of the API is designed to allow model developers to add new data fields to the output as the model develops and new physics is added and also provides a mechanism for allowing users of the GCRM code itself to adjust the output frequency and the number of fields written depending on the needs of individual calculations. Third, we describe the mapping to the NetCDF data model with an emphasis on the grid description. Fourth, we describe our messaging algorithms and IO aggregation strategies that are used to achieve high bandwidth while simultaneously writing concurrently from many processors to shared files. We conclude with initial performance results.

Palmer, Bruce J.; Koontz, Annette S.; Schuchardt, Karen L.; Heikes, Ross P.; Randall, David A.

2011-11-26T23:59:59.000Z

293

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

294

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY  

E-Print Network (OSTI)

Revised: MASTERS_APPL_ENROLL_TO_PHD-06/04/2014-KCNee FOR ENROLLED STUDENTS ONLY APPLICATION STAFF _____POST MASTERS PLAN APPL #_____________________ _______________ _____RESIDENCY UPDATED

Maryland, Baltimore County, University of

295

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

296

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

297

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

298

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

299

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

300

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

302

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

303

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

304

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

305

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

306

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

307

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

308

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

309

Silo & HDF5 I/O Scaling Improvements on BG/P Systems  

SciTech Connect

Silo and HDF5 are I/O libraries used by many codes important to the LLNL's Weapons and Complex Integration (WCI) mission. In the past year, modest adjustments and tuning of Silo, HDF5 and the I/O configuration of the BG/P platform, Dawn, were undertaken. A key goal of this work was to improve I/O performance without requiring any changes in the application codes themselves. In particular, the application codes have been allowed to continue to use a simplified yet highly flexible I/O paradigm known as 'Poor Man's Parallel I/O', where scalability is achieved through concurrent, serial I/O to multiple files. The results demonstrate substantial performance gains (better than 50x in many cases) at large scale (greater than 64,000 MPI tasks). They describe key enhancements made to Silo, HDF5 and the I/O configuration of our BG/P platform and present very favorable results from scalability studies over a wide range of operating scenarios.

Collette, M R; Miller, M C

2010-12-02T23:59:59.000Z

310

Benefits of Parallel I/O in Ab Initio Nuclear Physics Calculations, ICCS 2009 Proceedings  

SciTech Connect

Many modern scientific applications rely on highly parallel calculations, which scale to 10's of thousands processors. However, most applications do not concentrate on parallelizing input/output operations. In particular, sequential I/O has been identified as a bottleneck for the highly scalable MFDn (Many Fermion Dynamics for nuclear structure) code performing ab initio nuclear structure calculations. In this paper, we develop interfaces and parallel I/O procedures to use a well-known parallel I/O library in MFDn. As a result, we gain efficient input/output of large datasets along with their portability and ease of use in the downstream processing.

Laghave, Nikhil; Sosonkina, Masha; Maris, Pieter; Vary, James P.

2009-05-20T23:59:59.000Z

311

Semantic Web of Things: an analysis of the application semantics for the IoT moving towards the IoT convergence  

Science Journals Connector (OSTI)

The Internet of Things (IoT) is being applied for stovepipe solutions, since it presents a semantic description limited to a specific domain. IoT needs to be pushed towards a more open, interoperable and collaborative IoT. The first step has been the Web of Things (WoT). WoT evolves the IoT with a common stack based on web services. But, even when a homogeneous access is reached through web protocols, a common understanding is not yet acquired. For this purpose, the Semantic Web of Things (SWoT) is proposed for the integration of the semantic web on the WoT. This work analyses the SWoT, presenting its different levels to offer an IoT convergence. Specifically, we analyse the trends for capillary networks and for cellular networks with standards such as IPSO, ZigBee, OMA, and the oneM2M initiative. This work also analyses the impact of the semantic-annotations/metadata in the performance of the resources.

Antonio J. Jara; Alex C. Olivieri; Yann Bocchi; Markus Jung; Wolfgang Kastner; Antonio F. Skarmeta

2014-01-01T23:59:59.000Z

312

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities Two vulnerabilities were reported in Apache Tomcat November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands A vulnerability was reported in Cisco Prime Data Center Network Manager. October 31, 2012

313

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS November 7, 2012 V-018: Adobe Flash Player Buffer Overflows and Memory Corruption Errors Let Remote Users Execute Arbitrary Code Several vulnerabilities were reported in Adobe Flash Player. November 5, 2012 V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System Two vulnerabilities were reported in HP Performance Insight. November 2, 2012 V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information Three vulnerabilities were reported in Apple iOS. November 1, 2012 V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let

314

Autonomous Fruit Picking Machine: A Robotic Apple Harvester  

E-Print Network (OSTI)

Autonomous Fruit Picking Machine: A Robotic Apple Harvester Johan Baeten1 , Kevin Donn´e2 , Sven the construction and functionality of an Au- tonomous Fruit Picking Machine (AFPM) for robotic apple harvesting with a camera mounted inside. The proposed concepts guarantee adequate control of the autonomous fruit

Paris-Sud XI, Université de

315

NERSC and HDF Group Optimize HDF5 Library to Improve I/O Performance  

NLE Websites -- All DOE Office Websites (Extended Search)

and HDF Group and HDF Group Optimize HDF5 Library to Improve I/O Performance NERSC and HDF Group Optimize HDF5 Library to Improve I/O Performance June 28, 2010 A common complaint among air travelers on short trips is that the time it takes to get in and out of the airplane and airports can be as long as the flight itself. In computer terms, that's a classic input/output (I/O) problem. Supercomputer users sometimes face a similar problem: the computer tears through the calculations with amazing speed, but the time it takes to write the resulting data to disk ends up slowing down the whole job. There are several layers of software that deal with I/O on high performance computing (HPC) systems. The filesystem software, such as Lustre or GPFS, is closest to the hardware and deals with the physical access and storage

316

Reliable low latency I/O in torus-based interconnection networks  

E-Print Network (OSTI)

In today's high performance computing environment I/O remains the main bottleneck in achieving the optimal performance expected of the ever improving processor and memory technologies. Interconnection networks therefore combines processing units...

Azeez, Babatunde

2007-04-25T23:59:59.000Z

317

Efficient I/O and storage of adaptive-resolution data  

Science Journals Connector (OSTI)

We present an efficient, flexible, adaptive-resolution I/O framework that is suitable for both uniform and Adaptive Mesh Refinement (AMR) simulations. In an AMR setting, current solutions typically represent each resolution level as an independent grid ...

Sidharth Kumar; John Edwards; Peer-Timo Bremer; Aaron Knoll; Cameron Christensen; Venkatram Vishwanath; Philip Carns; John A. Schmidt; Valerio Pascucci

2014-11-01T23:59:59.000Z

318

Towards I/O analysis of HPC systems and a generic architecture to collect access patterns  

Science Journals Connector (OSTI)

In high-performance computing applications, a high-level I/O call will trigger activities on a multitude of hardware components. These are massively parallel systems supported by huge storage systems and inter...

Marc C. Wiedemann; Julian M. Kunkel…

2013-05-01T23:59:59.000Z

319

Abstract: Memory-Conscious Collective I/O for Extreme-Scale HPC Systems  

Science Journals Connector (OSTI)

The continuing decrease in memory capacity per core and the increasing disparity between core count and off-chip memory bandwidth create significant challenges for I/O operations in exascale systems. The exascale challenges require rethinking collective ...

Yin Lu; Yong Chen; Rajeev Thakur; Yu Zhuang

2012-11-01T23:59:59.000Z

320

Who Captures Value in a Global Innovation System? The case of Apple's iPod  

E-Print Network (OSTI)

Portelligent Inc. (2006). Apple iPod Video, 30GB MultimediaSystem? The case of Apple's iPod Greg Linden, Kenneth L.to look at one member of Apple’s iPod family, part of a

Linden, Greg; Kraemer, Kenneth L; Dedrick, Jason

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D. Combs  

E-Print Network (OSTI)

Evaluation of Pest Management Tactics for Organic Apple Production A. Agnello, H. Reissig, and D number of both native and introduced insect and mite species attack apples grown in commercial apple orchards. Control of this pest complex is particularly challenging, because unlike the more arid apple

Agnello, Arthur M.

322

7.5 Declaration in Apple vs. Microsoft/HewlettPackard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett­Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Golbeck, Jennifer

323

Apple Defect Detection and Quality Classification with MLP-Neural Networks  

E-Print Network (OSTI)

Apple Defect Detection and Quality Classification with MLP-Neural Networks Devrim UNAY, Bernard' apples is shown. Color, texture and wavelet features are extracted from the apple images. Principal-classifications. The European Union defines three quality classes ("extra", "I", and "II") for the fresh apples

Dupont, Stéphane

324

7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Shneiderman, Ben

325

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

326

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

327

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

328

Layout-Aware I/O Scheduling for Terabits Data Movement  

SciTech Connect

Many science facilities, such as the Department of Energy s Leadership Computing Facilities and experimental facilities including the Spallation Neutron Source, Stanford Linear Accelerator Center, and Advanced Photon Source, produce massive amounts of experimental and simulation data. These data are often shared among the facilities and with collaborating institutions. Moving large datasets over the wide- area network (WAN) is a major problem inhibiting collaboration. Next- generation, terabit-networks will help alleviate the problem, however, the parallel storage systems on the end-system hosts at these institutions can become a bottleneck for terabit data movement. The parallel storage system (PFS) is shared by simulation systems, experimental systems, analysis and visualization clusters, in addition to wide-area data movers. These competing uses often induce temporary, but significant, I/O load imbalances on the storage system, which impact the performance of all the users. The problem is a serious concern because some resources are more expensive (e.g. super computers) or have time-critical deadlines (e.g. experimental data from a light source), but parallel file systems handle all requests fairly even if some storage servers are under heavy load. This paper investigates the problem of competing workloads accessing the parallel file system and how the performance of wide-area data movement can be improved in these environments. First, we study the I/O load imbalance problems using actual I/O performance data collected from the Spider storage system at the Oak Ridge Leadership Computing Facility. Second, we present I/O optimization solutions with layout-awareness on end-system hosts for bulk data movement. With our evaluation, we show that our I/O optimization techniques can avoid the I/O congested disk groups, improving storage I/O times on parallel storage systems for terabit data movement.

Kim, Youngjae [ORNL] [ORNL; Atchley, Scott [ORNL] [ORNL; Vallee, Geoffroy R [ORNL] [ORNL; Shipman, Galen M [ORNL] [ORNL

2013-01-01T23:59:59.000Z

329

Photoelectron Spectroscopy and Theoretical Study of M(IO3)2– (M = H, Li, Na, K): Structural Evolution, Optical Isomers and Hyperhalogen Behavior  

SciTech Connect

H(IO3)2- and M(IO3)2- (M = Li, Na, K) anions were successfully produced via electrospray ionization of their corresponding bulk salt solutions, and were characterized by combining negative ion photoelectron spectroscopy and quantum chemical calculations. The photoelectron spectra reveal that all these M(IO3)2- species possess very high vertical detachment energies (VDEs), to be 6.25, 6.57, 6.60 and 6.51 eV for H(IO3)2-, Li(IO3)2-, Na(IO3)2- and K(IO3)2-, respectively, which are much higher than that of IO3- (4.77 eV). The theoretical calculations show that each of these anions has two energetically degenerated optical isomers. It is found that the structure of H(IO3)2- can be written as IO3-(HIO3), in which the H atom is tightly bound to one of the IO3- groups and forms an iodic acid (HIO3) molecule; while the structures of M(IO3)2- can be written as (IO3-)M+(IO3-), in which the alkali metal atoms interact with the two IO3- groups almost equally and bridge the two IO3- groups via two O atoms of each IO3- with the two MOOI planes nearly perpendicular to each other. In addition, the high VDEs of M(IO3)2- (M = Li, Na, K) can be explained by the hyperhalogen behavior of their neutral counterparts.

