National Library of Energy BETA

Sample records for file upload vulnerability

  1. U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

  2. V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 3: ownCloud Cross-Site Scripting and File Upload Vulnerabilities V-033: ownCloud Cross-Site Scripting and File Upload Vulnerabilities November 26, 2012 - 2:00am Addthis PROBLEM: ownCloud Cross-Site Scripting and File Upload Vulnerabilities PLATFORM: ownCloud 4.5.2, 4.5.1, 4.0.9 ABSTRACT: Multiple vulnerabilities have been reported in ownCloud REFERENCE LINKS: ownCloud Server Advisories Secunia Advisory SA51357 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Input passed via the

  3. Help:Uploading Files | Open Energy Information

    Open Energy Info (EERE)

    Uploading Files Jump to: navigation, search Click on the upload file link at the bottom of the page (NOTE: you must be logged in to have this option). Uploading tutorial.JPG Click...

  4. V-177: VMware vCenter Chargeback Manager File Upload Handling Vulnerability

    Broader source: Energy.gov [DOE]

    The vCenter Chargeback Manager contains a critical vulnerability that allows for remote code execution

  5. File FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    Not Provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for File FTP Document Upload Website Citation Vermont Agency of Natural...

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  7. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  8. FTP Document Upload Website | Open Energy Information

    Open Energy Info (EERE)

    FTP Document Upload Website Abstract The Drinking Water and Groundwater Protection Division's (DWGPD) File Transfer Protocol (FTP) document upload website. The DWGPD is a division...

  9. NERSC FTP Upload Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC FTP Upload Service The NERSC FTP Upload service is designed for external collaborators to be able to send data to NERSC staff and users. It allows you to create a...

  10. T-607: Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Update: Adobe Acrobat, Reader, and Flash Player SWF File Processing Arbitrary Code Execution Vulnerability.

  11. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  12. U-173: Symantec Web Gateway Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Symantec Web Gateway. A remote user can include and execute arbitrary code on the target system. A remote user can conduct cross-site scripting attacks. A remote user can view/delete/upload files on the target system.

  13. Tips & Tricks for Uploading Images with Research Highlights

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    & Tricks for Uploading Images with Research Highlights Images: (optional) Only images in JPEG, BMP, GIF, or PNG can be accepted up to 10 Mb. The image caption is limited to 500 characters. Tip: For comparisons, lay multiple images out side by side, vertically or in a grid formation to create a single image file for uploading on the Research Highlight Submittal Form. Trick: If image editing soft ware is unavailable, the task can be accomplished using Microsoft (MS) Word as follows: 1. Insert

  14. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  15. PARS II 104 Contractor Monthly Upload | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    104 Contractor Monthly Upload PARS II 104 Contractor Monthly Upload PDF icon PARS II 104 Contractor Monthly Upload More Documents & Publications PARS II TRAINING PARS II Training Workbook (Course 103) PARS II TRAINING

  16. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  17. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  18. GPFA-AB_Phase1RiskAnalysisTask5DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-09-30

    This submission contains information used to compute the risk factors for the GPFA-AB project (DE-EE0006726). The risk factors are natural reservoir quality, thermal resource quality, potential for induced seismicity, and utilization. The methods used to combine the risk factors included taking the product, sum, and minimum of the four risk factors. The files are divided into images, rasters, shapefiles, and supporting information. The image files show what the raster and shapefiles should look like. The raster files contain the input risk factors, calculation of the scaled risk factors, and calculation of the combined risk factors. The shapefiles include definition of the fairways, definition of the US Census Places, the center of the raster cells, and locations of industries. Supporting information contains details of the calculations or processing used in generating the files. An image of the raster will have the same name except *.png as the file ending instead of *.tif. Images with “fairways” or “industries” added to the name are composed of a raster with the relevant shapefile added. The file About_GPFA-AB_Phase1RiskAnalysisTask5DataUpload.pdf contains information the citation, special use considerations, authorship, etc. More details on each file are given in the spreadsheet “list_of_contents.csv” in the folder “SupportingInfo”. Code used to calculate values is available at https://github.com/calvinwhealton/geothermal_pfa under the folder “combining_metrics”.

  19. EISA 432 Compliance Tracking System Data Upload Templates

    Broader source: Energy.gov [DOE]

    These generic Excel templates are available for federal contractors and service providers to provide federal clients with reports in the format agencies are required to use. Providing data in these templates will make it easy for agencies to upload your data into the EISA 432 Compliance Tracking System.

  20. FILE

    Office of Legacy Management (LM)

    c&o--L>+/ co.o-09 ~~Epq-J+~~jDU" 1 . [o( / 5-/-- 1, "I ' -i, [ . - -. j s: FILE :3r.jNER is} -------.- pas',: Current: -----__---_---__-------- ----____-_________________ Cwner ccntacted 0 yes 0 nag i+ yet,? date czntacted ----___--I__- Ty-;Pfz ,' F iTiC~CC2~j 1 iljbj AA-r-ti--=' ="L---- /8;' ; z.eseaf-ch & sevei apment EJ F' raducticx scale tssting rJ Pilot si-jle 0 ' jench Scale Fracess 0 Theoretical Studies 0 Samp:! e & haivsis 0 Fz-citity Tvpe 0 Manui artur i ng

  1. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  2. Energy.gov File Naming Conventions for Downloads | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    File Naming Conventions for Downloads Energy.gov File Naming Conventions for Downloads When uploading files to download pages in Energy.gov's content management system (CMS), follow these guidelines for naming files on Office of Energy Efficiency and Renewable Energy (EERE) websites: File names should clearly describe the file's content. File names should not contain uppercase letters, spaces, or special characters (e.g., & or $), but may contain letters, numbers, underscores, and dashes.

  3. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  4. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  5. GPFA-AB_Phase1UtilizationTask4DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-09-30

    This submission of Utilization Analysis data to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) is in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin (project DE-EE0006726). The submission includes data pertinent to the methods and results of an analysis of the Surface Levelized Cost of Heat (SLCOH) for US Census Bureau ‘Places’ within the study area. This was calculated using a modification of a program called GEOPHIRES, available at http://koenraadbeckers.net/geophires/index.php. The MATLAB modules used in conjunction with GEOPHIRES, the MATLAB data input file, the GEOPHIRES output data file, and an explanation of the software components have been provided. Results of the SLCOH analysis appear on 4 .png image files as mapped ‘risk’ of heat utilization. For each of the 4 image (.png) files, there is an accompanying georeferenced TIF (.tif) file by the same name. In addition to calculating SLCOH, this Task 4 also identified many sites that may be prospects for use of a geothermal district heating system, based on their size and industry, rather than on the SLCOH. An industry sorted listing of the sites (.xlsx) and a map of these sites plotted as a layer onto different iterations of maps combining the three geological risk factors (Thermal Quality, Natural Reservoir Quality, and Risk of Seismicity) has been provided. In addition to the 6 image (.png) files of the maps in this series, a shape (.shp) file and 7 associated files are included as well. Finally, supporting files (.pdf) describing the utilization analysis methodology and summarizing the anticipated permitting for a deep district heating system are supplied.

  6. GPFA-AB_Phase1ReservoirTask2DataUpload

    SciTech Connect (OSTI)

    Teresa E. Jordan

    2015-10-22

    This submission to the Geothermal Data Repository (GDR) node of the National Geothermal Data System (NGDS) in support of Phase 1 Low Temperature Geothermal Play Fairway Analysis for the Appalachian Basin. The files included in this zip file contain all data pertinent to the methods and results of this task’s output, which is a cohesive multi-state map of all known potential geothermal reservoirs in our region, ranked by their potential favorability. Favorability is quantified using a new metric, Reservoir Productivity Index, as explained in the Reservoirs Methodology Memo (included in zip file). Shapefile and images of the Reservoir Productivity and Reservoir Uncertainty are included as well.

  7. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and...

  8. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  9. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  10. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  11. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signatures on File

  12. Original Signatures on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signatures on File

  13. File Storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage File Storage Disk Quota Change Request Form Carver File Systems Carver has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  14. File storage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage File storage Disk Quota Change Request Form Euclid File Systems Euclid has 3 kinds of file systems available to users: home directories, scratch directories and project directories, all provided by the NERSC Global File system. Each file system serves a different purpose. File System Home Scratch Project Environment Variable Definition $HOME $SCRATCH or $GSCRATCH No environment variable /project/projectdirs/ Description Global homes file system shared by all NERSC systems except

  15. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ATLAS uses the various systems: /common In the past ATLAS used /common primarily for their software installations but with cvmfs (see below) this is no longer necessary. ATLAS users also have made personal directories under /common/atlas. However, this is not the intended use of /common, as described on Other File

  16. Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on File Signature on File 5/29/08

  17. Lessons about vulnerability assessments.

    SciTech Connect (OSTI)

    Johnston, R. G.

    2004-01-01

    The Vulnerability Assessment Team (VAT) at Los Alamos National Laboratory believes that physical security can only be optimized through the use of effective vulnerability assessments. As a result of conducting vulnerability assessments on hundreds of different security devices and systems in the last few years, we have identified some of the attributes of effective assessments. These, along with our recommendations and observations about vulnerability assessments, are summarized in this paper. While our work has primarily involved physical security (in contrast to, for example, computer, network, or information security), our experiences may have applicability to other types of security as well.

  18. Files systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Files systems Files systems NERSC's global home and project file systems are available on Franklin. Additionally, Franklin has over 400 TB of locally attached high-performance /scratch disk space For information on the NERSC file systems, see the link at right. Scratch File Systems Size Aggregate Peak Performance # IO Servers Interconnect File System Software Disk Array Vendor $SCRATCH 209 TB 17 GB/sec 24 Lustre DDN $SCRATCH2 209 TB 17 GB/sec 24 Lustre DDN SCRATCH and SCRATCH2 There are two

  19. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  20. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how ALICE uses the various systems: /common ALICE uses /common to build the software that supports its grid-based automated production work. This software includes AliRoot, Geant, AliEn, and XRootD. /eliza6, /eliza8, /eliza17 ALICE has space on 3 elizas: 16TB on /eliza6, 6TB on /eliza8 and 11TB on /eliza17. The space on

  1. File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Systems File Systems For a general description of the different file systems available on PDSF please see Eliza File Systems and Other File Systems. Below is a summary of how STAR uses the various systems: /common The STAR software is installed on /common. For 32sl44 it is under /common/star/star44 and for sl53 it is under /common/star/star53. In both cases the software consists primarily of a STAR-specific ROOT installation on which releases of the STAR libraries are built as shown on the

  2. Facility Environmental Vulnerability Assessment

    SciTech Connect (OSTI)

    Van Hoesen, S.D.