Hou, Gao-Lei; Wu, Miao Miao; Wen, Hui; Sun, Qiang N.; Wang, Xue B.; Zheng, Weijun

2013-07-31T23:59:59.000Z

330

BASIN BLAN CO BLAN CO S OT ERO IGNAC IO-BLANCO AZ TEC BALLAR  

U.S. Energy Information Administration (EIA) Indexed Site

BOE Reserve Class BOE Reserve Class No 2001 reserves 0.1 - 10 MBOE 10.1 - 100 MBOE 100.1 - 1,000 MBOE 1,000.1- 10,000 MBOE 10,000.1 - 100,000 MBOE > 100,000 MBOE Basin Outline AZ UT NM CO 1 2 Index Map for 2 Paradox-San Juan Panels 2001 Reserve Summary for All Paradox-San Juan Basin Fields Total Total Total Number Liquid Gas BOE of Reserves Reserves Reserves Fields (Mbbl) (MMcf) (Mbbl) Paradox-San Juan 250 174,193 20,653,622 3,616,464 Basin CO NM IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO BASIN BASIN BLAN CO BLAN CO BASIN BASIN BASIN BASIN BASIN BASIN BISTI BAL LAR D BASIN BISTI BLA NCO S OT ERO BAL LAR D LIND RITH W BASIN BLA NCO BLA NCO S BLA NCO S TAPAC ITO GAVIL AN BASIN BLA NCO The mapped oil and gas field boundary outlines were created by the Reserves and Production Division, Office of Oil and Gas, Energy Information Administration pursuant to studies required by

331

BASIN BLAN CO BLAN CO S OT ERO IGNAC IO-BLANCO AZ TEC BALLAR  

U.S. Energy Information Administration (EIA) Indexed Site

Gas Reserve Class Gas Reserve Class No 2001 gas reserves 0.1 - 10 MMCF 10.1 - 100 MMCF 100.1 - 1,000 MMCF 1,000.1- 10,000 MMCF 10,000.1 - 100,000 MMCF > 100,000 MMCF Basin Outline AZ UT NM CO 1 2 Index Map for 2 Paradox-San Juan Panels 2001 Reserve Summary for All Paradox-San Juan Basin Fields Total Total Total Number Liquid Gas BOE of Reserves Reserves Reserves Fields (Mbbl) (MMcf) (Mbbl) Paradox-San Juan 250 174,193 20,653,622 3,616,464 Basin CO NM IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO BASIN BASIN BLAN CO BLAN CO BASIN BASIN BASIN BASIN BASIN BASIN BISTI BAL LAR D BASIN BISTI BLA NCO S OT ERO BAL LAR D LIND RITH W BASIN BLA NCO BLA NCO S BLA NCO S TAPAC ITO GAVIL AN BASIN BLA NCO The mapped oil and gas field boundary outlines were created by the Reserves and Production Division, Office of Oil and Gas, Energy Information Administration pursuant to studies required by

332

BASIN BLAN CO BLAN CO S OT ERO IGNAC IO-BLANCO AZ TEC BALLAR  

U.S. Energy Information Administration (EIA) Indexed Site

Liquids Reserve Class Liquids Reserve Class No 2001 liquids reserves 0.1 - 10 Mbbl 10.1 - 100 Mbbl 100.1 - 1,000 Mbbl 1,000.1- 10,000 Mbbl 10,000.1 - 100,000 Mbbl Basin Outline AZ UT NM CO 1 2 Index Map for 2 Paradox-San Juan Panels 2001 Reserve Summary for All Paradox-San Juan Basin Fields Total Total Total Number Liquid Gas BOE of Reserves Reserves Reserves Fields (Mbbl) (MMcf) (Mbbl) Paradox-San Juan 250 174,193 20,653,622 3,616,464 Basin CO NM IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO IGNAC IO-BLANCO BASIN BASIN BLAN CO BLAN CO BASIN BASIN BASIN BASIN BASIN BASIN BISTI BAL LAR D BASIN BISTI BLA NCO S OT ERO BAL LAR D LIND RITH W BASIN BLA NCO BLA NCO S BLA NCO S TAPAC ITO GAVIL AN BASIN BLA NCO The mapped oil and gas field boundary outlines were created by the Reserves and Production Division, Office of Oil and Gas, Energy Information Administration pursuant to studies required by

333

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2014 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish. This moderate to heavy crop will mature close predicted dates. Blocks with light croploads will mature 3 or 4

334

Property:Incentive/ApplDsc | Open Energy Information  

Open Energy Info (EERE)

ApplDsc ApplDsc Jump to: navigation, search Property Name Incentive/ApplDsc Property Type String Description Applicable Sector. Pages using the property "Incentive/ApplDsc" Showing 25 pages using this property. (previous 25) (next 25) 2 2003 Climate Change Fuel Cell Buy-Down Program (Federal) + Commercial +, Nonprofit +, Schools +, ... 3 30% Business Tax Credit for Solar (Vermont) + Commercial +, Industrial + 4 401 Certification (Vermont) + Utility +, Industrial + A AEP (Central and North) - CitySmart Program (Texas) + Commercial +, Industrial +, Institutional +, ... AEP (Central and North) - Residential Energy Efficiency Programs (Texas) + Construction +, Installer/Contractor +, Multi-Family Residential + AEP (Central and SWEPCO) - Coolsaver A/C Tune Up (Texas) + Commercial +, Installer/Contractor +, Residential +

335

Increase in IO Bandwidth to Enhance Future Understanding of Climate Change  

NLE Websites -- All DOE Office Websites (Extended Search)

Increase in IO Increase in IO Bandwidth to Enhance Future Understanding of Climate Change Increase in IO Bandwidth to Enhance Future Understanding of Climate Change August 6, 2009 vorticity+context_2.jpg The large data set sizes generated by the GCRM require new analysis and visualization capabilities with parallel processing and rendering capabilities. This 3d plot of the vorticity isosurfaces was developed using the VisIt visualization tool, a general purpose 3D visualization tool with a parallel distributed architecture, which is being extended to support the geodesic grid used by the GCRM. This work was performed in collaboration with Prabhat at NERSC. Results: Researchers at Pacific Northwest National Laboratory (PNNL)-in collaboration with the National Energy Research Scientific Computing Center

336

The parallel I/O architecture of the High Performance Storage System (HPSS)  

SciTech Connect

Rapid improvements in computational science, processing capability, main memory sizes, data collection devices, multimedia capabilities and integration of enterprise data are producing very large datasets (10s-100s of gigabytes to terabytes). This rapid growth of data has resulted in a serious imbalance in I/O and storage system performance and functionality. One promising approach to restoring balanced I/O and storage system performance is use of parallel data transfer techniques for client access to storage, device-to-device transfers, and remote file transfers. This paper describes the parallel I/O architecture and mechanisms, Parallel Transport Protocol, parallel FIP, and parallel client Application Programming Interface (API) used by the High Performance Storage System (HPSS). Parallel storage integration issues with a local parallel file system are also discussed.

Watson, R.W. [Lawrence Livermore National Lab., CA (United States); Coyne, R.A. [IBM Federal Systems Co., Houston, TX (United States)

1995-02-01T23:59:59.000Z

337

Specific heat of apple at different moisture contents and temperatures  

E-Print Network (OSTI)

This work discusses results of experimental investigations of the specific heat, $C$, of apple in a wide interval of moisture contents ($W=0-0.9$) and temperatures ($T = 283-363$ K). The obtained data reveal the important role of the bound water in determination of $C(W,T)$ behaviour. The additive model for description of $C(W)$ dependence in the moisture range of $0.1apple was considered as a mixture of water and hydrated apple material (water plasticised apple) with specific heat $C_h$. The difference between $C_h$ and specific heat of dry apple, $\\Delta Cb=C_h-C_d$, was proposed as a measure of the excess contribution of bound water to the specific heat. The estimated amounts of bound water $W_b$ were comparable with the monolayer moisture content in apple. The analytical equation was proposed for approximation of $C(W,T)$ dependencies in the studied intervals of moisture content and temperature.

Viacheslav Mykhailyk; Nikolai Lebovka

2013-05-11T23:59:59.000Z

338

H5hut: A High-Performance I/O Library for Particle-based Simulations  

SciTech Connect

Particle-based simulations running on large high-performance computing systems over many time steps can generate an enormous amount of particle- and field-based data for post-processing and analysis. Achieving high-performance I/O for this data, effectively managing it on disk, and interfacing it with analysis and visualization tools can be challenging, especially for domain scientists who do not have I/O and data management expertise. We present the H5hut library, an implementation of several data models for particle-based simulations that encapsulates the complexity of HDF5 and is simple to use, yet does not compromise performance.

Howison, Mark; Adelmann, Andreas; Bethel, E. Wes; Gsell, Achim; Oswald, Benedikt; Prabhat,

2010-09-24T23:59:59.000Z

339

Dietary supplementation with apple juice concentrate alleviates the compensatory increase in glutathione synthase transcription and activity that  

E-Print Network (OSTI)

Dietary supplementation with apple juice concentrate alleviates the compensatory increase that apple juice concentrate (AJC) prevents the increase in oxidative damage to brain tissue and decline

Graves, Michael V.

340

FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing , Song Jiang2  

E-Print Network (OSTI)

FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing Feng Chen1 , Song Jiang, energy consumption caused by I/O operations becomes increasingly large. In a per- vasive computing be adaptively selected to achieve maximum energy reduction. To this end, we propose a profile-based I

Jiang, Song

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apple Remote Desktop Encryption Failure Lets Remote Users 0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information August 21, 2012 - 7:00am Addthis PROBLEM: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Apple Remote Desktop after 3.5.1 and prior to 3.6.1 ABSTRACT: A remote user can monitor potentially sensitive information. reference LINKS: Apple.com Apple Article: HT5433 SecurityTracker Alert ID: 1027420 CVE-2012-0681 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apple Remote Desktop. When a user connects to a third-party VNC server with the 'Encrypt all network data' setting enabled, network data is not encrypted. A remote user monitoring the

342

E-Print Network 3.0 - apple juice turbidity Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

343

E-Print Network 3.0 - apple juice clarification Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

70 1 Slice Cornbread 165 12 oz Apple Juice 167 THURSDAY: Total Calorie Count 1446... Ranch Dressing 70 1 Apple 81 1 Chocolate Chip Cookie 200 12 oz Diet Soda 0 MONDAY: Total...

344

Pure appl. geophys. 157 (2000) 11351143 00334553/00/08113519 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1135­1143 0033­4553/00/081135­19 $ 1.50+0.20/0 Tsunamis Generated, Petropavlovsk-Kamchatsky 683006, Russia. #12;Alexander Belousov et al.1136 Pure appl. geophys., expand

Belousov, Alexander

345

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20,...

346

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

347

Pure appl. geophys. 157 (2000) 21492164 00334553/00/12214916 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 2149­2164 0033­4553/00/122149­16 $ 1.50+0.20/0 The Edges of Large. Shaw2150 Pure appl. geophys., died out produce large stress concentrations, which then tend

Shaw, Bruce E.