    2001-07-09

    From mid-April through the end of June 2001, a Facility Environmental Vulnerability Assessment (FEVA) was performed at Oak Ridge National Laboratory (ORNL). The primary goal of this FEVA was to establish an environmental vulnerability baseline at ORNL that could be used to support the Laboratory planning process and place environmental vulnerabilities in perspective. The information developed during the FEVA was intended to provide the basis for management to initiate immediate, near-term, and long-term actions to respond to the identified vulnerabilities. It was expected that further evaluation of the vulnerabilities identified during the FEVA could be carried out to support a more quantitative characterization of the sources, evaluation of contaminant pathways, and definition of risks. The FEVA was modeled after the Battelle-supported response to the problems identified at the High Flux Beam Reactor at Brookhaven National Laboratory. This FEVA report satisfies Corrective Action 3A1 contained in the Corrective Action Plan in Response to Independent Review of the High Flux Isotope Reactor Tritium Leak at the Oak Ridge National Laboratory, submitted to the Department of Energy (DOE) ORNL Site Office Manager on April 16, 2001. This assessment successfully achieved its primary goal as defined by Laboratory management. The assessment team was able to develop information about sources and pathway analyses although the following factors impacted the team's ability to provide additional quantitative information: the complexity and scope of the facilities, infrastructure, and programs; the significantly degraded physical condition of the facilities and infrastructure; the large number of known environmental vulnerabilities; the scope of legacy contamination issues [not currently addressed in the Environmental Management (EM) Program]; the lack of facility process and environmental pathway analysis performed by the accountable line management or facility owner; and poor facility and infrastructure drawings. The assessment team believes that the information, experience, and insight gained through FEVA will help in the planning and prioritization of ongoing efforts to resolve environmental vulnerabilities at UT-Battelle--managed ORNL facilities.

  3. Energy vulnerability relationships

    SciTech Connect (OSTI)

    Shaw, B.R.; Boesen, J.L.

    1998-02-01

    The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

  4. Plutonium Vulnerability Management Plan

    SciTech Connect (OSTI)

    1995-03-01

    This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

  5. SCADA Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management Programs

  6. Climate Vulnerabilities | Department of Energy

    Office of Environmental Management (EM)

    Climate Vulnerabilities Climate Vulnerabilities The Energy Sector's Vulnerabilities to Climatic Conditions x Impacts Due to... Increasing Temperatures Decreasing Water Availability Increasing Storms, Flooding, and Sea Level Rise See All Impacts Map locations are approximate. Find out more about this data here. Click and drag the map to read about each location

  7. Guide to Critical Infrastructure Protection Cyber Vulnerability...

    Energy Savers [EERE]

    Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized...

  8. 1987 RECS Public Use Microdata Files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cvs file File 3: Type of Energy and Equipment text file cvs file File 4: Household Demographics text file cvs file File 5: Presence of Appliances text file cvs file File 6: Energy...

  9. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  10. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future ...

  11. Method and tool for network vulnerability analysis

    DOE Patents [OSTI]

    Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

    2006-03-14

    A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

  12. Common Control System Vulnerability

    SciTech Connect (OSTI)

    Trent Nelson

    2005-12-01

    The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

  13. U-117: Potential security vulnerability has been identified with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Senders ABSTRACT: Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update. reference LINKS: Vendor Advisory...

  14. TO: FILE

    Office of Legacy Management (LM)

    ' -1 1. : . . , . . . "a7 MEMLlRANlJUtl TO: FILE FROM= -&k-k!!L-- l Owner-&ntacted 17 yes Current: ----- ---------- --__ -- -____ I If yes, data contacted ------------- TYPE OF OPERATION -------------____ IJ Research & Development cl Facility Type 0 Production scale testing Cl Pilot Scale a Bench Scale PrOCess 0 Theoretical Studies 0 Sample & Analysis Production 0 Disposal/Storage a Manuf actuiing , q University 0 Research Organizatian / IJ Government Sponsored Facility 0

  15. TO: FILE

    Office of Legacy Management (LM)

    tlEtlORANDUtl TO: FILE 311% /1 DATE-----------~------- FROM: P. %a- w-----------_____ SUBJECT: F,/;-;d&;- /3ec+.e I SITE ALTERNATE NAME: --~~~-~-;,.--_~~~~-~-------------NAHE:----------------- _____ CITY: -!%!2~-&&-~- _______ STATE: s.-c&- OWNER(S) _--_--__ Past: ------------------------ Current: I Owner contacted 0 yes --_--~~~--~~~~--~_~--~~-~~ 0 no; if ye., date contacted 1 I TYPE OF OPERATION ---------------__ q Research & Development 0 Production scale testing a Pilot

  16. TO: FILE

    Office of Legacy Management (LM)

    TO: FILE D iev' c FROM: ---L----l!!--- MEMORANDUM k+=+ 7 DATE--- _-- ----_---- past: ---------- - -- .---1---------. &4 k WOdY Curr="t:----------------------- Owner contacted ,es *no; ' 0, -if yes, date contacted TYPE OF OPERATION ----------------- p Research & Dews1 opment q Production scale testing 0 Pilot Scale q Sample 84 Analysis B Production q Facility Type 0 Hanufacturinq 0 University 0 Research Organization c] Government Sponsored Facility q Other --------------------- '

  17. TO: FILE

    Office of Legacy Management (LM)

    if' /, SO -1 : . . ' - ,? \\?.. . . ..- ,- I, al. I, .I (. ,g \. ' \ ,, " ' tlEMOHANDUM TO: FILE FROH: (?.)-/ki' + SITE ALTERNATE ---..~..~.~, NAME: ;d QJA I. /O", JL Ir,, e> 1 :' - _____ ---_--- ---+w- __________ -Nan= __- _____ - _________ Owner cork&ted I-J yes [Bno; If yes, data con'tacted _----__-_ TYPE OF OPERATION ---~~~~~---~~--__ a Research & Development 11 Facility Type 0 Production scale testing 0 Pilot Scale 3 Bench Scale Process Theoretical Studies cl Sample 81

  18. TO: FILE

    Office of Legacy Management (LM)

    , TO: FILE ---w-o----- SUBJECT: 1 CITY: STATE: fld -------------------------- OWNER(S) -------_ Past: _----------------------- curr,ent : --------------------______ Owner cnntakted 0 yes RI-IO; if yes, date contacted----- ~TYPE OF OPERATION .: ,. 0. Research & Development n Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing 0 Ben&i Scale Process 0 University 0 Theoretical Studies IJ Research Organizatian a 0 Government Sample & Analysis .' 0 Production 0. Disposal

  19. TO: FILE

    Office of Legacy Management (LM)

    pA.l4-l-j TO: FILE I 4 MENORANDUM SUBJECT: aLwE?. .v --_---__ Past: Current: ----__-_____-----------~ -------------------_------ owner c:3ntacted q yes pm; if yes, date contacted ----------__- TYPE OF OPERATION ---_--__~~------_ 0 Research & Development 0 Production scale testing 0 Pilot 5cale 0 Bench Scale Process i Thearetical Studies Sample & Analysis 0 Producti on E Disposal/Storage Facility Type 0 Manufacturing 0 Uni verri ty 0 Research Organization 0 Government Sponsored Facility

  20. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability...

  1. CEKRM. FILES

    Office of Legacy Management (LM)

    *:-I c-Y,- -.>A - L z.23 ' ,gQ+ CEKRM. FILES : -- i" ry .' ;,:;;:i ;- ' _ :;, I' -. .-,- p.." * .i' ' --yr:,? ,5 .Y' :?!, .I I >L L qgy~T.5 ,-:,,. \>,' yt r, .,-:,7 ,A : _ . . T_ 31' :;:: . .' : z ^., - -; &.' -" ' \-,-y . ..L' .:"A .:1i2*;,1 1- .,: _.,-.- 1 ,... _ . , , 2; J..i"!w , . . . .' _ \ ' d>; : r. . _ " ' . ;I 2: a : ..i. ,. 7, I . :ri cij?TL-i; 12, ;;,2;-,: ;. ." * 1. 1 .:1 : :: .' I .-=-. I. Iv-.. . . . . - i. ; i -2. ./ ..l,..- '

  2. To: File

    Office of Legacy Management (LM)

    iU i.1 ' i d1m1 To: File Fl-0lll: a. Wall0 Subject: FUSRAP review of the former Internationai Rare Metals site in Mt. Kisco New York. The former International Rare Metals Refinery in Mt. Eisco, NY began operations in the early 1940's. Throughout its operatic and in various correspondence it has also been known as "Pregs Mt. Ki sco Refinery" and most,recently, the Canadian Radium and Uranium Corporation site; During the Manhattan Engineer District (MED) era, the federal government

  3. TO: FILE

    Office of Legacy Management (LM)

    TO: FILE FROM: ~~~r&m--- SUBJECT: MEMORANDUM DATE +!~&j!?~ _______ SITE NAME: CITY: -,&a o~-,--,-,--,-_-,sT~TE:-~A- P OWNER(S) --~=c-L&& ----- -------- Cu-rc"t: B_eh& --------------_- Owner contacted 0 yes 0 no; if yes, dete contacted ------------- TYPE OF OPERATION ----------------- 0 Research & Development 6 0 Production scale testing Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis Y Facility Type Bi Manufacturing University 0

  4. TO: FILE

    Office of Legacy Management (LM)

    nEnoRANDUn TO: FILE FR0f.t: ~L!S&km. ALTERNATE ---- -COME: ______ --~Z __________ I_v!E-!2E~_oEEeIIE!! p Research & Development 4 beq I I;om +obiylg 0 Production scale testing 0 Pilot Scale 0 ' Bench Scale Process i Theoretical Studies Sample & Analysis 0 Productiart Cl Disposal/Storage a Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Government Sponsored Facility a Other --------------__----_ 0 VI Chic430 Other information (i.e., cost + fixed fee, unit price,

  5. V-092: Pidgin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

  6. CENTRAL FILES

    Office of Legacy Management (LM)

    / .- ~ _. ,- *-.* . . CENTRAL FILES +, a/ o(-t.z2-5 AlLO 1 Pab-FJr 3. 19% TYtxP REPaT To A&7bA cM.m rlmc)HA~ ON JANtJm 23, 1956 f. A. W~~~+Y, M.D. c. 1. 08huRann 8nd J. A. Hlaeririg ob3e8tilw of Trlpr in @ ttd~, (;rulw 2?), 1956, a ttip na nda to UM Crrrit &abw8tury, cword, Ohio. The purpow o? this trip u&a to aondwt the WMnd ti 8 #etia8 of indUrtF%al mgiene run~yr uhiah hre been Thwr8port ia 8 66mpondzLusofthe Amu4ll;rmtr forth&, rtsnyu@raaaderith~.~~M Alb8ugh,

  7. U-117: Potential security vulnerability has been identified with certain HP printers and HP digital senders

    Broader source: Energy.gov [DOE]

    Remote attackers could execute arbitrary code by using a session on TCP port 9100 to upload a crafted firmware update.

  8. Unix File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Unix File Permissions Every file (and directory) has an owner, an associated Unix group, and a set of permission flags that specify separate read, write, and execute...

  9. NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sharing between platforms. File systems are configured for different purposes. On each machine you have access to at least three different file system Home: Permanent, relatively...

  10. NSTB Summarizes Vulnerable Areas | Department of Energy

    Office of Environmental Management (EM)

    NSTB Summarizes Vulnerable Areas NSTB Summarizes Vulnerable Areas Experts at the National SCADA Test Bed (NSTB) discovered some common areas of vulnerability in the energy control systems assessed between late 2004 and early 2006. These vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. PDF icon NSTB Summarizes Vulnerable Areas More Documents & Publications Lessons Learned from Cyber Security Assessments of SCADA and Energy

  11. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  12. NX Configuration File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Configuration File NX Configuration File This is the NX configuration file that you will need to connect to NERSC NX Server: NX5Confgure.nxs.zip To use this file, please follow the Online Tutorial. Last edited: 2016-02-01 08:11:29

  13. Project File System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project File System Project File System Overview The project file system is a global file system available on all NERSC computational systems. It allows sharing of data between users, systems, and/or (via science gateways) the "outside world". Default project directories are provided to every MPP project. Additional project directories can be provided upon request. Purging No, files in project directories are not subject to purging. Backup Daily backups are performed for project

  14. T-540: Sybase EAServer Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Sybase EAServer is prone to a security-bypass vulnerability and a directory-traversal vulnerability. Attackers may exploit these issues to execute arbitrary code within the context of the application or to disclose sensitive information.

  15. V-059: MoinMoin Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in MoinMoin, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system and by malicious people to manipulate certain data.

  16. V-087: Adobe Flash Player Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system.

  17. V-131: Adobe Shockwave Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    This update addresses vulnerabilities that could allow an attacker to run malicious code on the affected system

  18. V-208: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in Google Chrome which allows attackers to access and compromise a user's system.

  19. V-224: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Vulnerabilities V-224: Google Chrome Multiple Vulnerabilities August 22, 2013 - 1:05am Addthis PROBLEM: Multiple vulnerabilities have been reported in...

  20. V-121: Google Chrome Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Google Chrome Multiple Vulnerabilities V-121: Google Chrome Multiple Vulnerabilities March 28, 2013 - 12:29am Addthis PROBLEM: Google Chrome Multiple Vulnerabilities PLATFORM:...

  1. V-207: Wireshark Multiple Denial of Service Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Wireshark Multiple Denial of Service Vulnerabilities V-207: Wireshark Multiple Denial of Service Vulnerabilities July 31, 2013 - 1:59am Addthis PROBLEM: Multiple vulnerabilities...

  2. Grid Cyber Vulnerability & Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Vulnerability & Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  3. Cyber-Based Vulnerability Assessments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber-Based Vulnerability Assessments - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Fuel Cycle Defense Waste Management

  4. Navigating NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Navigating NERSC File Systems Navigating NERSC File Systems May 3, 2011 David-Turner.jpg NERSC Training Event 10:00 - 11:00 PDT May 3, 2011 (postponed from April 26, 2011)...

  5. Fast Global File Status

    Energy Science and Technology Software Center (OSTI)

    2013-01-01

    Fast Global File Status (FGFS) is a system software package that implimints a scalable mechanism to retrieve file information, such as its degree of distribution or replication and consistency.

  6. Standard interface file handbook

    SciTech Connect (OSTI)

    Shapiro, A.; Huria, H.C. )

    1992-10-01

    This handbook documents many of the standard interface file formats that have been adopted by the US Department of Energy to facilitate communications between and portability of, various large reactor physics and radiation transport software packages. The emphasis is on those files needed for use of the VENTURE/PC diffusion-depletion code system. File structures, contents and some practical advice on use of the various files are provided.

  7. Eliza File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eliza File Systems Eliza File Systems Storage at PDSF is organized by group and available to all the nodes in PDSF. Please note that files on these file systems are not backed up. It is the responsibility of users to back up their files themselves as necessary. Over the years at PDSF there have been incidents which resulted in a loss of data from disk, often related to aging hardware. You can display the UGE io units with the command "qconf -se global". Disk Vault Experiments SGE io

  8. Mining Bug Databases for Unidentified Software Vulnerabilities

    SciTech Connect (OSTI)

    Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

    2012-06-01

    Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

  9. V-157: Adobe Reader / Acrobat Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system

  10. U-198: IBM Lotus Expeditor Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    The vulnerabilities can be exploited by malicious people to conduct cross-site scripting attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system..

  11. CSV File Documentation: Consumption

    Gasoline and Diesel Fuel Update (EIA)

    Consumption Estimates The State Energy Data System (SEDS) comma-separated value (CSV) files contain consumption estimates shown in the tables located on the SEDS website. There are four files that contain estimates for all states and years. Consumption in Physical Units contains the consumption estimates in physical units for all states; Consumption in Btu contains the consumption estimates in billion British thermal units (Btu) for all states. There are two data files for thermal conversion

  12. Storage & File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC File Systems HPSS Data Archive I/O Resources for Scientific Applications at NERSC Optimizing I/O performance on the Lustre file system I/O Formats Science Databases Sharing Data Transferring Data Unix Groups at NERSC Unix File Permissions Data & Analytics Connecting to NERSC Queues and Scheduling Job Logs & Statistics Application Performance Training & Tutorials Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs

  13. Original Signature on File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Original Signature on File Page8 of 8 M. EMERGENCY PROCEDURES 1. The owneroperator must maintain an adequately trained onsite RCRA emergency coordinator to direct emergency...

  14. Global Scratch File System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Scratch Global Scratch File System Status: Retired Overview The global scratch file system (or "global scratch") can be accessed by multiple NERSC systems. Its default quota is much larger than the Global Home quota, so it can be used to temporarily store large amounts of data. This file system is periodically purged. Platforms Using Global Scratch The global scratch file system is available on all NERSC systems. Quotas Default global scratch quotas are 20 TB and 4,000,000 inodes. If

  15. FileSys.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of individual filesdirectories is not possible. * Hardware failures and human errors will happen. BACK UP YOUR FILES TO HPSS Protect Your Data * NERSC Global...

  16. File:Bureauofreclamationfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bureauofreclamationfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bureauofreclamationfactsheet.pdf Size of this preview: 463 599 pixels....

  17. File:20121127144703735.pdf | Open Energy Information

    Open Energy Info (EERE)

    20121127144703735.pdf Jump to: navigation, search File File history File usage File:20121127144703735.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  18. File:Windyclassroom.pdf | Open Energy Information

    Open Energy Info (EERE)

    Windyclassroom.pdf Jump to: navigation, search File File history File usage Metadata File:Windyclassroom.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  19. File:Npsfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Npsfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Npsfactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  20. File:Oregonshpodocumentationstandards.pdf | Open Energy Information

    Open Energy Info (EERE)

    Oregonshpodocumentationstandards.pdf Jump to: navigation, search File File history File usage File:Oregonshpodocumentationstandards.pdf Size of this preview: 463 599 pixels....

  1. File:Noaafactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Noaafactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Noaafactsheet.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  2. File:Drillinghandbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Drillinghandbook.pdf Jump to: navigation, search File File history File usage File:Drillinghandbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  3. File:Energydatabusfacthseet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Energydatabusfacthseet.pdf Jump to: navigation, search File File history File usage Metadata File:Energydatabusfacthseet.pdf Size of this preview: 463 599 pixels. Other...

  4. File:Bonnevillepowerfactsheet.pdf | Open Energy Information

    Open Energy Info (EERE)

    Bonnevillepowerfactsheet.pdf Jump to: navigation, search File File history File usage Metadata File:Bonnevillepowerfactsheet.pdf Size of this preview: 463 599 pixels. Other...

  5. U-179: IBM Java 7 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious users to disclose certain information and by malicious people to disclose potentially sensitive information, hijack a user's session, conduct DNS cache poisoning attacks, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

  6. Register file soft error recovery

    DOE Patents [OSTI]

    Fleischer, Bruce M.; Fox, Thomas W.; Wait, Charles D.; Muff, Adam J.; Watson, III, Alfred T.

    2013-10-15

    Register file soft error recovery including a system that includes a first register file and a second register file that mirrors the first register file. The system also includes an arithmetic pipeline for receiving data read from the first register file, and error detection circuitry to detect whether the data read from the first register file includes corrupted data. The system further includes error recovery circuitry to insert an error recovery instruction into the arithmetic pipeline in response to detecting the corrupted data. The inserted error recovery instruction replaces the corrupted data in the first register file with a copy of the data from the second register file.

  7. Determining Vulnerability Importance in Environmental Impact Assessment

    SciTech Connect (OSTI)

    Toro, Javier; Duarte, Oscar; Requena, Ignacio; Zamorano, Montserrat

    2012-01-15

    The concept of vulnerability has been used to describe the susceptibility of physical, biotic, and social systems to harm or hazard. In this sense, it is a tool that reduces the uncertainties of Environmental Impact Assessment (EIA) since it does not depend exclusively on the value assessments of the evaluator, but rather is based on the environmental state indicators of the site where the projects or activities are being carried out. The concept of vulnerability thus reduces the possibility that evaluators will subjectively interpret results, and be influenced by outside interests and pressures during projects. However, up until now, EIA has been hindered by a lack of effective methods. This research study analyzes the concept of vulnerability, defines Vulnerability Importance and proposes its inclusion in qualitative EIA methodology. The method used to quantify Vulnerability Importance is based on a set of environmental factors and indicators that provide a comprehensive overview of the environmental state. The results obtained in Colombia highlight the usefulness and objectivity of this method since there is a direct relation between this value and the environmental state of the departments analyzed. - Research Highlights: Black-Right-Pointing-Pointer The concept of vulnerability could be considered defining Vulnerability Importance included in qualitative EIA methodology. Black-Right-Pointing-Pointer The use of the concept of environmental vulnerability could reduce the subjectivity of qualitative methods of EIA. Black-Right-Pointing-Pointer A method to quantify the Vulnerability Importance proposed provides a comprehensive overview of the environmental state. Black-Right-Pointing-Pointer Results in Colombia highlight the usefulness and objectivity of this method.

  8. Other File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Other File Systems Other File Systems User Home Directories Your home directory is located at /home/login-name. Home directories are mounted to all PDSF nodes, are regularly backed up, and currently have 5 GB disk quotas. The "myquota" command shows quotas and usage in terms of space (GB) and inodes (the number of files and directories). Use the -M option of myquota to display in MB instead of GB. See also Checking quotas for more about myquota. Home directories are backed up as

  9. File:DIAsample.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIAsample.pdf Jump to: navigation, search File File history File usage File:DIAsample.pdf Size of this preview: 776 600 pixels. Full resolution (1,650 1,275 pixels, file...