348

Pure appl. geophys. 154 (1999) 405407 00334553/99/04040503 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 154 (1999) 405­407 0033­4553/99/040405­03 $ 1.50+0.20/0 Introduction of the asthenosphere? #12;Introduction406 Pure appl. geophys., What can we learn from current GPS measurements

Dmowska, Renata

349

Pure appl. geophys. 151 (1998) 443462 00334553/98/04044320 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 151 (1998) 443­462 0033­4553/98/040443­20 $ 1.50+0.20/0 Anisotropy appl. geophys., degassing primitive mantle (HEARN et al., 1990); and 5) a parabolic-shaped region

Humphreys, Eugene

350

An Energy-Oriented Evaluation of Buffer Cache Algorithms Using Parallel I/O Workloads  

E-Print Network (OSTI)

utilize these energy-aware devices. As we explore different management schemes under five real-world--Memory energy consumption, cache replacement algorithms, parallel I/O, cluster storage. Ã? 1 INTRODUCTION of power consumption. The energy breakdown measured on a real server shows that the memory energy

Zhu, Yifeng

351

LARGE SCALE CHANGES IN THE HIGHLY ENERGETIC CHARGED PARTICLES IN THE REGION OF THE IO TORUS  

E-Print Network (OSTI)

that they are caused by energetic trapped particles. On the C22 pass through the torus region the count rates were pass, the background count rate was low until inside the orbit of Io with a dip in the count rate 1 Institute of Geophysics and Planetary Physics, University of California Los Angeles, CA 90095

Russell, Christopher T.

352

Status and trends of mobile-health applications for iOS devices: A developer's perspective  

Science Journals Connector (OSTI)

Modern smart mobile devices offer media-rich and context-aware features that are highly useful for electronic-health (e-health) applications. It is therefore not surprising that these devices have gained acceptance as target devices for e-health applications, ... Keywords: Mobile development platforms, iOS, m-Health applications

Chang Liu; Qing Zhu; Kenneth A. Holroyd; Elizabeth K. Seng

2011-11-01T23:59:59.000Z

353

Synthesizing Representative I/O Workloads Using Iterative Distillation Zachary Kurmas  

E-Print Network (OSTI)

Synthesizing Representative I/O Workloads Using Iterative Distillation Zachary Kurmas College proper- ties are "key" for a given workload and storage system. We have developed a tool, the Distiller, that automati- cally identifies the key properties ("attribute-values") of the workload. The Distiller then uses

Kurmas, Zachary

354

Security Issues and Challenges for the IoT-based Smart Grid  

Science Journals Connector (OSTI)

Abstract Internet of Things (IoT) is the next step evolution of our today Internet, where any physical object/thing having/equipped with computation and communication capabilities could be seamlessly integrated, at different levels, to the Internet. The Smart Grid (SG), which is considered as one of the most critical Infrastructures, is defined as the classical power grid augmented with a large-scale ICT and renewable energy integration, can be seen as one of the largest IoT network. The SG will involve billions of smart objects/things: smart meters, smart appliances, sensors, actuators-cars, etc. in addition to several communication infrastructures whether public (most often) or private. However, security is seen as one of the major factors hampering the rapid and large scale adoption and deployment of both the IoT vision and the Smart Grid. In this paper we investigate the security issues and challenges on the IoT-based SG, and define the major security services that we should consider when dealing with SG security

Chakib Bekara

2014-01-01T23:59:59.000Z

355

Using IOR to Analyze the I/O performance for HPC Platforms Hongzhang Shan1  

E-Print Network (OSTI)

Energy Research Scientific Computing Center (NERSC)2 Future Technology Group, Computational Research (ERCAP), 50 I/O intensive projects were selected from field over 300 allocation requests for the NERSC/O intensive applications to assess its fidelity in reproducing their performance characteristics. 1

356

Detecting API Usage Obstacles: A Study of iOS and Android Developer Questions  

E-Print Network (OSTI)

Detecting API Usage Obstacles: A Study of iOS and Android Developer Questions Wei Wang and Michael that can be later customized for a specific task. When developers invoke API methods in a framework, they often encounter obstacles in finding the correct usage of the API, let alone to employ best practices

Godfrey, Michael W.

357

A case study in application I/O on Linux clusters  

Science Journals Connector (OSTI)

A critical but often ignored component of system performance is the I/O system. Today's applications demand a great deal from underlying storage systems and software, and both high-performance distributed storage and high level interfaces have been developed ...

Robert Ross; Daniel Nurmi; Albert Cheng; Michael Zingale

2001-11-01T23:59:59.000Z

358

The Lax Braided Structure of Streaming I/O Alan Jeffrey1  

E-Print Network (OSTI)

/O model. Unfortunately, lazy I/O does not respect Agda's semantics. Consider: hello1 [] = putStr "Hello" hello2 xs = putStr "Hello" hello1 (x : xs) = putStr "Hello" Agda includes a mechanized proof assistant, in which it is routine to prove that hello1 and hello2 are extensionally equivalent. Unfortunately

Jeffrey, Alan

359

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple Mac) February 2010 Page 1 of 5 Connecting to Poly-WiFi (on Apple to Poly-WiFi (on Apple Mac) February 2010 Page 2 of 5 2) Before you can access the Network setting screen-WiFi (on Apple Mac) February 2010 Page 3 of 5 4) From the network name dropdown, select "Poly-WiFi". 5

Aronov, Boris

360

Apples and Other Fruits of the Rose Family  

NLE Websites -- All DOE Office Websites (Extended Search)

Apples and Other Fruits of the Rose Family Apples and Other Fruits of the Rose Family Nature Bulletin No. 277-A October 7, 1967 Forest Preserve District of Cook County Richard B. Ogilvie, President Roland F. Eisenbeis, Supt. of Conservation APPLES AND OTHER FRUITS OF THE ROSE FAMILY Bread, meat and potatoes, with vegetables and green salads, may satisfy the inner man and keep us healthy but much of the fun of eating is provided by the rose family. The rose, itself, is the flower of chivalry and love but its relative, the apple, king of the fruits, has been cultivated since prehistoric times. The members of the Rose Family give us more pleasure than we get from any other group of plants. Apples, quinces, pears, peaches, plums, apricots, cherries, blackberries, raspberries and strawberries -- whether wild or cultivated -- are all relatives of the roses. Their fruits, raw or cooked, give us desserts, pleasant drinks, and many a between-meal delicacy. Typically, they have showy flowers with five equal petals arranged around a central cup bearing one or more fruit-forming pistils and a large number of pollen-bearing stamens. Their leaves are placed alternately on the twigs or stalks -- some of them simple leaves; some of them compound leaves divided into three, five or more leaflets like the rose itself. Some are trees, some are shrubs, and some are vining herbs.

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report 2007  

E-Print Network (OSTI)

Optimization of a Fixed Spraying System for Commercial High-Density Apple Plantings Final Report and fruit coverage issues are a research priority in tree fruits and apples in particular. Preliminary Work. Preliminary trials were conducted in two blocks each of Red Delicious and Empire apples on M.9 dwarfing stock

Agnello, Arthur M.

362

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014  

E-Print Network (OSTI)

http://agbioresearch.msu.edu/centers/nwmihort/ MSU Fruit Team Apple Maturity Report 2014 Northwest Gingergold harvest continues, and many growers are waiting on McIntosh harvest to begin. Apples are coloring nicely with the cool temperatures. Cool temperatures have hit the northwest region, and apple maturity

363

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 3 September 18, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the third week of 2013 apple maturity testing at NWMHRC. General Comments - The NWMHRC will be testing apples for maturity for 2013

364

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE Devrim Unay, and Bernard Gosselin  

E-Print Network (OSTI)

THRESHOLDING-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay, and Bernard.tcts.fpms.ac.be ABSTRACT In this paper, a computer vision based system is introduced to automatically grade apple fruits outperformed others with 89 % recognition. 1. INTRODUCTION Computer vision based quality sorting of apple

Dupont, Stéphane

365

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M. LEEMIS  

E-Print Network (OSTI)

APPL: A Probability Programming Language Maj. Andrew G. GLEN, Diane L. EVANS, and Lawrence M having arbitrary distributions. This arti- cle presents a prototype probability package named APPL (A probability software package, referred to as "A Prob- ability Programming Language" (APPL), that fills

Leemis, Larry

366

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2014 Northwest Region, Report Number 4: October 1, 2014 Emily Pochubay and Nikki Rothwell, Extension Fruit Educators Apples are maturing slowly, growers are spot picking-pruned orchards has excellent color. Size in most varieties is also very good; some Honeycrisp apples that had

367

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot in China  

E-Print Network (OSTI)

Multiple locus genealogies and phenotypic characters reappraise the causal agents of apple ring rot & Guangyu Sun Received: 6 March 2014 /Accepted: 2 September 2014 # School of Science 2014 Abstract Apple ring rot inflicts severe economic losses in the main apple producing areas of East Asia. The causal

Biggs, Alan R.

368

Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2  

E-Print Network (OSTI)

1 Apple detection in natural tree canopies from multimodal images J. P. Wachs1,2 , H. I. Stern2 , T apples within a tree canopy using infra-red and color images in order to achieve automated harvesting. Infra-red provides clues regarding the physical structure and location of the apples based

Wachs, Juan

369

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team,  

E-Print Network (OSTI)

Apple Tree, NH Big Tree for May By Anne Krantz, NH Big Tree Team, UNH Cooperative Extension The explosion of apple blossoms in May transforms the most gnarled old tree into a delicate cloud of beauty (1817-1862) in his essay "The Wild Apple Tree," described the blossoms perfectly: `The flowers

New Hampshire, University of

370

Comparing Apples and Oranges Through Partial Orders: An Empirical Peter Kingston and Magnus Egerstedt  

E-Print Network (OSTI)

Comparing Apples and Oranges Through Partial Orders: An Empirical Approach Peter Kingston the comparison of apples and oranges is presented to highlight the operation of the proposed approach. I. INTRODUCTION As the saying goes, one can not compare apples and oranges. But why not? It is clear that some

Egerstedt, Magnus

371

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION  

E-Print Network (OSTI)

ARTIFICIAL NEURAL NETWORK-BASED SEGMENTATION AND APPLE GRADING BY MACHINE VISION Devrim Unay In this paper, a computer vision based system is introduced to automatically sort apple fruits. An artificial. INTRODUCTION Computer vision based quality sorting of apple fruits is nec- essary for increasing the speed

Dupont, Stéphane

372

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models  

E-Print Network (OSTI)

Simulation of Apple Tree Development Using Mixed Statistical and Biomechanical Models Colin Smith1 that characterises the architecture of an apple tree over time. As indicated previously [9, 3, 4], the simulation dynamics in a developmental context, we have created an L-system simulation of a developing apple tree

Paris-Sud XI, Université de

373

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999  

E-Print Network (OSTI)

Li2O Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-1 CHAPTER 9: Li2O PARTICULATE FLOW CONCEPT ­ APPLE DESIGN Contributors Lead Author: Dai Kai Sze Dai Kai Sze, Zhanhe Wang (ANL Particulate Flow Concept, APPLE APEX Interim Report November, 1999 9-2 9. LI2O PARTICULATE FLOW CONCEPT

California at Los Angeles, University of

374

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 6: October 9, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the sixth week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

375

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING  

E-Print Network (OSTI)

WHOLE-FARM APPLE ARTHROPOD MANAGEMENT USING REDUCED-RISK TACTICS AND IPM SAMPLING AND MONITORING management programs in apples, using provisional action thresholds for specific major pests based on previous-farm approaches for managing the arthropod pests of apple orchards that rely on RR and OP-replacement insecticides

Agnello, Arthur M.

376

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 1 September 4, 2013 General Comments - The NWMHRC will be testing apples for maturity for 2013, and results will be sent via fax and email to past apple maturity list subscribers. Results will also be available at: http

377

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death  

E-Print Network (OSTI)

Steve Jobs' creations simplified life, Apple enthusiasts say in mourning his death By ADAM PLAYFORD as soon as they got confirmation." Word of the Apple co-founder's death of pancreatic cancer hit hard live without a computer," said Joerg von Veltar, the founder of the Palm Beach Phoenix Apple User Group

Belogay, Eugene A.

378

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders  

E-Print Network (OSTI)

Title: Use of Physical Barriers to Prevent Borer Infestation of Apple Burrknots Project Leaders of burrknot tissue on apple dwarfing rootstocks is an increasing problem throughout the northeast. One into the winter. We also discuss economic considerations. Background and Justification: Apple growers

Agnello, Arthur M.

379

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse  

E-Print Network (OSTI)

Syracuse University Apple Festival The Department of Recreation Services will conduct the Syracuse University Apple Festival on Friday, September 6 from 11:00am- 2:00pm on the Quad. The event will include can reserve a table by completing the Apple Festival Table Registration below. This is a great

Raina, Ramesh

380

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013  

E-Print Network (OSTI)

MSU Fruit Team Apple Maturity Report 2013 Northwest Region, Report Number 7: October 16, 2013 Nikki Rothwell and Emily Pochubay, Extension Fruit Educators This is the seventh week of 2013 apple maturity testing at NWMHRC. Results will be sent via fax and email to past apple maturity list subscribers. Results

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White  

E-Print Network (OSTI)

THE APPLE GAME AND THE PRESSING-DOWN LEMMA Brian White Math 161 Lecture Notes (Winter 2005) Recall, but for every apple game is played in a series of stages, one for each element of 1. At stage 0, you are given a countable collection of apples. At each stage n 1 with n > 0: (1) If you have

White, Brian

382

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple Trees  

E-Print Network (OSTI)

Integrating Markov Chain Models and L-systems to Simulate the Architectural Development of Apple the architectural development of apple trees is presented. The approach is based on using an L-systems framework. Results show that these models are able to represent the branching zones observed in apple trees at node

Paris-Sud XI, Université de

383

Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images  

E-Print Network (OSTI)

1 Low and High-Level Visual Feature Based Apple Detection from Multi-modal Images J. P. Wachs1 , H discusses the development of a machine vision system, capable of recognizing occluded green apples within a tree canopy. This involves the detection of "green" apples within scenes of "green leaves", shadow

Wachs, Juan

384

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY  

E-Print Network (OSTI)

Borer problems and their control in dwarf apple trees David Kain, Entomology, NYSAES, Geneva, NY in western New York, were invading burrknots on dwarf apple trees. About the same time, Dick Straub seemed to be becoming more common in dwarf apple plantings, as well. Based on Deb's alert, we decided

Agnello, Arthur M.

385

V-137: Apple Mac OS X update for Java | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apple Mac OS X update for Java V-137: Apple Mac OS X update for Java April 18, 2013 - 6:00am Addthis PROBLEM: Apple Mac OS X update for Java PLATFORM: Mac OS X 10.6, OS X Lion...

386

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

387

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

388

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

389

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

390

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

391

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

392

AMR Power Private Ltd APPL | Open Energy Information  

Open Energy Info (EERE)

AMR Power Private Ltd APPL AMR Power Private Ltd APPL Jump to: navigation, search Name AMR Power Private Ltd. (APPL) Place Hyderabad, Andhra Pradesh, India Zip 560 034 Sector Hydro Product Hyderabad-based small hydro project developer. Coordinates 17.6726°, 77.5971° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":17.6726,"lon":77.5971,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

393

U-022: Apple QuickTime Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Vulnerabilities 2: Apple QuickTime Multiple Vulnerabilities U-022: Apple QuickTime Multiple Vulnerabilities October 28, 2011 - 8:15am Addthis PROBLEM: Apple QuickTime Multiple Vulnerabilities. PLATFORM: Apple QuickTime prior to 7.7.1 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: Apple Product Security Article: HT5016 Secunia Advisory SA46618 SecurityTracker Alert ID: 1026251 CVE-2011-3218, CVE-2011-3219, CVE-2011-3220 CVE-2011-3221, CVE-2011-3222, CVE-2011-3223 CVE-2011-3228, CVE-2011-3247, CVE-2011-3248 CVE-2011-3249, CVE-2011-3250, CVE-2011-3251 IMPACT ASSESSMENT: High Discussion: Multiple vulnerabilities have been reported in Apple Quicktime, which can be exploited by malicious people to compromise a user's system.

394

V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20: Apple QuickTime Multiple Flaws Let Remote Users Execute 20: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Versions prior to QuickTime 7.7.3 are vulnerable on Windows 7, Vista and XP. ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. REFERENCE LINKS: Apple Security Article: HT5581 SecurityTracker Alert ID: 1027737 Bugtraq ID: 56438 Secunia Advisory SA51226 CVE-2011-1374 CVE-2012-3751 CVE-2012-3752 CVE-2012-3753 CVE-2012-3754 CVE-2012-3755 CVE-2012-3756 CVE-2012-3757 CVE-2012-3758 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can

395

Abstract 4483: IO125, a novel Pt-based supramolecular therapeutic exhibits increased anti-cancer efficacy compared with oxaliplatin  

Science Journals Connector (OSTI)

...novel supramolecular chemistry-based platform technology to engineer more potent oxaliplatin analogues. In IO125, a unique platinum...backbone via a monocarboxylato bond and an NPt coordination environment, releasing diaminocyclohexane (DACH)-platinum in a sustained...

Monideepa Roy; Sk Samad Hossain; Arindam Sarkar; Aniruddha Sengupta; Nimish Gupta; Sajid Hussain; Aasif Ansari; Sanghamitra Mylavarapu; and Shiladitya Sengupta

2014-10-01T23:59:59.000Z

396

ORI. RAD-1 IO IWX' ARTYENT OF HEALTX AIVD REKABILtTATIVt SERVICPS  

Office of Legacy Management (LM)

ORI. RAD-1 IO ORI. RAD-1 IO , IWX' ARTYENT OF HEALTX AIVD REKABILtTATIVt SERVICPS IHVIRION OF HEALTR ?wt ow** m.. mo JDebnr.llh. Pwwu* a- , Pagi 1 of 2' Pa& RADIOACTIVE MATERIALS LlCENiEH** 396-2, MSUMmT IED. 4 k8o Pursuant to Chapter 290, Florida' Statutes, and Chapter IqD-56, Florida Administrative Code, Control of Radiation Hazards, an in reliance on statements and representations heretofore made by the licensee designated below, a license is hereby issued authorizin :uch licensee to transfer, receive, possess and use the radioactive material(s) designated below and to use such radioactive material (S for the purpose(s) and at the place(s) designated below. This license is aubjcct to all applicable rules, regulations and orders of tl state of Florida, Department of health and Rchabilitetive Servicrc now or hereafter in effect and to any conditions specified belo)

397

AUTI.-IoR(s,: S. A. Colgate, Jean Audouze, and William A. Fowler  

NLE Websites -- All DOE Office Websites (Extended Search)

AUTI.-IoR(s,: S. A. Colgate, Jean Audouze, and AUTI.-IoR(s,: S. A. Colgate, Jean Audouze, and William A. Fowler SUBMITTED TO: 15th International C o s m i c Ray Conference P l o v d i v , Bulgaria - August 13-26, 1977 \ . NOTICE lhis report WPE prepared as an ac=xmnt of work sponsored by the United Stater Government. Neither the United States nor the United Stater Energy Rcwvch and Cevelopment Administration, nor any of their employees, nor any of their contractors, rubmntracton o r thdr employees, makes any wmanty. ex;res or implied, o r asurns any legal liability or responsibility for the accuracy, eompletcneJs or usefulnea of any information, apparatus, product 01 process disclosed, or repreants that its use would not infringe privately owned rights. _ _ e By acceptance of this article for publication. the

398

Investigation and design of a network, I/O and storage SDC susceptibility analzer  

SciTech Connect

This slide deck is intended for the Durmstrang Team Quarterly Review to be held January 25, 2011 in Baltimore, MD. The slides provide an overview of the Investigation and Design of a Network, I/O and Storage SDC Susceptibility Analyzer project. In addition, the slides provide the goals of the project, details of the work done to date and the project status and future work.

Dubois, Andrew [Los Alamos National Laboratory; Dubois, David [Los Alamos National Laboratory; Michalak, Sarah [Los Alamos National Laboratory

2011-01-19T23:59:59.000Z

399

Preemptible I/O Scheduling of Garbage Collection for Solid State Drives  

SciTech Connect

Abstract Unlike hard disks, flash devices use out-of-update operations and they require a garbage collection (GC) process to reclaim invalid pages to create free blocks. This GC process is a major cause of performance degradation when running concurrently with other I/O operations as internal bandwidth is consumed to reclaim these invalid pages. The invocation of the GC process is generally governed by a low watermark on free blocks and other internal device metrics that different workloads meet at different intervals. This results in I/O performance that is highly dependent on workload characteristics. In this paper, we examine the GC process and propose a semi-preemptible GC scheme that allows GC processing to be preempted while pending I/O requests in the queue are serviced. Moreover, we further enhance flash performance by pipelining internal GC operations and merge them with pending I/O requests whenever possible. Our experimental evaluation of this semipreemptible GC scheme with realistic workloads demonstrate both improved performance and reduced performance variability. Write-dominant workloads show up to a 66.56% improvement in average response time with a 83.30% reduced variance in response time compared to the non-preemptible GC scheme. In addition, we explore opportunities of a new NAND flash device that supports suspend/resume commands for read, write and erase operations for fully preemptible GC. Our experiments with a fully preemptible GC enabled flash device show that request response time can be improved by up to 14.57% compared to semi-preemptible GC.

Lee, Junghee [ORNL; Kim, Youngjae [ORNL; Shipman, Galen M [ORNL; Oral, H Sarp [ORNL; Kim, Jongman [Georgia Institute of Technology

2012-01-01T23:59:59.000Z

400

The inheritance of fruit colour in apple (Malus pumila Mill.)  

E-Print Network (OSTI)

The inheritance of fruit colour in apple (Malus pumila Mill.) Allan G. WHITE Yves LESPINASSE that red fruit colour was determined by two dominant complementary genes. Blush and red colour did key words : Skin colour, hybridization. R�SUM� Hérédité de la couleur du fruit chez le pommier (Malus

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487503 (2006)  

E-Print Network (OSTI)

APPLIED COGNITIVE PSYCHOLOGY Appl. Cognit. Psychol. 20: 487­503 (2006) Published online 12 April # 2006 John Wiley & Sons, Ltd. The question of how cognitive abilities predict task performance a cluster of cognitive functions underlying a factor that they labelled complex visuo-spatial organization

Montello, Daniel R.