  10. V-111: Multiple vulnerabilities have been reported in Puppet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerable system. SOLUTION: Update to a fixed version. Addthis Related Articles V-090: Adobe Flash Player AIR Multiple Vulnerabilities V-083: Oracle Java Multiple...

  11. V-051: Oracle Solaris Java Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-191: Oracle Java Multiple Vulnerabilities U-105:Oracle Java SE Critical Patch Update Advisory T-576: Oracle Solaris Adobe Flash Player Multiple Vulnerabilities...

  12. Tribal Energy System Vulnerabilities to Climate Change and Extreme...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of ...

  13. V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device.

  14. OLADE-Central America Climate Change Vulnerability Program |...

    Open Energy Info (EERE)

    Central America Climate Change Vulnerability Program Jump to: navigation, search Name OLADE-Central America Climate Change Vulnerability Program AgencyCompany Organization Latin...

  15. India-Vulnerability Assessment and Enhancing Adaptive Capacities...

    Open Energy Info (EERE)

    Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

  16. U-273: Multiple vulnerabilities have been reported in Wireshark

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  17. Common Cyber Security Vulnerabilities Observed in Control System...

    Energy Savers [EERE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  18. Top 10 Vulnerabilities of Control Systems and Their Associated...

    Energy Savers [EERE]

    Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) Top 10 Vulnerabilities of Control Systems and Their Associated Migitations (2006) This document...

  19. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED...

    Energy Savers [EERE]

    TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides...

  20. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment Jump to: navigation, search Name Colombia-CDKN-Cartagena Vulnerability Assessment AgencyCompany Organization Climate and Development...

  1. Colombia-Cartagena Vulnerability Assessment | Open Energy Information

    Open Energy Info (EERE)

    Colombia-Cartagena Vulnerability Assessment (Redirected from CDKN-Colombia-Cartagena Vulnerability Assessment) Jump to: navigation, search Name Colombia-CDKN-Cartagena...

  2. T-681:IBM Lotus Symphony Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple unspecified vulnerabilities in IBM Lotus Symphony 3 before FP3 have unknown impact and attack vectors, related to "critical security vulnerability issues."

  3. U-104: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Adobe Flash Player, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user's system.

  4. V-097: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact and others can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.

  5. V-126: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system

  6. V-187: Mozilla Firefox Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    These vulnerabilities can be exploited by malicious people to conduct cross-site scripting and spoofing attacks, disclose potentially sensitive information, bypass certain security restrictions, and compromise a user's system.

  7. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  8. T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server

    Broader source: Energy.gov [DOE]

    BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

  9. File:NREL-banglmetst-221.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-banglmetst-221.pdf Jump to: navigation, search File File history File usage Selected Meteorological Stations and Elevation Size of this...

  10. Setting up File Permissions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting up File Permissions Setting up File Permissions Recommendations for Setting up "Shared" Directories This section shows the recommended commands for setting up shared directories. Please read the full page to get an understanding of what these commands are doing. These recommendations are based on the common use-case at the JGI for user/group read/write and global read access. Creating a New Shared Directory dmj@genepool04:~$ umask 002 # or have this set in .bashrc.ext

  11. File:S-38-Well-Construction-and-Modification-Permit.pdf | Open...

    Open Energy Info (EERE)

    S-38-Well-Construction-and-Modification-Permit.pdf Jump to: navigation, search File File history File usage File:S-38-Well-Construction-and-Modification-Permit.pdf Size of this...

  12. Look At (Search) Large Files

    Energy Science and Technology Software Center (OSTI)

    1992-07-13

    Scanning large files for information can be time consuming and expensive when using edit utilities on large mainframe computers. The reason is that editors must usually load the file into a buffer.

  13. OHA Whistleblower Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Whistleblower decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark...

  14. OHA Security Cases Archive File

    Broader source: Energy.gov [DOE]

    This is a archive file of our Security decisions, Please download this file to your local computer and use the build in adobe search feature. Individual cases are listed in the bookmark section of...

  15. UTILITY Submit to BPA: Upload Template

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    achieved. (mmddyyyy) Was measure installed in a federal facility? (Dropdown box below) Utility assigned end user account or member number. Maximum length 50 characters....

  16. Upload Data - OpenEI Datasets

    Open Energy Info (EERE)

    open data DOE Open Data add to the catalog&3; for DOE-funded data GDR: DOE's Geothermal Data Repository Geothermal Data add a submission to DOE's &3;Geothermal Data Repository...

  17. zeller-aps2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CROSS SECTIONS Sam Zeller Fermilab APS May 2, 2011 1 * this topic has become quite interesting lately * revisiting this type of ν scattering physics again for 1 st time in decades * new data is challenging our thinking ... & turning up a few surprises S. Zeller, APS 2011, 05/02/11 Neutrino Cross Sections 2 NOvA T2K LBNE CNGS * pursuit of ν oscillations has unfortunately forced us to do physics at energies ~ GeV - where our exp'l knowledge of v interactions is limited * future ν

  18. zeller-sbl2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SBL Workshop May 13, 2011 1 * this topic has become quite interesting lately * revisiting ν scattering physics again for 1 st time in decades * new data is turning up a few surprises S. Zeller, SBL Workshop, May 2011 Neutrino Cross Sections 2 NOvA T2K LBNE CNGS * pursuit of ν oscillations has unfortunately forced us into a rather complex region of ν interaction physics - where our exp'l knowledge of v interactions has been limited * future ν oscillation experiments that will be addressing

  19. zeller-panic2011-upload.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in precision & search for smaller and smaller effects) 1 2 3 m 2 ATM m 2 SOL S. Zeller, PANIC, July 26, 2011 Neutrino Cross Sections 3 NOvA T2K LBNE CNGS * pursuit...

  20. MPI File Tree Walk

    Energy Science and Technology Software Center (OSTI)

    2007-04-30

    MPI-FTW is a scalable MPI based software application that navigates a directory tree by dynamically allocating processes to navigate sub-directories found. Upon completion, MPI-FTW provides statistics on the number of directories found, files found, and time to complete. Inaddition, commands can be executed at each directory level.

  1. File:Methane.pdf | Open Energy Information

    Open Energy Info (EERE)

    Methane.pdf Jump to: navigation, search File File history File usage File:Methane.pdf Size of this preview: 448 600 pixels. Go to page 1 2 3 4 5 Go next page next page ...

  2. Hopper File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and IO File Storage and IO Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance...

  3. File:Mmpa.pdf | Open Energy Information

    Open Energy Info (EERE)

    Mmpa.pdf Jump to: navigation, search File File history File usage File:Mmpa.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6...

  4. File:Keystone.pdf | Open Energy Information

    Open Energy Info (EERE)

    Keystone.pdf Jump to: navigation, search File File history File usage File:Keystone.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  5. File:Handbook.pdf | Open Energy Information

    Open Energy Info (EERE)

    Handbook.pdf Jump to: navigation, search File File history File usage File:Handbook.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  6. File:Install.pdf | Open Energy Information

    Open Energy Info (EERE)

    Install.pdf Jump to: navigation, search File File history File usage File:Install.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  7. File:Hydrofracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    Hydrofracking.pdf Jump to: navigation, search File File history File usage File:Hydrofracking.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  8. File:Consultants.pdf | Open Energy Information

    Open Energy Info (EERE)

    Consultants.pdf Jump to: navigation, search File File history File usage File:Consultants.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  9. File:Installnot.pdf | Open Energy Information

    Open Energy Info (EERE)

    Installnot.pdf Jump to: navigation, search File File history File usage File:Installnot.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  10. File:RSC.pdf | Open Energy Information

    Open Energy Info (EERE)

    RSC.pdf Jump to: navigation, search File File history File usage File:RSC.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  11. Category:Map Files | Open Energy Information

    Open Energy Info (EERE)

    has the following 4 subcategories, out of 4 total. M Map Image Files Map PDF Files N NREL Map Files 1 pages S SWERA Map Files Media in category...

  12. File:Primer.pdf | Open Energy Information

    Open Energy Info (EERE)

    Primer.pdf Jump to: navigation, search File File history File usage File:Primer.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4...

  13. File:600.pdf | Open Energy Information

    Open Energy Info (EERE)

    600.pdf Jump to: navigation, search File File history File usage File:600.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5 6 7...

  14. File:SGI.pdf | Open Energy Information

    Open Energy Info (EERE)

    SGI.pdf Jump to: navigation, search File File history File usage Metadata File:SGI.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  15. File:038392007).pdf | Open Energy Information

    Open Energy Info (EERE)

    8392007).pdf Jump to: navigation, search File File history File usage File:038392007).pdf Size of this preview: 463 599 pixels. Other resolution: 463 600 pixels. Go to page 1...

  16. V-083: Oracle Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A Critical Patch Update is a collection of patches for multiple security vulnerabilities. The Critical Patch Update for Java SE also includes non-security fixes. Critical Patch Updates are cumulative and each advisory describes only the security fixes added since the previous Critical Patch Update and Security Alert.

  17. CYBER/PHYSICAL SECURITY VULNERABILITY ASSESSMENT INTEGRATION

    SciTech Connect (OSTI)

    MacDonald, Douglas G.; Key, Brad; Clements, Samuel L.; Hutton, William J.; Craig, Philip A.; Patrick, Scott W.; Crawford, Cary E.

    2011-07-17

    This internally funded Laboratory-Directed R&D project by the Pacific Northwest National Laboratory, in conjunction with QinetiQ North America, is intended to identify and properly assess areas of overlap (and interaction) in the vulnerability assessment process between cyber security and physical protection. Existing vulnerability analysis (VA) processes and software tools exist, and these are heavily utilized in the determination of predicted vulnerability within the physical and cyber security domains. These determinations are normally performed independently of one another, and only interact on a superficial level. Both physical and cyber security subject matter experts have come to realize that though the various interactive elements exist, they are not currently quantified in most periodic security assessments. This endeavor aims to evaluate both physical and cyber VA techniques and provide a strategic approach to integrate the interdependent relationships of each into a single VA capability. This effort will also transform the existing suite of software currently utilized in the physical protection world to more accurately quantify the risk associated with a blended attack scenario. Performance databases will be created to support the characterization of the cyber security elements, and roll them into prototype software tools. This new methodology and software capability will enable analysts to better identify and assess the overall risk during a vulnerability analysis.