402

Appl. Math. Lett., (2012) DSM for general nonlinear equations  

E-Print Network (OSTI)

Appl. Math. Lett., (2012) 1 #12;DSM for general nonlinear equations A.G. Ramm Mathematics(y) = 0, F (y) = 0, then equation F(u) = 0 can be solved by a DSM (Dynamical Systems Method) and the rate of convergence of the DSM is given provided that a source-type assumption holds. A discrete version of the DSM

403

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

Predicted 2010 Apple Harvest Dates Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station This season started out early the state has a light crop. The post- bloom cold temperatures will delay maturity and light croploads

404

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator  

E-Print Network (OSTI)

2012 PREDICTED APPLE HARVEST DATES Phillip Schwallier, District Horticulture Educator Amy Irish-Brown, District ICM Educator Clarksville Horticultural Experimentation Station We have the least confidence in our are above normal. Light crops will mature a few days earlier. Other varieties are less prone to hot

405

I/O Router Placement and Fine-Grained Routing on Titan to Support Spider II  

SciTech Connect

The Oak Ridge Leadership Computing Facility (OLCF) introduced the concept of Fine-Grained Routing in 2008 to improve I/O performance between the Jaguar supercomputer and Spider, OLCF s center-wide Lustre file system. Fine-grained routing organizes I/O paths to minimize congestion. Jaguar has since been upgraded to Titan, providing more than a ten-fold improvement in peak performance. To support the center s increased computational capacity and I/O demand, the Spider file system has been replaced with Spider II. Building on the lessons learned from Spider, an improved method for placing LNET routers was developed and implemented for Spider II. The fine-grained routing scripts and configuration have been updated to provide additional optimizations and better match the system setup. This paper presents a brief history of fine-grained routing at OLCF, an introduction to the architectures of Titan and Spider II, methods for placing routers in Titan, and details about the fine-grained routing configuration.

Ezell, Matthew A [ORNL] [ORNL; Dillow, David [None] [None; Oral, H Sarp [ORNL] [ORNL; Wang, Feiyi [ORNL] [ORNL; Tiwari, Devesh [ORNL] [ORNL; Maxwell, Don E [ORNL] [ORNL; Leverman, Dustin B [ORNL] [ORNL; Hill, Jason J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

406

Limits to the potential distribution of light brown apple moth in Arizona–California based on climate suitability and host plant availability  

E-Print Network (OSTI)

503–531 Dumbleton LJ (1932) The apple leaf roller (TortrixJW (1937) The light-brown apple moth (Tortrix post- vittana,distribution of light brown apple moth in Arizona–California

Gutierrez, Andrew Paul; Mills, Nicholas J.; Ponti, Luigi

2010-01-01T23:59:59.000Z

407

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2013 31, 2013 V-081: Wireshark Multiple Vulnerabilities Multiple vulnerabilities have been reported in Wireshark January 30, 2013 V-080: Apple iOS Multiple Vulnerabilities Apple iOS Multiple Vulnerabilities January 25, 2013 V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication A remote user can gain administrative access to the target system. January 18, 2013 V-072: Red Hat update for java-1.7.0-openjdk Red Hat has issued an update for java-1.7.0-openjdk. January 15, 2013 V-069: BlackBerry Tablet OS Adobe Flash Player and Samba Multiple Vulnerabilities Multiple vulnerabilities have been reported in BlackBerry Tablet OS January 11, 2013 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code Oracle Java Flaw Lets Remote Users Execute Arbitrary Code

408

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2012 10, 2012 U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system. May 9, 2012 U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. May 8, 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may

409

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

410

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Apple Mac OS PackageKit Distribution Script Remote Code 29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January 6, 2011 - 2:53pm Addthis PROBLEM: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability PLATFORM: Apple Mac OS X Server 10.6 - 10.6.5, Apple Mac OS X 10.6 - 10.6.5 Vulnerable Platforms Details ABSTRACT: A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS

411

V-191: Apple Mac OS X Multiple Vulnerabilities | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Mac OS X Multiple Vulnerabilities 1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X PLATFORM: Apple Macintosh OS X ABSTRACT: The vulnerabilities are caused due to a bundled version of QuickTime REFERENCE LINKS: Secunia Advisory SA54049 APPLE-SA-2013-07-02-1 Security Update 2013-003 CVE-2013-1018 CVE-2013-1019 CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: A boundary error when parsing compressed data within H.264 encoded movie files can be exploited to cause a buffer overflow A boundary error when handling the Sorenson Video 3 "mdat" section within a MOV file can be exploited to cause a buffer overflow A boundary error when handling "mvhd" atoms can be exploited to cause a

412

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Buffer Overflows Let Remote Users Execute 4: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm Addthis PROBLEM: Multiple vulnerabilities were reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Apple Quick Time prior to 7.7 ABSTRACT: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. reference LINKS: Apple security updates SecurityTracker Alert ID: 1025884 Mac OS X: Updating your software Support Downloads QuickTime 7.7 IMPACT ASSESSMENT: High Discussion: A specially crafted PICT file can trigger a buffer overflow [CVE-2011-0245]. Mac OS X version 10.7 is not affected. A specially crafted GIF image can trigger a heap overflow [CVE-2011-0246].

413

U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com The original advisory IMPACT ASSESSMENT: Medum Discussion: A vulnerability was reported in Apple iPhone. A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the reply address as the source of the SMS.

414

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Wednesday, June 20, 2012 8:12 AM Wednesday, June 20, 2012 8:12 AM To: Exparte Communications Subject: Energy Conservation Standards for Battery Chargers and External Power Supplies; Proposed Rule Making - Ex Parte Communication Apple Inc. met with DOE to discuss the notice of proposed rule making the Department sent out regarding battery chargers and external power supplies. Below is a list of topics that Apple discussed with DOE. - Discussion regarding Battery Charger product Class 8 and that it does not scale with battery capacity. Class 8 is for DC-DC battery chargers. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark to be placed on the retail

415

Apple Valley, California: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

Apple Valley, California: Energy Resources Apple Valley, California: Energy Resources Jump to: navigation, search Equivalent URI DBpedia Coordinates 34.5008311°, -117.1858759° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":34.5008311,"lon":-117.1858759,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

416

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct...

417

E-Print Network 3.0 - apple orchard systems Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy 52 Abstract Amendment of orchard soil with low-glucosinolate Brassica napus (rape) seed meal Summary: established in mature apple orchards and infect trees...

418

E-Print Network 3.0 - apple blossom amaryllidaceae Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Toppings Assorted Dressings Entre Grilled Apple Barbequed Chicken Swiss... Blossom Dressing Starch Oven Roasted Quartered Red Skin Potatoes Desserts Cookies, Brownies, Bars...

419

E-Print Network 3.0 - apple leafroller bonagota Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary: , such as: Apple Aphid Cotton Aphid Green Peach Aphid Melon Aphid Pea Aphid Potato Aphid Rose Aphid... Leafminers, such as: Citrus Leafminer Serpentine Leafminer...

420

E-Print Network 3.0 - apple filter cake Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Cake Apple Turnovers Strawberry Rhubarb Pie Chocolate Cream... Vegetarian Crab Cakes Potato Wedges Linguine Brown Rice Pilaf Steamed Italian Green Beans Steamed Fresh... Peach...

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

E-Print Network 3.0 - apple aphid dysaphis Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Sample search results for: apple aphid dysaphis Page: << < 1 2 3 4 5 > >> 1 Community ecology Ants defend aphids against Summary: conditions, ants remove cadavers of the rosy...

422

E-Print Network 3.0 - appl phys lett Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

, left-handed metamaterial. Appl. Phys. Lett. 78, 489 (2001). 102 R. A. Shelby, D. R. Smith, and S... -refractive-index transmission-line media. ... Source: Groningen,...

423

On the Automation of Encoding Processes in the Quantum IO Monad  

E-Print Network (OSTI)

It is now clear that the use of resilient encoding schemes will be required for any quantum computing device to be realised. However, quantum programmers of the future will not wish to be tied up in the particulars of such encoding schemes. Quantum programming languages and libraries are already being developed, one of which is the Quantum IO Monad. QIO, as it is often abbreviated to, provides an interface to define and simulate quantum computations via a library of functions written in Haskell, a purely functional programming language. A solution is presented that takes an arbitrary QIO program and returns an equivalent program incorporating some specified quantum error correction techniques.

James Barratt

2012-10-02T23:59:59.000Z

424

Design Techniques for Energy Efficient Multi-GB/S Serial I/O Transceivers  

E-Print Network (OSTI)

for longer usage time in battery operation. These requirements based on a 35 % improvement in energy efficiency of serial I/O transceivers reported at the 2006 ISSCC and VLSI symposium, which is shown in Fig. 1.1 [4]-[50]. However, this improvement still... data rate is a scalable rate that is from 4 to 8 Gb/s and from 8 Gb/s to 16 Gb/s with near 1 pJ/b energy efficiency as shown in Fig. 1.2 [4]-[50]. I.2 Dissertation Organization This dissertation starts with the overview of serial link transceiver...

Song, Younghoon

2014-01-02T23:59:59.000Z

425

IO2566  

Office of Legacy Management (LM)

566 566 ;;I: :.f;l -5 iii i: i:2 JOSEPH OALIBER, EBQ., RKCEIVKR 513-519 WKBT 20th STREET NEW YORK, NKU YORK April 1, 1993 Former Sites Restoration Division Director U.S. Department of Energy, OR Operations P.O. BOX 2001 Oak Ridge, Tennessee 37831-8723 Ret 513-519 West 20th Street pew York. New York Dear Sir/Madam: Please be advised that pursuant to our remedial action license agreement dated November 30, premises (the t*License8q), 1992 relating to the above I hereby certify to you that the provisions of Ig 2(a) and 2(b) of the License have been fulfilled. Accordingly, we will release the $60,000 escrow we are holding to the former tenant and you are authorized to enter upon the premises pursuant to the terms of the License. Very truly yours, JOSEPH CALIBER, ESQ., RECEIVER

426

Theor Appl Genet (2004) 108:274279 DOI 10.1007/s00122-003-1435-5  

E-Print Network (OSTI)

Theor Appl Genet (2004) 108:274­279 DOI 10.1007/s00122-003-1435-5 E. Huaracha · M. Xu · S. S. Korban Narrowing down the region of the Vf locus for scab resistance in apple using AFLP-derived SCARs disease apple scab in apple, to a genetic distance of 0.4 cM is presented. Using 11 AFLP-derived SCARs

Korban, Schuyler S.

427

Modeling Io's Sublimation-Driven Atmosphere: Gas Dynamics and Radiation Emission  

SciTech Connect

Io's sublimation-driven atmosphere is modeled using the direct simulation Monte Carlo method. These rarefied gas dynamics simulations improve upon earlier models by using a three-dimensional domain encompassing the entire planet computed in parallel. The effects of plasma impact heating, planetary rotation, and inhomogeneous surface frost are investigated. Circumplanetary flow is predicted to develop from the warm subsolar region toward the colder night-side. The non-equilibrium thermal structure of the atmosphere, including vibrational and rotational temperatures, is also presented. Io's rotation leads to an asymmetric surface temperature distribution which is found to strengthen circumplanetary flow near the dusk terminator. Plasma heating is found to significantly inflate the atmosphere on both day- and night-sides. The plasma energy flux also causes high temperatures at high altitudes but permits relatively cooler temperatures at low altitudes near the dense subsolar point due to plasma energy depletion. To validate the atmospheric model, a radiative transfer model was developed utilizing the backward Monte Carlo method. The model allows the calculation of the atmospheric radiation from emitting/absorbing and scattering gas using an arbitrary scattering law and an arbitrary surface reflectivity. The model calculates the spectra in the {nu}{sub 2} vibrational band of SO{sub 2} which are then compared to the observational data.

Walker, Andrew C.; Goldstein, David B.; Varghese, Philip L.; Trafton, Laurence M.; Moore, Chris H.; Stewart, Benedicte [University of Texas at Austin, Department of Aerospace Engineering, 210 East 24. Street W. R. Woolrich Laboratories 1 University Station, C0600 Austin, TX 78712 (United States); Gratiy, Sergey L.; Levin, Deborah A. [Pennsylvania State University, Department of Aerospace Engineering, 229 Hammond, University Park, PA 16802 (United States)

2008-12-31T23:59:59.000Z

428

Four species of Zygophiala (Schizothyriaceae, Capnodiales) are associated with the sooty blotch and flyspeck complex on apple  

E-Print Network (OSTI)

and flyspeck complex on apple Jean Carlson Batzer Maria Mercedes Diaz Arias Thomas C. Harrington Mark L: Sooty blotch and flyspeck (SBFS) is a complex of fungi that cause late-season blemishes of apple anamorph Zygophiala jamaicensis), caused flyspeck on apple. In the present study we compared morphology

Harrington, Thomas C.

429

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid in southern Norway  

E-Print Network (OSTI)

Masting and trophic cascades: interplay between rowan trees, apple fruit moth, and their parasitoid. 2004. Masting and trophic cascades: interplay between rowan trees, apple fruit moth of the dominant seed predator and its parasitoid. The apple fruit moth, Argyresthia conjugella Zeller, is a pre

430

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up  

E-Print Network (OSTI)

Page 1 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 How to set up Apple Mail to check email from the University of Aarhus In the Mail menu, select Indstillinger... #12;Page 2 of 7 | Setup of Apple Mail | Studies Office | University of Aarhus | Oct 2007 Click the + button

431

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South Africa  

E-Print Network (OSTI)

A New Canker Disease of Apple, Pear, and Plum Rootstocks Caused by Diaporthe ambigua in South., Wingfield. B. D.. Wingfield. M. 1., and Calitz. F. J. 1996. A new canker disease of apple. pear, and plum was found to be the c:J.useof a newly recognized disease of apple. pear, and plum rootstocks in South Africa

432

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees: a Modelling Study with MAppleT  

E-Print Network (OSTI)

Investigating the Influence of Geometrical Traits on Light Interception Efficiency of Apple Trees-structural plant model that has been built for simulating architectural development of apple trees. It has depends on geometrical traits. The purpose of this research is to investigate the influence of apple trees

Paris-Sud XI, Université de

433

Technology for Education Need a Computer? Take advantage of University educational discounts on a Dell or Apple computers, printers, and  

E-Print Network (OSTI)

on a Dell or Apple computers, printers, and accessories. Visit: http://uts.sc.edu/computerpurchase/ PC Windows or Apple? Check with your college or major for any specific computer and operating system Distribution Software for Home. And while there, you can also purchase Microsoft Office for your Apple or PC

Almor, Amit

434

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store promossa e gestita  

E-Print Network (OSTI)

Termini e condizioni 1. L'offerta di finanziamento consumer per i clienti Apple Online Store è promossa e gestita congiuntamente da Apple Sales International, Hollyhill Industrial Estate, Cork, Irlanda ("Apple") e Agos Ducato Spa, via Bernina 7 20158 Milano ("Agos Ducato"). 2. L'offerta di finanziamento

435

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE MOTH  

E-Print Network (OSTI)

2010 USDA Research Forum on Invasive Species GTR-NRS-P-75 87 ECONOMIC ANALYSIS OF LIGHT BROWN APPLE. Our analyses indicated that LBAM could cause substantial economic losses to U.S. apple, grape, orange an economic analysis of the light brown apple moth (LBAM), (Epiphyas postvittana (Walker)), whose presence

436

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute 4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS: Apple Article: HT5770 SecurityTracker Alert ID: 1028589 Secunia Advisory SA53520 CVE-2013-0986, CVE-2013-0987, CVE-2013-0988 CVE-2013-0989, CVE-2013-1015, CVE-2013-1016 CVE-2013-1017, CVE-2013-1018, CVE-2013-1019 CVE-2013-1020, CVE-2013-1021, CVE-2013-1022 IMPACT ASSESSMENT: High DISCUSSION: Multiple vulnerabilities have been reported in Apple QuickTime, which can be exploited by malicious people to compromise a user's system.

437

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

438

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple OS X Lets Remote Users Execute Arbitrary Code and 4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am Addthis U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges September 20, 2012 - 6:00am PROBLEM: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges PLATFORM: Apple OS X ABSTRACT: Several vulnerabilities were reported in Apple OS X. reference LINKS: Apple Security Article: HT5501 SecurityTracker Alert ID: 1027551 CVE-2012-0650 CVE-2012-3716 CVE-2012-3718 CVE-2012-3719 CVE-2012-3720 CVE-2012-3721 CVE-2012-3722 CVE-2012-3723 IMPACT ASSESSMENT: Medium Discussion: If the DirectoryService Proxy is used, a remote user can trigger a buffer

439

Pure appl. geophys. 155 (1999) 207232 00334553/99/04020726 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 155 (1999) 207­232 0033­4553/99/040207­26 $ 1.50+0.20/0 Rethinking Earthquake@ldeo.columbia.edu #12;Lynn R. Sykes et al.208 Pure appl. geophys., ment and funding of the National Earthquake Hazards

Shaw, Bruce E.

440

Pure appl. geophys. 157 (2000) 16011620 00334553/00/10160120 $ 1.50+0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 157 (2000) 1601­1620 0033­4553/00/101601­20 $ 1.50+0.20/0 Seismic Amplitude Pratt1602 Pure appl. geophys., wavenumbers. We will see that the main difficulty in inverting a deep

Pratt, R. Gerhard

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Multiple Flaws Let Remote Users Execute 3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks July 21, 2011 - 1:27am Addthis PROBLEM: Multiple vulnerabilities were reported in Apple Safari. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. A remote user can bypass a certificate validation control. PLATFORM: Safari 5.1 and Safari 5.0.6 Products Affected: Safari 5 (Mac OS X 10.6), Safari 5 (Mac OS X 10.5), Product Security, Safari 5.1 (OS X Lion) ABSTRACT: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

442

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

70: Apple QuickTime Multiple Flaws Let Remote Users Execute 70: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: prior to 7.7.2 ABSTRACT: Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. Reference LINKS: SecurityTracker Alert ID: 1027065 CVE-2012-0265 CVE-2012-0663 CVE-2012-0664 CVE-2012-0665 CVE-2012-0666 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. Only Windows-based systems

443

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple in China  

E-Print Network (OSTI)

510 Plant Disease / Vol. 97 No. 4 Etiology of Moldy Core, Core Browning, and Core Rot of Fuji Apple, and core rot of Fuji apple in China. Plant Dis. 97:510-516. `Fuji' apple fruit were collected in Shaanxi to species. Pathogenicity was determined by cutting apple fruit into halves and daubing spore suspensions

Biggs, Alan R.

444

Miyake-Apple posterior video analysis/photographic technique  

Science Journals Connector (OSTI)

The Miyake-Apple technique for posterior photography and video analysis of postmortem eyes and its variations provide a unique view of the anterior segment structures and surgical manipulations that are not readily seen during surgical procedures or by clinical inspection. It is particularly useful in studying and teaching anterior segment surgery, especially cataract and intraocular lens (IOL) surgery. We summarize the peer-reviewed literature on the use of this technique (1) in experimental studies with fresh human or animal eyes to analyze new \\{IOLs\\} and surgical techniques, (2) in formalin-fixed human pseudophakic autopsy eyes to study IOL-related complications, and (3) for teaching and training purposes.

Frederico A.S. Pereira; Liliana Werner; E. John Milverton; Minas T. Coroneo

2009-01-01T23:59:59.000Z

445

Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O Zongwei Zhou Miao Yu Virgil D. Gligor  

E-Print Network (OSTI)

. This paper presents a security architecture based on a wimpy kernel that provides on-demand isolated I and complexity of the wimpy kernel are minimized by safely outsourcing I/O subsystem functions to an untrusted untrust- worthy software components will certainly continue to exist in future commodity platforms

Tague, Patrick

446

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 January 2010 1 Zimbra Connector for Apple iSync (For Mac OS 10.5 +) Use the Zimbra Connector for Apple® iSync with Mac running 10.5 or later to sync your Apple Address Book to your Connector for Apple iSync to sync your Calendar and your Contacts. See the Zimbra Connector for Apple i

447

T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software 34: Apple Mac OS X MacDefender Fake Antivirus Malicious Software T-634: Apple Mac OS X MacDefender Fake Antivirus Malicious Software June 1, 2011 - 3:35pm Addthis PROBLEM: Apple Mac OS X versions 10.4, 10.5, and 10.6 are the targets of a new campaign of phishing attacks that aim to infect systems with a fake antivirus application called MacDefender. PLATFORM: Mac OS X 10.4, Mac OS X 10.6, Mac OS X 10.5 ABSTRACT: Apple Mac OS X users could infect their systems after visiting a malicious web page. Reports suggest that the Apple Safari web browser could allow automatic download and execution of the JavaScript-based malware because of an incorrectly set security option in Safari. reference LINKS: Security Article: HT4650 IntelliShield ID: 23239 Apple Insider Article

448

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

449

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

450

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cédric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Hervé Darbon

2001-10-02T23:59:59.000Z

451

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

202: Apple QuickTime Multiple Stack Overflow Vulnerabilities 202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

452

U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple QuickTime Multiple Stack Overflow Vulnerabilities 2: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities June 29, 2012 - 7:00am Addthis PROBLEM: Apple QuickTime is prone to multiple stack-based buffer-overflow vulnerabilities. PLATFORM: Version(s): prior to 7.7.2 ABSTRACT: Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution. Reference links: Vendor Advisory Security Focus ID 53571 CVE-2012-0663 IMPACT ASSESSMENT: Medium Discussion: These issues arise when the application handles specially crafted files. Successful exploits may allow attackers to execute arbitrary code in the context of the currently logged-in user; failed exploit attempts will cause denial-of-service conditions.Versions prior to

453

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,-PhysicsB ~Chemisby  

E-Print Network (OSTI)

Appl. Phys. B 34, 167-170(1984) Applied ,..o,,,- physics PhysicsB ~Chemisby 9 Springer-Verlag1984. Rychov, and A. B. Feodorov Physics Department, Moscow State University, SU-117234 Moscow, USSR Received8

Zadkov, Victor

454

Detection of streptomycin resistance in Erwinia amylovora strains isolated from apple orchards in Chihuahua, Mexico  

Science Journals Connector (OSTI)

Fire blight, one of the most severe diseases of apple and pear, is caused by the bacterium Erwinia amylovora. One control method is the use of antibiotics like streptomycin; however, streptomycin is the only anti...

Adrian Ponce de León Door; Alejandro Romo Chacón…

2013-10-01T23:59:59.000Z

455

E-Print Network 3.0 - apple integrated pest Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: apple integrated pest Page: << < 1 2 3 4 5 > >> 1 The Foundation for The Gator Nation An Equal Opportunity Institution Summary: the risk of pests and unnecessary...

456

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233240 (2006)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-006-3706-x Appl. Phys. A 85, 233­240 (2006) Materials Science & Processing chemical vapor deposition [45], hydrothermal synthesis [46], and solvothermal and subsequent anneal- ing

Reed, Mark

457

E-Print Network 3.0 - apple cv bravo Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Search Sample search results for: apple cv bravo Page: << < 1 2 3 4 5 > >> 1 POTATO (Solanum tuberosum) cv. Goldrush W. R. Stevenson and R. V. James Early Blight;...

458

Reflections on Cambridge: Reflections on Isaac Newton, discovery and Cambridge - with apple tree  

E-Print Network (OSTI)

Reflections about the life and effects of Isaac Newton in Cambridge, filmed outside Trinity College, with the descendant of his apple tree behind (and the rooms where he lived and worked). Filmed by Xu Bei in 2009....