  18. Chemical Safety Vulnerability Working Group Report

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

  19. File storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File storage and I/O File storage and I/O Disk Quota Change Request Form Franklin File Systems The Franklin system has 4 different file systems mounted which provide different levels of disk storage, I/O performance and file permanence. The table below describes the various Franklin file systems File System Home Local Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 No environment variable /project/projectdirs/ Description Global homes file system shared with other NERSC

  20. T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability

    Broader source: Energy.gov [DOE]

    Microsoft is releasing this security advisory to help ensure customers are aware that an update to the Microsoft Malware Protection Engine also addresses a security vulnerability reported to Microsoft.

  1. Vendor System Vulnerability Testing Test Plan

    SciTech Connect (OSTI)

    James R. Davidson

    2005-01-01

    The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

  2. T-731:Symantec IM Manager Code Injection Vulnerability | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-731:Symantec IM Manager Code Injection Vulnerability T-731:Symantec IM Manager Code Injection Vulnerability September 30, 2011 - 8:30am Addthis PROBLEM: Symantec IM Manager Code...

  3. V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Security AppScan Enterprise Multiple Vulnerabilities V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities March 26, 2013 - 12:56am Addthis PROBLEM: IBM Security...

  4. V-191: Apple Mac OS X Multiple Vulnerabilities | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Apple Mac OS X Multiple Vulnerabilities V-191: Apple Mac OS X Multiple Vulnerabilities July 3, 2013 - 6:00am Addthis PROBLEM: Apple has issued a security update for Mac OS X...

  5. U-171: DeltaV Products Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

  6. U-169: Sympa Multiple Security Bypass Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 15, 2012 - 7:00am Addthis PROBLEM: Sympa Multiple Security Bypass Vulnerabilities PLATFORM: Sympa in versions prior to 6.1.11 ABSTRACT: Multiple vulnerabilities have been...

  7. Regional Climate Vulnerabilities and Resilience Solutions | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Regional Climate Vulnerabilities and Resilience Solutions Regional Climate Vulnerabilities and Resilience Solutions This interactive map is not viewable in your browser. Please view it in a modern browser.

  8. Original Signature On File

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Signature On File Department of Energy Carl sbad Field Office P. O. Box 3090 Carlsbad , New Mexico 8822 1 June 10, 2009 Mr. Steve Zappe, Project Leader Hazardous Waste Bureau New Mexico Environment Department 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Subject: Transmittal of CBFO Final Audit Report A-09-12 , Los Alamos National Laboratory Central Characterization Project TRU Waste Characterization and Certification Dear Mr. Zappe: Enclosed is the Carlsbad Field Office

  9. EIA-411 Data File

    Gasoline and Diesel Fuel Update (EIA)

    Form EIA-411 Database Form EIA-411 - “Coordinated Bulk Power Supply Program Report” Data Coverage and Data Quality Release Date: December 22, 2011 Next Release Date: November 2012 In 2008, the Form EIA-411 became a mandatory collection for all schedules except No. 7 (Transmission Outages) which will continue to be a voluntary filing. The Form EIA-411 collects information about regional electricity supply and demand projections for a five-year advance period and information on the transmission

  10. MEMORANDUrl TO: FILE

    Office of Legacy Management (LM)

    MEMORANDUrl TO: FILE FROM: 3. Lfwhle ---------------- ALTERNATE CITY: ---&!!!J&~~s__~- ________ STATE: --!?-c- (C&IO> OE!!EEL_S1 past: --rc;,b,&&~c! ---- current: --------- ---------- ---__-_ Owner contacted 0 yes g noi if yes, date contacted------ TYPE OF OPERATION ----------------- fl Research & Development 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process p Theoretical Studies cl Sample s1 Analysis 0 Production 0 Disposal/Storage m Facility Type 0

  11. TO: FILE DATE

    Office of Legacy Management (LM)

    tlEi?ORANDUH TO: FILE DATE FFtOil: c ----'- Y '%d 6- ----_----_ SUBJECT: SITE NAME: ----------STATE: Owner contacted 0 yes qno; if yes, date contacted ---------__-- TYPE OF OPERATION ----~_--_--~----_ &Research & Development @ Praduction scale testing. 0 Pilat Scale 0 Bench Scale Process a Theoretical Studies 0 Sample & Analysis tin Facility Type R Manufacturing IJ University 0 Research Organization IJ Gavernment Sponsored Facility 0 Other ----------------' --~- 0 Production E

  12. MEHORANDUM TO: FILE

    Office of Legacy Management (LM)

    MEHORANDUM TO: FILE FR0t-t: -~+?!+-- SUBJECT: u - 5..7. am . . ALTERNATE W% : ---\L-&--~~+. ___- ____ S-fA-rE: t-4 ;5- ------ wJ!%RLSL " Past: ------------------------ Current: --~~---~---__~~~-------~-- Owner contacted 0 yes -glnos if yes, date cotitectad TYPE OF OPERATION ---------_----__- 0 Research & Development 0 Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process *I Theoretical Studies 0 Sample & kialysis 0 Production 0 Disposal /Storage

  13. MEHORANDUfl TO: FILE SUBJECT:

    Office of Legacy Management (LM)

    MEHORANDUfl TO: FILE ------_____ SUBJECT: OWNER (S) -----_-- Post:-------_-------_________ current: ---------_---------_______ Owner contacted 0 yes Qnna; if yes, date contacted -------_--___ TYPE OF OPERATION ~~~---~~_-----__- 0 Research & Develapment x Facility Type 0 Production scale testing 0 Pilot Scale 0 Bench Scale Pkoces;s i ,Theoretical Studies Sample & Analysis 0 Manufacturing 0 University 0 Research Drganizaticn 0 Government Sponsored Facility & other &ded-S~AWe-- c

  14. MEIIORANDUM TO: FILE

    Office of Legacy Management (LM)

    MEIIORANDUM TO: FILE FROM: A. &/b~ ----------_----_ SUBJECT: TYPE OF OPERATION ~_~~_--~~_------_ q Research & Development 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis q Facility Type 0 Manufacturing 0 University 0 Research Organization 0 Gavernment Sponsored Faci 1 i ty 0 Other ~~~~~~~-~~--_--___--- 0 Product: on a Disposal/Stiorage TYPE OF CONTRACT ------_----__--_ 0 Prime q Other information (i.e., cost 0 Subcontractor +

  15. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    3 MEMORANDUM TO: FILE FROM: D, h&Z *_ --------------__ SITE NA,,E: -------- CITY: -%+&6!? -------------------------- STATE: CT cr: 13 ------ WNERL_S, Past: -------_____-----_-_____ current: -----------------------~-- Owner contacted q yes q no; if yes, date contacted / TYPE OF OPERATION ----------------- J& Research & Development i \ 0 Production scale testing 0 Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis m Production e9 Facility Type p

  16. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    . 8, +::.-., . MEMORANDUM TO: FILE FROM: A* d&k -------- SUBJECT: SITE NAME: ---------------i--__--____ if yes, date contacted --i---------- TYPE OF OPERATION ~-~_---_-~~~--__- 0 Research & Development 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample & Analysis Cl Productian I3 Disposal /Storage Facility Type/ 0 Research Okganitation 0 Government~Spcnsored Facil$ty 0 Other ~~~~~~~--~-~~-_~~---- TYPE OF CONTRACT ~--_---_-~~----_ 0 Prime 0

  17. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    ' MEMORANDUM TO: FILE SUBJECT: 2 I:, ;,, ct TYPE OF OPERATION ----------------- Research & Development 0 Production scale tssting 0 Pilot Scale 0 Bench Scale Process i Theoretical Studies Sample !5 Analysis 0 -rest Rol.'. 0 Production r 0 Disposal /Storage 805 W.Ils 0 Facility Type TYPE OF CONTRACT -------------__- 0 Prime IJ Subcontract& 0 Purchase Order ' Contract/Purchase Order # 0 Other information (i.e., cost + fixed fee, unit price, time 84 material, qtc) _

  18. MEMORANDUM TO: FILE DATE

    Office of Legacy Management (LM)

    -.. 37qg: MEMORANDUM TO: FILE DATE =b-- FROM: ---L- _------__ u . SUBJECT: SITE ACl= ALTERNATE NAME: -_______-~-----------------NA~E:__( CITY:--~---------_-STATE:-~~ (2 OWNE!sI_SL f Past- L&cl= w ------------------- ----- Current- w buL.r - ------------ ownq cm-ltacted 0 yes @ "no; if yes, data cnntacte TYPE OF OPERATION -------------_~-~ q Research & Development 0 Production %.cale testing 0 Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample 84 Analysis 0 Production

  19. MEMORANDUM TO: FILE DATE-

    Office of Legacy Management (LM)

    MEMORANDUM TO: FILE DATE- SUBJECT:' g 1, .,;,A 5 ti ~I' ow, Y. ; + SITE NAME: CITY: ---@h---f&- -________ STATE: -' -;L- 9kE%;f' 4N; -' . PlrrrGj current: ------------------------ ------------- Owner contacted 0' yes if yes, date contacted TYPE OF OPERATION ---_----------_-- q Research & Development .o Production scale testing a Pilot scale 0 Bench Scale Process 0 Thearetical Studies 0 Sample 84 Analysis IJ Production Cl Disposal/Storage Q Prime 0 Subcontract& 0 Purchase Order 0

  20. MEMORQNDUM TO: FILE

    Office of Legacy Management (LM)

    MEMORQNDUM TO: FILE 7./27/S 7. DATE------------------ M LAU FROt+ ---~--e--------e SITE ALTERNATE NAME: Net b-0 c/i-w, fS ~?L~-----------------N~~E:____---___------------ -----------------+-- CITY:-K_2_EJ=as+ Gz+q s+, pQ~:'&-STATE: cd past:----------------------- Curre"t:-------------------------- Owner contacted 0 yes sno; if yes, date contacted _ TYPE OF OPERATION ~~----_~~~---~~-- B Research & Development 0 'Production scale testing 0 Pilot Scale 0 Bench Scale Process 0

  1. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  2. Vulnerability Analysis of Energy Delivery Control Systems (September 2011)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy Systems (September 2011) Vulnerability Analysis of Energy Delivery Control Systems (September 2011) The Vulnerability Analysis of Energy Delivery Control Systems report, prepared by Idaho National Laboratory, describes the common vulnerabilities on energy sector control systems, and provides recommendations for vendors and owners of those systems to identify and reduce those risks. PDF icon Vulnerability Analysis of Energy Delivery Control Systems (September 2011) More

  3. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  4. U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability

  5. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  6. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  7. T-564: Vulnerabilities in Citrix Licensing administration components

    Broader source: Energy.gov [DOE]

    The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console.

  8. V-116: Google Picasa BMP and TIFF Images Processing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been discovered in Google Picasa, which can be exploited by malicious people to compromise a user's system

  9. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  10. V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 0: IBM Application Manager For Smart Business Multiple Vulnerabilities V-180: IBM Application Manager For Smart Business Multiple Vulnerabilities June 18, 2013 - 12:38am Addthis PROBLEM: IBM Application Manager For Smart Business Multiple Vulnerabilities PLATFORM: IBM Application Manager For Smart Business 1.x ABSTRACT: A security issue and multiple vulnerabilities have been reported in IBM Application Manager For Smart Business REFERENCE LINKS: Security Bulletin

  11. U-186: IBM WebSphere Sensor Events Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have unknown impacts and others can be exploited by malicious people to conduct cross-site scripting attacks.

  12. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  13. Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities

    Broader source: Energy.gov [DOE]

    Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

  14. Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment

    Energy Savers [EERE]

    | Department of Energy Critical Infrastructure Protection Cyber Vulnerability Assessment Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment This document describes a customized process for cyber vulnerability assessment in compliance with the Critical Infrastructure Protection standards adopted by the North American Electric Reliability Corporation in 2006. This guide covers the planning, execution, and reporting process. PDF icon Guide to Critical Infrastructure

  15. COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    COMMON VULNERABILITIES IN CRITICAL INFRASTRUCTURE CONTROL SYSTEMS Jason Stamp, John Dillinger, and William Young Networked Systems Survivability and Assurance Department Jennifer DePoy Information Operations Red Team & Assessments Department Sandia National Laboratories Albuquerque, NM 87185-0785 22 May 2003 (2 nd edition, revised 11 November 2003) Copyright © 2003, Sandia Corporation. All rights reserved. Permission is granted to display, copy, publish, and distribute this document in its

  16. U-187: Adobe Flash Player Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

  17. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Hopper File Systems Hopper has 5 user file systems which provide different degrees of storage, performance and permanence. The table below summarizes these file systems: File System Home Local Scratch Global Scratch Project Environment Variable Definition $HOME $SCRATCH $SCRATCH2 $GSCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the

  18. DOE - Fossil Energy: Introduction Page to E-Filing System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    E-Filing Natural Gas Import & Export Regulation - E-Filing DOE's Natural Gas E-Filing System More Info E-Filing Instructions Go directly to e-Filing Form View Sample e-File...

  19. File:WSR flowchart-introduction.pdf | Open Energy Information

    Open Energy Info (EERE)

    Apps Datasets Community Login | Sign Up Search File Edit History File:WSR flowchart-introduction.pdf Jump to: navigation, search File File history File usage File:WSR...

  20. File:0 - Overall Flow (Solar).pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:0 - Overall Flow (Solar).pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow (Solar).pdf Size of this preview: 463 ...

  1. File:01UTALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    Datasets Community Login | Sign Up Search File Edit History File:01UTALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01UTALandUsePlan...

  2. File:01CAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01CAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01CAALandUsePlanning.pdf Size of this preview: 463 599...

  3. File:01IDALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01IDALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01IDALandUseConsiderations.pdf Size of this preview:...

  4. File:08COCStateTransmissionProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:08COCStateTransmissionProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08COCStateTransm...

  5. File:01MTALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:01MTALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01MTALandUseConsiderations.pdf Size of this preview:...

  6. File:03COCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit History File:03COCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03COCEncroachmentOverview.pdf Size of this preview: 463...

  7. U-162: Drupal Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Multiple Vulnerabilities U-162: Drupal Multiple Vulnerabilities May 4, 2012 - 7:00am Addthis PROBLEM: Drupal Multiple Vulnerabilities PLATFORM: The vulnerabilities are reported in 7.x versions prior to 7.13. ABSTRACT: Several vulnerabilities were reported in Drupal: Denial of Service, Access bypass, and Unvalidated form redirect reference LINKS: Security Advisory: DRUPAL-SA-CORE-2012-002 Bugtraq ID: 53359 Secunia Advisory SA49012 CVE-2012-1588 CVE-2012-1589 CVE-2012-1590 CVE-2012-1591

  8. File:INL-geothermal-mt.pdf | Open Energy Information

    Open Energy Info (EERE)

    current 12:41, 16 December 2010 Thumbnail for version as of 12:41, 16 December 2010 5,100 4,200 (1.99 MB) MapBot (Talk | contribs) Automated upload from NREL's "mapsearch"...

  9. MICROCOMP output file

    Office of Environmental Management (EM)

    O:\END\EPAC300.lc (file 1 of 19) S.L.C. 109TH CONGRESS REPORT " ! HOUSE OF REPRESENTATIVES SENATE 1st Session 109- ENERGY POLICY ACT OF 2005 , 2005.-Ordered to be printed , from the committee of conference, submitted the following CONFERENCE REPORT [To accompany H.R. 6] The committee of conference on the disagreeing votes of the two Houses on the amendment of the Senate to the bill (H.R. 6), to en- sure jobs for our future with secure, affordable, and reliable energy, having met, after full

  10. GlNTRM FILES

    Office of Legacy Management (LM)

    : .; GlNTRM FILES .- Red Rwtaaie!a .=?%A .-m JJullen mtoxges8ntuuo -006 .017 .olb J-m .021 .OLt .Ol2 *Jeta Lhh .029 .0X9 ,026 ~k~exwteethaae~oyeencloee~ttothxflcmrof bUckaide. After the deccxmdnatimpxcblarrrro mlved.the rt8tma dt&itO lo- &ctioacoilrpasdistuEeed. 1. . ,, -. . . ' The conparty visited 3~ciali.z.e~ ja the a.ppLicatica of Znductiw beat. The purpose of this trip wa s to advise on haaBh and safety measures for the preoceeptance testing of inductioo heat treating equipment

  11. HEMORANDUH TO: FILE DATE

    Office of Legacy Management (LM)

    HEMORANDUH TO: FILE DATE 1123 lLjl ---WV-------------- FROM: P. s&w+ -------v-----s-- SUBJECT: lJ+ - e;& SITE NAME: LJo"zL - /L,' de Cd -J--h=- ALTERNATE l --e-e-- ------w------- ---,,,' ,m--, NAME: ---------------------- CITY: LL-pL~ ------------ ------------- STATE3 e--w-- OWNER tS) -----w-- Past I --k-!!.l~ -pa L . -v-----w------- Current: Owner contac?-ed 0 yes 0 no; if yes, I+Lff A zid;&m - -------------------------- date contacted ------B--m--- TYPE OF OPERATION

  12. TO: FILE MEMORANDUM

    Office of Legacy Management (LM)

    FILE MEMORANDUM DATE +zljlk> - - - - ---_ _ _ ALTERNATE NAME: CITY: -!~Lh_-~~~bl--~--------STATE: --%&A --~~~~~~---~~~------__ a OWNE=t (!, ----L--- P a s t i awne~-;Pntacted ?? yes --~~~~~-----_------_______ ; i f y e s , d a t e c o n t a c t e d ----------___ TYPE O& OPERATION -----+--------- & Development cl Facility Type 0 D i spbsal/Storage 0 Ma,nuf acturing 0 U n i v e r s i t y 0 R e s e a r c h O r g a n i z a t i o n / 0 Government 0 O t h e r Sponsored Facility

  13. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    ' a 7 > 3gI, q OH.I-r7.-I (jt' , ""7 MEMORANDUM TO: FILE FROM: ' 'Y OIL&i cz ,,,',, -------we- SUBJECT: SITE NAME: _____ CITY:-AQY&- --------------e----e-- OWNER(S) Owner contacted n yes =urr="t: ----- -Llz2-:---,-- -----___ &,&/4$- '1 :) ' if yes, data contacted ------------- TYPE OF OPERATION ----------------- a Research t Development lti- Facility Type 0 Production scale testing a Manufacturing 5 University 0 Research Organization 0 Government Sponsored

  14. MEMORANDUM TO: FILE

    Office of Legacy Management (LM)

    .f ! I I (' ii MEMORANDUM TO: FILE DATE 5 +/9! ----- ------------- FROM: D. Jxw+ a--------------- SUBJECT: E/;vlr;l~&~- fico -de+& Y&U- c . 6. %qo+y& + 3-r SITE NAME: c- G* ~.&-J&-& 4 fib+< ALTERNATE -------a----- _------------------------ NAME: ---------------------- CITY: &w;-&u; & ----------------------e-w- STATE: /+?# ------ OWNER(S) ---pi;;;- c * c. s&r--&&+ ------------ -- -------- Current: un W&e k Owner contacted 0 yes a no;

  15. MEMORANDUM TO: FILE FROM:

    Office of Legacy Management (LM)

    p' : , .; ' _ ' < 3.518 MEMORANDUM TO: FILE FROM: -Ye L&a --------e---e--- DATE 6j8/8 7 v---s -- ---------- SUBJECT: ;&l a+-b IA T~cornqm Q afib4 SITE NAME: CITY: & &&at leg co Current: ------------------------ Owner contacted 0 yes p no; if yem, date contacted --w---w------ TYPE OF OPERATION The T$SYI L-- Tj flmf ----------------- FResearch & Development a Facility 0 Production scale testing 0 Pilot Scale p Manufacturing 0 Bench Scale Process [3 University 0

  16. MEMORANDUfl J: FILE DATE

    Office of Legacy Management (LM)

    J: FILE DATE // //r /so -----------w------m FROM: 9. 34oyc -w--------v----- SUBJECT: D3 Bo;s CL&;C J mL-;+J; - Rcc cap 049 /'A :j$: &336;s L-.fh~ w-f L-1 ALE"nirTE __ ------------- --- ---_------------------ CITY: &u+M- - &. -w---v------ ---B-------w STATE: 0 h' -a---- OWNER(S) --pi::;- l>cl, b af.5 CA.-*>J CD Current: Gr;W i- ~U~&;P~ -------------,,' ,-,,,,-, Owner contacted 0 yes jg no; -------------------------- if yes, date contacted ------m------ TYPE OF

  17. 1999 CBECS Public Use Files

    U.S. Energy Information Administration (EIA) Indexed Site

    only. Geographic identifiers and National Oceanic and Atmospheric Administration Weather Division identifiers are not included on any data files delivered to EIA. Geographic...

  18. File:CDPHE Industrial Individual Wastewater Discharge Permit...

    Open Energy Info (EERE)

    CDPHE Industrial Individual Wastewater Discharge Permit Application.pdf Jump to: navigation, search File File history File usage Metadata File:CDPHE Industrial Individual...

  19. File:Federal Hydropower - Southwestern Power Administration.pdf...

    Open Energy Info (EERE)

    Federal Hydropower - Southwestern Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Southwestern Power...

  20. File:Federal Hydropower - Western Area Power Administration.pdf...

    Open Energy Info (EERE)

    Hydropower - Western Area Power Administration.pdf Jump to: navigation, search File File history File usage Metadata File:Federal Hydropower - Western Area Power Administration.pdf...