Macfarlane, Alan

459

Tackling Care Transitions: Mom and Apple Pie vs. the Devil in the Details  

Science Journals Connector (OSTI)

Continuity of care is a fundamental tenet of high quality of care and has been likened to “motherhood and apple pie”1. Unfortunately, patients feel that continuity and care transitions are major problems with the...

Vineet M. Arora MD; MAPP

2009-08-01T23:59:59.000Z

460

From: Nicholas Ammann [mailto:nammann@apple.com]  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tuesday, July 16, 2013 4:35 PM Tuesday, July 16, 2013 4:35 PM To: Exparte Communications Subject: Request for Information on Evaluating New Products for the Battery Chargers and External Power Supply Rulemaking - Ex Parte Communication Below are a list of topics that Apple Inc. discussed with DOE. - Timeline for the effective date of the DOE battery charger efficiency regulation and the external power supply regulation. - Flexibility of DOE Battery Charger efficiency mark, including using software or package as an alternate to marking the product surface. - Discussion of replacement parts and refurbished products produced prior to the DOE effective date. - Discussion of DOE proposed EPS Level VI efficiency criteria as compared to that of Level V and how the implementation date

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

462

Fermion Generations from "Apple-Shaped" Extra Dimensions  

E-Print Network (OSTI)

We examine the behavior of fermions in the presence of an internal compact 2-manifold which in one of the spherical angles exhibits a conical character with an obtuse angle. The extra manifold can be pictured as an apple-like surface i.e. a sphere with an extra "wedge" insert. Such a surface has conical singularities at north and south poles. It is shown that for this setup one can obtain, in four dimensions, three trapped massless fermion modes which differ from each other by having different values of angular momentum with respect to the internal 2-manifold. The extra angular momentum acts as the family label and these three massless modes are interpreted as the three generations of fundamental fermions.

Merab Gogberashvili; Pavle Midodashvili; Douglas Singleton

2007-08-13T23:59:59.000Z

463

A 10Gb/s compact low-power serial I/O with DFE-IIR equalization in 65nm CMOS  

E-Print Network (OSTI)

The design of compact low-power I/O transceivers continues to be a challenge for both chip-to-chip and backplane applications. The introduction of dense fine-pitch silicon packaging technologies, that in principle are ...

Kim, Byungsub

464

IO6264 OAK RIDGE NATIONAL LABORATORY POST OFFICE BOX 2008 WEMTED Sv MARTIN MARIETTA ENERGY SVPEUS. INC  

Office of Legacy Management (LM)

IO6264 IO6264 OAK RIDGE NATIONAL LABORATORY POST OFFICE BOX 2008 - WEMTED Sv MARTIN MARIETTA ENERGY SVPEUS. INC OAK RIDGE. TENNESSEE 37031 July 16, 1993 Dr. W. A Williams Department of Energy Trevion II Building EM-421 Washington, D. C. 205850002 Dear Dr. Williams: IndcperrdentVerihiatianoftbc~ConditioDofthtOId~~B~gOwnedbytht Gmnite city steel c2ltpmatiw, Gr8nite city, Illinois A team from the Measurement Applications and Development (MAD) group, Oak Ridge National Laboratory (ORNL), at the request of the Department of Energy (DOE) conducted an independent verification of the radiological condition of the old betatron building owned by the Granite City Steel Corporation. The uranium contamination present resulted from the handling of uranium slabs of

465

Infrared observations of eclipses of Io, its thermophysical parameters, and the thermal radiation of the Loki volcano and environs  

SciTech Connect

Observations of Io during eclipses by Jupiter in 1981-1984 are reported. Data obtained at 3.45-30 microns using bolometer system No. 1 on the 3-m IRTF telescope at Mauna Kea are presented in extensive tables and graphs and analyzed by means of least-squares fitting of thermophysical models to the eclipse cooling and heating curves, thermal-radiation calculations for the Io volcanoes, and comparison with Voyager data. Best fits are obtained for a model comprising (1) a bright region with a vertically inhomogeneous surface and (2) a dark vertically homogeneous region with thermal inertia only about 0.1 times that of (1). Little evidence of volcanic-flux variability during the period is found, and the majority (but not all) of the excess thermal IR radiation in the sub-Jovian hemisphere is attributed to the Loki volcano and its lava lake. 35 references.

Sinton, W.M.; Kaminski, C.

1988-08-01T23:59:59.000Z

466

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4  

E-Print Network (OSTI)

Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 1 of 4 Connecting to Poly-WiFi (on Apple iPhone) 1) Open "Settings". 2) Select "Wi-Fi". Information Systems Department #12;Connecting to Poly-WiFi (on Apple iPhone) February 2010 Page 2 of 4 3) If your Wi-Fi is currently off, turn On the Wi

Aronov, Boris

467

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249–261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

468

Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.6 & 10.7) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click on Language

Keegan, Te Taka

469

Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.3, 4 & 5) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

470

Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh you must make some  

E-Print Network (OSTI)

1 Macronized Vowels on a Mac (OS X 10.1 & 10.2) In order to type macrons using an Apple Macintosh. Choose System Preferences from the Apple Menu. 2. From the System Preferences Window click

Keegan, Te Taka

471

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

472

Biotechnol. Appl. Biochem. (2005) 42, 119131 (Printed in Great Britain) doi:10.1042/BA20040207 119 Clonal evolution of stem and differentiated cells can be  

E-Print Network (OSTI)

Biotechnol. Appl. Biochem. (2005) 42, 119­131 (Printed in Great Britain) doi:10.1042/BA20040207 119

Zandstra, Peter W.

473

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7/23/2007 2:06 PM  

E-Print Network (OSTI)

Mac mini: How to Reset the PMU http://docs.info.apple.com/article.html?artnum=300574 1 of 2 7 the PMU on a Mac mini and it still isn't displaying video or turning on, contact Apple technical support (1-800-APL-CARE in the U.S.) or take your computer to your local Apple Retail Store or Apple

California at Santa Barbara, University of

474

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x)  

E-Print Network (OSTI)

ZCS Network Edition 6.0 December 2009 1 Zimbra Connector for Apple iSync (For Mac OS 10.4.x) When the Zimbra Connector for Apple® iSync is installed, you can use Apple Address Book, iCal, and Microsoft on OS X 10.5 or later is handled with CalDAV. See Zimbra Connector for Apple iSync (For Max OS 10

475

New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during first years of tree production2  

E-Print Network (OSTI)

1 New insights for estimating the genetic value of F1 apple progenies for irregular bearing1 during title: Early quantification of alternation in flowering for F1 apple progenies18 Submitted: 02 agronomic issues in1 fruit-tree species, particularly in apple, the selection of regular cultivars

Paris-Sud XI, Université de

476

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs, Agriculture Canada Research Station, Vineland Station, Ontario LOR 2EO. Plant  

E-Print Network (OSTI)

First Report of Nectria galligena Causing European Canker of Apple Trees in Ontario. A. R. Biggs for publication 19 July 1985. European canker of apple (Malus domestics Borkh. 'MacIntosh') caused by Nectria includes the apple-growing region of central Ontario. Reference: Booth, C. Commonw. Mycol. Inst. Pap. 73

Biggs, Alan R.

477

Application for CALS-CCE 2013 Summer Internship Title of project: Plum Curculio Management in Organic Apple Production: Develop Management Strategies  

E-Print Network (OSTI)

in Organic Apple Production: Develop Management Strategies using Bio-control Nematodes Worksite location (CCE outcomes (no more than 5-10 sentences): The Hudson River Valley organic apple production has been management of plum curculio would aid organic apple production in this region of NY. The development

Keinan, Alon

478

Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing must exhibit roundness, edibility, redness, fruitiness, and so on. Such theories  

E-Print Network (OSTI)

#12;? Johnson-Laird, ). So, for example, to satisfy the concept (`to be an apple. . .'\\), a thing of concepts. For instance, apples resemble re engines by sharing the characteristic of redness, they resemble lost much of its popularity, largely because apples, although most o en red, are not necessarily so

Bucci, David J.

479

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon scitula (Harris) N.Y.S. Agric. Expt. Station  

E-Print Network (OSTI)

APPLE: Malus domestica Borkhauser D. P. Kain and A. Agnello Dogwood borer (DWB); Synanthedon@nysaes.cornell .edu APPLE, EVALUATION OF VARIOUS TRUNK SPRAYS TO CONTROL BORERS INFESTING BURRKNOTS, 2006 the untreated check. (Table 1) Table 1. Efficacy of insecticides against dogwood borer infesting apple, 2006

Agnello, Arthur M.

480

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F GEN N  

E-Print Network (OSTI)

Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00036777 F ADITI GUPTA F 00036674 F SRISHTI VIVEK SHARMA F GEN N Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH) Appl Nbr Full TiFirst Name Middle Name Last Name Sex Category PH Category 00032299 F SANDEEP KUMAR

Ribeiro, Vinay

Note: This page contains sample records for the topic "apple ios bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Nitrogen recycling in the apple (Malus domestica Borkh.) Department of Horticulture, University of Illinois, Urbana, II 6i801,1, U.,c).A.  

E-Print Network (OSTI)

Nitrogen recycling in the apple (Malus domestica Borkh.) J.S. Titus Department of Horticulture of an apple tree in which we have been engaged for the last several years. In looking into some early literature, the recognition that the roots of the apple (Malus domestica Borkh.) could reduce nitrogen

Paris-Sud XI, Université de

482

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0  

E-Print Network (OSTI)

Pure appl. geophys. 149 (1997) 1-2 0033 4553/97/010001-0251.50+ 0.20/0 9 Birkh~user Verlag, Basel regarding the strategy of prediction and particular proposals for #12;2 Introduction Pure appl. geophys

Dmowska, Renata

483

EXPLORING IO'S ATMOSPHERIC COMPOSITION WITH APEX: FIRST MEASUREMENT OF {sup 34}SO{sub 2} AND TENTATIVE DETECTION OF KCl  

SciTech Connect

The composition of Io's tenuous atmosphere is poorly constrained. Only the major species SO{sub 2} and a handful of minor species have been positively identified, but a variety of other molecular species should be present, based on thermochemical equilibrium models of volcanic gas chemistry and the composition of Io's environment. This paper focuses on the spectral search for expected yet undetected molecular species (KCl, SiO, S{sub 2}O) and isotopes ({sup 34}SO{sub 2}). We analyze a disk-averaged spectrum of a potentially line-rich spectral window around 345 GHz, obtained in 2010 at the APEX 12 m antenna. Using different models assuming either extended atmospheric distributions or a purely volcanically sustained atmosphere, we tentatively measure the KCl relative abundance with respect to SO{sub 2} and derive a range of 4 × 10{sup –4}-8 × 10{sup –3}. We do not detect SiO or S{sub 2}O and present new upper limits on their abundances. We also present the first measurement of the {sup 34}S/{sup 32}S isotopic ratio in gas phase on Io, which appears to be twice as high as the Earth and interstellar medium reference values. Strong lines of SO{sub 2} and SO are also analyzed to check for longitudinal variations of column density and relative abundance. Our models show that, based on their predicted relative abundance with respect to SO{sub 2} in volcanic plumes, both the tentative KCl detection and SiO upper limit are compatible with a purely volcanic origin for these species.