  1. File:Texas Construction General Permit (TXR150000).pdf | Open...

    Open Energy Info (EERE)

    Texas Construction General Permit (TXR150000).pdf Jump to: navigation, search File File history File usage Metadata File:Texas Construction General Permit (TXR150000).pdf Size of...

  2. File:08MTATransmission (3).pdf | Open Energy Information

    Open Energy Info (EERE)

    08MTATransmission (3).pdf Jump to: navigation, search File File history File usage Metadata File:08MTATransmission (3).pdf Size of this preview: 463 599 pixels. Other...

  3. File:(PECC) Special Program on Climate Change SUMMARY (english...

    Open Energy Info (EERE)

    (PECC) Special Program on Climate Change SUMMARY (english).pdf Jump to: navigation, search File File history File usage File:(PECC) Special Program on Climate Change SUMMARY...

  4. OHA Product Efficiency Cases Archive File | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Product Efficiency Cases Archive File OHA Product Efficiency Cases Archive File This is a archive file of our Product Efficiency decisions, Please download this file to your local ...

  5. File:0 - Overall Flow - Transmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    - Overall Flow - Transmission.pdf Jump to: navigation, search File File history File usage Metadata File:0 - Overall Flow - Transmission.pdf Size of this preview: 463 599...

  6. File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf | Open...

    Open Energy Info (EERE)

    FDCPURPAQualifyingFacilityCertificationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07FDCPURPAQualifyingFacilityCertificationProcess.pdf Size...

  7. File:07TXBRECGeneratorCertification.pdf | Open Energy Information

    Open Energy Info (EERE)

    7TXBRECGeneratorCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07TXBRECGeneratorCertification.pdf Size of this preview: 463 599 pixels....

  8. File:04AKBGeophysicalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKBGeophysicalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKBGeophysicalExplorationPermit.pdf Size of this preview: 463 599...

  9. File:07FDBPlantCommissioning.pdf | Open Energy Information

    Open Energy Info (EERE)

    FDBPlantCommissioning.pdf Jump to: navigation, search File File history File usage Metadata File:07FDBPlantCommissioning.pdf Size of this preview: 463 599 pixels. Other...

  10. File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf ...

    Open Energy Info (EERE)

    HIAGeothermalAndCableSystemDevelopmentPermitting.pdf Jump to: navigation, search File File history File usage Metadata File:07HIAGeothermalAndCableSystemDevelopmentPermitting.pdf...

  11. File:ApplicationtoAppropriate.pdf | Open Energy Information

    Open Energy Info (EERE)

    ApplicationtoAppropriate.pdf Jump to: navigation, search File File history File usage File:ApplicationtoAppropriate.pdf Size of this preview: 463 599 pixels. Other resolution:...

  12. File:08CABCaliforniaTransmissionCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    8CABCaliforniaTransmissionCPUCProcess.pdf Jump to: navigation, search File File history File usage File:08CABCaliforniaTransmissionCPUCProcess.pdf Size of this preview: 463 599...

  13. File:AlaskaTitleVApplicationSubmittalInstructions.pdf | Open...

    Open Energy Info (EERE)

    AlaskaTitleVApplicationSubmittalInstructions.pdf Jump to: navigation, search File File history File usage File:AlaskaTitleVApplicationSubmittalInstructions.pdf Size of this...

  14. File:03ORENoncompetitiveGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORENoncompetitiveGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03ORENoncompetitiveGeothermalLease.pdf Size of this preview: 463 599...

  15. File:07CAAPlantCommissioningProcessApplicationForCertification...

    Open Energy Info (EERE)

    7CAAPlantCommissioningProcessApplicationForCertification.pdf Jump to: navigation, search File File history File usage Metadata File:07CAAPlantCommissioningProcessApplicationForCert...

  16. File:08IDAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08IDAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  17. File:03AKCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03AKCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  18. File:06ORATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    ORATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  19. File:06NVATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  20. File:08CAACaliforniaTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    CAACaliforniaTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08CAACaliforniaTransmission.pdf Size of this preview: 463 599 pixels. Other...

  1. File:06AKATransportationOversizeOverweight.pdf | Open Energy...

    Open Energy Info (EERE)

    6AKATransportationOversizeOverweight.pdf Jump to: navigation, search File File history File usage Metadata File:06AKATransportationOversizeOverweight.pdf Size of this preview: 463...

  2. File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    CACCaliforniaEnergyFacilityCPUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07CACCaliforniaEnergyFacilityCPUCProcess.pdf Size of this preview:...

  3. File:03CACEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    CACEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03CACEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  4. File:06FDAEPAConstructionGeneralPermitConstructionStormwater...

    Open Energy Info (EERE)

    06FDAEPAConstructionGeneralPermitConstructionStormwater.pdf Jump to: navigation, search File File history File usage Metadata File:06FDAEPAConstructionGeneralPermitConstructionStor...

  5. File:07ORDExpeditedPlantCommissioningProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    ORDExpeditedPlantCommissioningProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07ORDExpeditedPlantCommissioningProcess.pdf Size of this preview:...

  6. File:03IDCEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDCEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03IDCEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  7. File:03NVCEncroachment (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    NVCEncroachment (1).pdf Jump to: navigation, search File File history File usage Metadata File:03NVCEncroachment (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  8. T-550: Apache Denial of Service Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apache 'APR-util' is prone to a vulnerability that may allow attackers to cause a denial-of-service condition. Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, may allow remote users to cause a Denial of Service (DoS - memory consumption).

  9. Vulnerability Analysis of Energy Delivery Control Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under DOE Idaho Operations Office Contract DE-AC07-05ID14517 The INL is a U.S. Department of Energy National Laboratory operated by Battelle Energy Alliance DISCLAIMER This information was prepared as an account of work sponsored by an agency of the

  10. File:06COBConstructionStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Login | Sign Up Search File Edit History File:06COBConstructionStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06COBConstructio...

  11. Portable File Format (PFF) specifications.

    SciTech Connect (OSTI)

    Dolan, Daniel H.,

    2015-02-01

    Created at Sandia National Laboratories, the Portable File Format (PFF) allows binary data transfer across computer platforms. Although this capability is supported by many other formats, PFF files are still in use at Sandia, particularly in pulsed power research. This report provides detailed PFF specifications for accessing data without relying on legacy code.

  12. Evaluating operating system vulnerability to memory errors.

    SciTech Connect (OSTI)

    Ferreira, Kurt Brian; Bridges, Patrick G.; Pedretti, Kevin Thomas Tauke; Mueller, Frank; Fiala, David; Brightwell, Ronald Brian

    2012-05-01

    Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

  13. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hopper /scratch file system slow Resolved: Hopper /scratch file system slow August 6, 2014 Symptom: Users have reported scripts hung when involving file copies from/to the /scratch file system, or jobs running in /scratch are slower than before since late last week. Workaround: If it is convenient, move your workflow to /scratch2 temporarily, avoid any reference to /scratch. It includes setting your input files directory, your batch job submission directory, your executable file location, and

  14. File Storage and I/O

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File Storage and I/O File Storage and I/O Disk Quota Change Request Form Cori File Systems The Cori system has 3 different user-accessible file systems; they provide different levels of disk storage and I/O performance. The table below describes these systems. File System Home Scratch Project Environment Variable $HOME $SCRATCH None. Must use /project/projectdirs/ Description Global home file system shared with other NERSC systems. All NERSC machines mount the same home directory. GPFS

  15. Social vulnerability indicators as a sustainable planning tool

    SciTech Connect (OSTI)

    Lee, Yung-Jaan

    2014-01-15

    In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

  16. Instructions to CBECS 1995 Microdata Files

    U.S. Energy Information Administration (EIA) Indexed Site

    5 Files WHAT IS CBECS? Please Note: These microdata files, which contain building characteristics, energy consumption and expenditures, and energy end-use estimates replace the...

  17. Resolved: Hopper /scratch file system slow

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    your input files directory, your batch job submission directory, your executable file location, and the TMPDIR setting (which is set to SCRATCH by default). Status: This...

  18. PDF File Information (pbl/help)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Help > Help Power Services Site Map Searching for Text Other Navigation Aids PDF File Info Firstgov PDF File Information Many of the documents available on the Power...

  19. Help:Managing files | Open Energy Information

    Open Energy Info (EERE)

    file." Click "Browse" next to the "Source filename:" to locate the file on your computer (the name of the "browse" button depends on your web browser). Change the...

  20. TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR ASSOCIATED MITIGATIONS This document provides practices that can help mitigate the potential risks that can occur to some electricity sector organizations. Each organization decides for itself the risks it can accept and the practices it deems appropriate to manage those risks. PDF icon TOP 10 VULNERABILITIES OF CONTROL SYSTEMS AND THEIR

  1. Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy System Vulnerabilities to Climate Change and Extreme Weather Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather This U.S. Department of Energy Office of Indian Energy report assesses climate change and extreme weather vulnerabilities specific to tribal energy infrastructure and systems in the contiguous United States and Alaska. It includes information about the impacts from climate change and extreme weather events on both onsite and offsite

  2. U-035: Adobe Flash Player Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    35: Adobe Flash Player Multiple Vulnerabilities U-035: Adobe Flash Player Multiple Vulnerabilities November 14, 2011 - 10:15am Addthis PROBLEM: Adobe Flash Player Multiple Vulnerabilities. PLATFORM: Adobe Flash Player 11.0.1.152 and earlier versions for Windows, Macintosh, Linux and Solaris operating systems Adobe Flash Player 11.0.1.153 and earlier versions for Android Adobe AIR 3.0 and earlier versions for Windows, Macintosh, and Android ABSTRACT: Adobe recommends users of Adobe Flash Player

  3. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  4. V-107: Wireshark Multiple Denial of Service Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).

  5. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  6. V-082: Novell GroupWise Client Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

  7. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    France) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country France Coordinates...

  8. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  9. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Ireland) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Ireland Coordinates...

  10. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    United Kingdom) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country United Kingdom...

  11. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  12. V-161: IBM Maximo Asset Management Products Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Asset and Service Mgmt Products - Potential security exposure when using JavaTM based applications due to vulnerabilities in Java Software Developer Kits.

  13. V-178: IBM Data Studio Web Console Java Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    IBM Data Studio Web Console uses the IBM Java Runtime Environment (JRE) and might be affected by vulnerabilities in the IBM JRE

  14. Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Idaho National Laboratory Idaho Falls, ID 83415 Idaho Falls, ID 83415 Kathy Lee ... vulnerabilities include balancing the risk of system compromise by an intruder with ...

  15. U-172: OpenOffice.org Two Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in OpenOffice.org, which can be exploited by malicious people to compromise a user's system.