Moullet, A. [National Radio Astronomy Observatory, Charlottesville, VA-22902 (United States); Lellouch, E.; Moreno, R. [LESIA-Observatoire de Paris, 5 place J. Janssen, F-92195 Meudon CEDEX (France); Gurwell, M. [Harvard-Smithsonian Center for Astrophysics, Cambridge, MA-02138 (United States); Black, J. H [Department of Earth and Space Sciences, Chalmers University of Technology, Onsala Space Observatory, SE-43992 Onsala (Sweden); Butler, B. [National Radio Astronomy Observatory, Socorro, NM-87801 (United States)

2013-10-10T23:59:59.000Z

484

Runtime System for I/O Staging in Support of In-Situ Processing of Extreme Scale Data  

SciTech Connect

Our research in this project focused on creating and evaluating an I/O infrastructure and tools for extreme-scale applications and machines so that scientists can reduce their time to discovery at small cost in machine resources and consequent power consumption. We wanted to provide tools that are highly scalable, portable, and easy-to-use, so that scientists can gain control of their science, and concentrate on producing important scientific discovery in their own domain. Accelerating the rate of insight and scientific productivity, therefore, demands new solutions to managing the avalanche of data expected at extreme scale.

Schwan, Karsten [Georgia Institute of Technology

2013-11-01T23:59:59.000Z

485

...And Eat it Too: High Read Performance in Write-Optimized HPC I/O Middleware File Formats  

SciTech Connect

As HPC applications run on increasingly high process counts on larger and larger machines, both the frequency of checkpoints needed for fault tolerance and the resolution and size of Data Analysis Dumps are expected to increase proportionally. In order to maintain an acceptable ratio of time spent performing useful computation work to time spent performing I/O, write bandwidth to the underlying storage system must increase proportionally to this increase in the checkpoint and computation size. Unfortunately, popular scientific self-describing file formats such as netCDF and HDF5 are designed with a focus on portability and flexibility. Extra care and careful crafting of the output structure and API calls is required to optimize for write performance using these APIs. To provide sufficient write bandwidth to continue to support the demands of scientific applications, the HPC community has developed a number of I/O middleware layers, that structure output into write-optimized file formats. However, the obvious concern with any write optimized file format would be a corresponding penalty on reads. In the log-structured filesystem, for example, a file generated by random writes could be written efficiently, but reading the file back sequentially later would result in very poor performance. Simulation results require efficient read-back for visualization and analytics, and though most checkpoint files are never used, the efficiency of a restart is very important in the face of inevitable failures. The utility of write speed improving middleware would be greatly diminished if it sacrificed acceptable read performance. In this paper we examine the read performance of two write-optimized middleware layers on large parallel machines and compare it to reading data natively in popular file formats. The two I/O middleware layer examined in this paper are the Adaptable IO System (ADIOS), a library-based approach developed at Oak Ridge National Laboratory to provide a high-level IO API that can be used in place of netCDF or HDF5 to do much more aggressive write-behind and efficient reordering of data locations within the file; and the Parallel Log-structured Filesystem (PLFS), a stackable FUSE filesystem approach developed at Los Alamos National Laboratory that decouples concurrent writes to improve the speed of checkpoints. Since ADIOS is an I/O componentization that affords selection of different I/O methods at or during runtime, through a single API, users can have access to MPI-IO, Posix-IO, HDF5, netCDF, and staging methods. The ADIOS BP file format is a new log-file format that has a superset of the features of both HDF5 and netCDF, but is designed to be portable and flexible while being optimized for writing. PLFS, on the other hand, is mounted as a stackable filesystem on top of an existing parallel filesystem. Reads or writes to the PLFS filesystem are transparently translated into operations on per-process log files stored in the underlying parallel filesystem. Since PLFS performs this translation without application modification, users can write in HDF5, netCDF, or app-specific file formats and PLFS will store the writes in a set of efficiently written log-formatted files, while presenting the user with a logical 'flat' file on reads. Despite their different approaches, the commonality behind both of these middleware systems is that they both write to a log file format. As shown in previous publications, writes are fully optimized in both systems, sometimes resulting in 100x improvements over writing data in popular file formats. But as mentioned above, writing is only one part of the story. In this paper we examine the read performance of our middleware layers on large parallel machines and compare these to reading data either natively or from other popular file formats. We compare the reading performance in two different scenarios: (1) Reading back restarts from the same number of processors as wrote the data and (2) Reading back restart data from a different number of processors. We observe that not only can write-optimi

Klasky, Scott A [ORNL] [ORNL; Lofstead, J. [Georgia Institute of Technology] [Georgia Institute of Technology; Bent, John [ORNL] [ORNL; Gibson, Garth A [ORNL] [ORNL; Parashar, Manish [Rutgers University] [Rutgers University; Podhorszki, Norbert [ORNL] [ORNL; Schwan, Karsten [Georgia Institute of Technology] [Georgia Institute of Technology; Wolf, Matthew D [ORNL] [ORNL

2009-01-01T23:59:59.000Z

486

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:15pm 3:15pm Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

487

T-675: Apple Laptop Battery Interface Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:03am 7:03am Addthis PROBLEM: A vulnerability was reported in the battery interface used in Apple laptop models. A local user can cause denial of service conditions. PLATFORM: Mac OS X ABSTRACT: Apple Laptop Battery Interface Lets Local Users Deny Service reference LINKS: SecurityTracker Alert ID: 1025831 Apple Article: HT1222 Forbes Article IMPACT ASSESSMENT: Medium Discussion: The battery microcontroller interfaces uses common API keys. A local user with knowledge of the keys can control the microcontroller functions. This can be exploited to prevent the battery from being charged, interfere with battery heat regulation, or cause the battery to stop functioning. Impact: A local user can prevent the battery from charging, interfere with the battery heat regulation, or cause the battery to become unusable. Modern

488

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

489

Appl. Phys. A 68, 379385 (1999) / DOI 10.1007/s003399900012 Applied Physics A  

E-Print Network (OSTI)

cuticle is comparable to polymers exhibiting relatively low thermal conductivities, and, therefore, should.e. with pulse lengths shorter than the thermal conduction in the substrate. Chitin, the main component of insectAppl. Phys. A 68, 379­385 (1999) / DOI 10.1007/s003399900012 Applied Physics A Materials Science

Krahe, Rüdiger

490

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194  

E-Print Network (OSTI)

Eur. Phys. J. Appl. Phys. 56, 24004 (2011) DOI: 10.1051/epjap/2011110194 THE EUROPEAN PHYSICAL JOURNAL APPLIED PHYSICS Regular Article Influence of nitrogen impurities on the formation of active´isica, IST, Universidade T´ecnica de Lisboa, Portugal 3 Research Institute for Solid State Physics and Optics

Guerra, Vasco

491

Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1  

E-Print Network (OSTI)

SS-AGR-300 Tank-Mix Options for Control of Tropical Soda Apple and Dogfennel1 B. A. Sellers and J throughout Florida, GrazonNext HL tank-mixed with another herbicide will be required to effectively control both species. Many combinations were tested to determine what herbi- cides could be tank

Watson, Craig A.

492

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553556 (2004)  

E-Print Network (OSTI)

DOI: 10.1007/s00339-003-2397-9 Appl. Phys. A 78, 553­556 (2004) Rapidcommunication Materials) were developed [1], active research had been performed to improve the device per- formance [2­6]. For fabricating effi- cient devices, it is necessary to en- hance charge injection efficiency at both OLED cathode

Gong, Jian Ru

493

Radon Series Comp. Appl. Math 8, 129 c de Gruyter 2009 Optimal consumption and investment with  

E-Print Network (OSTI)

Radon Series Comp. Appl. Math 8, 1�29 c de Gruyter 2009 Optimal consumption and investment investment/con- sumption problem for continuous time market models. By applying results from sto- chastic, together with margin tradings on certain financial products, the exposure to losses of investments

Paris-Sud XI, Université de

494

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17:1133  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. 2009; 17 Research History of Accelerated and Qualification Testing of Terrestrial Photovoltaic Modules: A Literature-plate terrestrial photovoltaic (PV) modules. An important facet of this subject is the standard module test

495

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press)  

E-Print Network (OSTI)

PROGRESS IN PHOTOVOLTAICS: RESEARCH AND APPLICATIONS Prog. Photovolt: Res. Appl. (in press and Separation of Cd and Te from Cadmium Telluride Photovoltaic Manufacturing Scrap V. M. Fthenakis*,y and W. Wang Brookhaven National Laboratory, Department of Environmental Sciences, Photovoltaic Environmental

496

DV/Payment Requests, PCARD, IOs and Purchase Orders. The following is required by Fiscal Office in order to process your request and to avoid delay in  

E-Print Network (OSTI)

DV/Payment Requests, PCARD, IOs and Purchase Orders. The following is required by Fiscal Office that is of an "Official Function" nature, or mainly when food items are purchased. This includes business meals, training and recruiting costs. As well, these must be signed and originals sent. 5. There are two types of Purchase orders

497

IhEE MICROWAVE AND GUIDED WAVE LETTERS. VOL. 4. NO. IO, OCTOBER 1994 335 A Varactor-Tuned Patch Oscillator  

E-Print Network (OSTI)

IhEE MICROWAVE AND GUIDED WAVE LETTERS. VOL. 4. NO. IO, OCTOBER 1994 335 A Varactor-Tuned Patch-tuned microstrip patch antenna and may be used as an element in quasi-optical power combining oscillator arrays resonance. In addition, the antenna can exhibit several resonances, as with a patch antenna, and thus mode

York, Robert A.

498

RESULTS OF RADIOLOGICAL I'IEASUREMENTS HIGHT{AYS 18 AI.ID IO4 IN NIAGARA  

Office of Legacy Management (LM)

9s' 9s' RESULTS OF RADIOLOGICAL I'IEASUREMENTS HIGHT{AYS 18 AI.ID IO4 IN NIAGARA az76 rl//.ry' ORNL/RASA.85/ 40 TAKEN AT JUNCTION FALLS, NEH YORK Accesr to the information in thit rcport ir limiled to tho!' inOllateO on tho dl3tribution li3t and to OePartment ot Encrgy and Oepartmcnt ol Enotgy Gontracton This report was prepared as an account of work sponsored by an agency of the United States Government. Neitherth€ U nited StatesGovernment norany agency thereof, nor any of their employees, makes any warranty, express or implied' or assumes any legal liability or responsibility for the accuracy, completenessi or usefulness of any information, apparatus, product, or,process disclosed, or represents that its usewould not inlringe privately owned rights" Reference herein

499

REGISTRATION LIST P PR RE ES SO OL LI IC CI IT TA AT TI IO ON  

NLE Websites -- All DOE Office Websites (Extended Search)

REGISTRATION LIST REGISTRATION LIST P PR RE ES SO OL LI IC CI IT TA AT TI IO ON N C CO ON NF FE ER RE EN NC CE E August 9, 2011 Holiday Inn Capitol  550 C Street, SW  Washington, DC 20024 Page 1 of 9 Instructions: (iii) Please indicate (by checking the appropriate box) whether the organization you represent is a large business, small business, or not a business. (iv) Please indicate (by checking the appropriate box) whether your name or the name of your organization may be released on the NNSA website as an attendee of this conference. (v) Please provide an email address if you would like it to be released on the NNSA website. An email address cannot be released if you select neither in column (iv). Name Organization Name Large/Small (iii) Release Attendance? (iv) Email (to release)

500

New data on the effect of solar radiation and ?-farnesene on development of apple superficial scald during storage  

Science Journals Connector (OSTI)

The previously unknown selective effect of solar radiation on the development of apple superficial scald is established. Superficial scald doesn’t occur on the sun-exposed side of certain green fruits after st...

S. A. Rodikov

2008-06-01T23:59:59.000Z