  16. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Energy Savers [EERE]

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  17. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    :"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

  20. Storing files in a parallel computing system using list-based index to identify replica files

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Zhang, Zhenhua; Grider, Gary

    2015-07-21

    Improved techniques are provided for storing files in a parallel computing system using a list-based index to identify file replicas. A file and at least one replica of the file are stored in one or more storage nodes of the parallel computing system. An index for the file comprises at least one list comprising a pointer to a storage location of the file and a storage location of the at least one replica of the file. The file comprises one or more of a complete file and one or more sub-files. The index may also comprise a checksum value for one or more of the file and the replica(s) of the file. The checksum value can be evaluated to validate the file and/or the file replica(s). A query can be processed using the list.

  1. MODELING UNDERGROUND STRUCTURE VULNERABILITY IN JOINTED ROCK

    SciTech Connect (OSTI)

    R. SWIFT; D. STEEDMAN

    2001-02-01

    The vulnerability of underground structures and openings in deep jointed rock to ground shock attack is of chief concern to military planning and security. Damage and/or loss of stability to a structure in jointed rock, often manifested as brittle failure and accompanied with block movement, can depend significantly on jointed properties, such as spacing, orientation, strength, and block character. We apply a hybrid Discrete Element Method combined with the Smooth Particle Hydrodynamics approach to simulate the MIGHTY NORTH event, a definitive high-explosive test performed on an aluminum lined cylindrical opening in jointed Salem limestone. Representing limestone with discrete elements having elastic-equivalence and explicit brittle tensile behavior and the liner as an elastic-plastic continuum provides good agreement with the experiment and damage obtained with finite-element simulations. Extending the approach to parameter variations shows damage is substantially altered by differences in joint geometry and liner properties.

  2. File:NREL-brazil-glo.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-brazil-glo.pdf Jump to: navigation, search File File history File usage Brazil - Annual Global Horizontal Solar Radiation Size of this...

  3. File:NREL-bhutan-wind.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-bhutan-wind.pdf Jump to: navigation, search File File history File usage Bhutan - 50m Wind Power Size of this preview: 776 600 pixels. Full...

  4. File:NREL-BioMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    File Edit with form History File:NREL-BioMap.pdf Jump to: navigation, search File File history File usage Biomass Power Potential (GW) on Federal Lands by County Size of this...

  5. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    46: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service

  6. Reading File Bonneville Power Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reading File Bonneville Power Administration P.O. Box 3621 Portland, Oregon 97208-3621 POWER SERVICES In reply refer to: PG-5 Ms. Renata Kurschner Director, Generation Resource...

  7. A File System Utilization Metric

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in order to ensure resources are adequately provisioned. Although it is relatively straightforward to- day to measure the total amount of IO to and from a file system, and the...

  8. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  9. Important Filing Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Important Filing Information Important Filing Information Filing Information The Office of Hearings and Appeals (OHA) encourages electronic filing of submissions, by e-mail or by telefax. OHA's e-mail address for filing submissions is OHA.filings@hq.doe.gov; the OHA telefax number is (202) 287-1415. Note, however, that because of signature issues, we may ask you to file a signed original of a document. We will send an acknowledgment (by letter or e-mail) upon our receipt of all principal

  10. U-022: Apple QuickTime Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  11. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. Vulnerability Assessment for Cascading Failures in Electric Power Systems

    SciTech Connect (OSTI)

    Baldick, R.; Chowdhury, Badrul; Dobson, Ian; Dong, Zhao Yang; Gou, Bei; Hawkins, David L.; Huang, Zhenyu; Joung, Manho; Kim, Janghoon; Kirschen, Daniel; Lee, Stephen; Li, Fangxing; Li, Juan; Li, Zuyi; Liu, Chen-Ching; Luo, Xiaochuan; Mili, Lamine; Miller, Stephen; Nakayama, Marvin; Papic, Milorad; Podmore, Robin; Rossmaier, John; Schneider, Kevin P.; Sun, Hongbin; Sun, Kai; Wang, David; Wu, Zhigang; Yao, Liangzhong; Zhang, Pei; Zhang, Wenjie; Zhang, Xiaoping

    2008-09-10

    Cascading failures present severe threats to power grid security, and thus vulnerability assessment of power grids is of significant importance. Focusing on analytic methods, this paper reviews the state of the art of vulnerability assessment methods in the context of cascading failures in three categories: steady-state modeling based analysis; dynamic modeling analysis; and non-traditional modeling approaches. The impact of emerging technologies including phasor technology, high-performance computing techniques, and visualization techniques on the vulnerability assessment of cascading failures is then addressed, and future research directions are presented.

  13. Automated Vulnerability Detection for Compiled Smart Grid Software

    SciTech Connect (OSTI)

    Prowell, Stacy J; Pleszkoch, Mark G; Sayre, Kirk D; Linger, Richard C

    2012-01-01

    While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

  14. V-094: IBM Multiple Products Multiple Vulnerabilities | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 94: IBM Multiple Products Multiple Vulnerabilities V-094: IBM Multiple Products Multiple Vulnerabilities February 19, 2013 - 1:41am Addthis PROBLEM: IBM Multiple Products Multiple Vulnerabilities PLATFORM: IBM Maximo Asset Management versions 7.5, 7.1, and 6.2 IBM Maximo Asset Management Essentials versions 7.5, 7.1, and 6.2 IBM SmartCloud Control Desk version 7.5 IBM Tivoli Asset Management for IT versions 7.2, 7.1, and 6.2 IBM Tivoli Change and Configuration Management Database

  15. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    | Department of Energy 14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis PROBLEM: Cisco Unified Communications Manager contains a vulnerability that could allow an authenticated, remote attacker to inject arbitrary script code on a targeted system. PLATFORM: Cisco Unified Communications Manager versions prior to 8.5(1), 8.0(3), 7.1(5)su1, and 6.1(5)su2 are

  16. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect (OSTI)

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  17. File:SWERA-247.pdf | Open Energy Information

    Open Energy Info (EERE)

    navigation, search File File history File usage Solar: monthly global horizontal (GHI) GIS data at 40km resolution for Bangladesh from NREL Size of this preview: 776 600...

  18. File:INL-geothermal-ca.pdf | Open Energy Information

    Open Energy Info (EERE)

    ca.pdf Jump to: navigation, search File File history File usage California Geothermal Resources Size of this preview: 439 599 pixels. Other resolution: 439 600 pixels. Full...

  19. File:BrazilTMYst 238.pdf | Open Energy Information

    Open Energy Info (EERE)

    238.pdf Jump to: navigation, search File File history File usage Meteorology: map of Brazil selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  20. File:NREL-brazil-dir.pdf | Open Energy Information

    Open Energy Info (EERE)

    brazil-dir.pdf Jump to: navigation, search File File history File usage Brazil - Annual Direct Normal Solar Radiation Size of this preview: 776 600 pixels. Full resolution...

  1. File:EIA-conventional-gas.pdf | Open Energy Information

    Open Energy Info (EERE)

    conventional-gas.pdf Jump to: navigation, search File File history File usage Natural Gas Production in Conventional Fields, Lower 48 States Size of this preview: 776 600...

  2. File:Fut oilp 03.pdf | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search File File history File usage Future Oil Resources and Country Oil Consumption (September 2005) Size of this preview: 800 585 pixels. Full resolution...

  3. File:PoliticsofFracking.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Politicso...

  4. File:PerspectiveHealthNatGas.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:Perspecti...

  5. File:FrackingFacts.pdf | Open Energy Information

    Open Energy Info (EERE)

    instructions for more information) File usage The following page links to this file: Hydraulic Fracturing Retrieved from "http:en.openei.orgwindex.php?titleFile:FrackingF...

  6. File:Cubametst 59.pdf | Open Energy Information

    Open Energy Info (EERE)

    59.pdf Jump to: navigation, search File File history File usage Meteorology: map of Cuba selected meteorological stations and elevation from NREL Size of this preview: 776 ...

  7. File:INL-geothermal-west-usa.pdf | Open Energy Information

    Open Energy Info (EERE)

    INL-geothermal-west-usa.pdf Jump to: navigation, search File File history File usage Western United States Geothermal Resources Size of this preview: 653 599 pixels. Other...

  8. File:Breakout Session Groups.pdf | Open Energy Information

    Open Energy Info (EERE)

    information) File usage The following page links to this file: Energy Data InitiativeResources Retrieved from "http:en.openei.orgwindex.php?titleFile:BreakoutSessionGro...

  9. Climate Change and the U.S. Energy Sector: Regional Vulnerabilities...

    Energy Savers [EERE]

    Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions Climate Change and the U.S. Energy Sector: Regional Vulnerabilities and Resilience Solutions ...

  10. T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system.

  11. U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities

    Broader source: Energy.gov [DOE]

    Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

  12. T-625: Opera Frameset Handling Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when handling certain frameset constructs during page unloading and can be exploited to corrupt memory via a specially crafted web page.

  13. Mapping Climate Change Vulnerability and Impact Scenarios - A...

    Open Energy Info (EERE)

    guidebook assists planners working at the sub-national levels to identify and map the nature of current and future vulnerability to long-term climate change so that appropriate...

  14. V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

  15. V-173: Plesk 0-Day Vulnerability | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    versions 8.6, 9.0, 9.2, 9.3, and 9.5.4 ABSTRACT: The vulnerability is caused due to PHP misconfiguration in the affected application REFERENCE LINKS: Seclist.org TrendMicro...

  16. T-542: SAP Crystal Reports Server Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities in SAP Crystal Reports Server 2008, which can be exploited by malicious users to disclose potentially sensitive information and by malicious people to conduct cross-site scripting attacks, manipulate certain data, and compromise a user's system.

  17. V-118: IBM Lotus Domino Multiple Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to version 9.0 or update to version 8.5.3 Fix Pack 4 when available Addthis Related Articles T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service...

  18. Potential Vulnerability of US Petroleum Refineries to Increasing Water

    Energy Savers [EERE]

    Temperature and/or Reduced Water Availability | Department of Energy Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability Potential Vulnerability of US Petroleum Refineries to Increasing Water Temperature and/or Reduced Water Availability This report discusses potential impacts of increased water temperature and reductions in water availability on petroleum refining and presents case studies related to refinery water use. Report

  19. Common Cyber Security Vulnerabilities Observed in Control System

    Energy Savers [EERE]

    Assessments by the INL NSTB Program | Department of Energy Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program This document presents results from 16 control system assessments performed under the NSTB program from 2003 through 2007. Information found in individual stakeholder reports is protected from disclosure. Researchers recognized that

  20. Mitigations for Security Vulnerabilities Found in Control System Networks |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mitigations for Security Vulnerabilities Found in Control System Networks Mitigations for Security Vulnerabilities Found in Control System Networks Industry is aware of the need for Control System (CS) security, but in on-site assessments, Idaho National Laboratory (INL) has observed that security procedures and devices are not consistently and effectively implemented. The Department of Homeland Security (DHS), National Cyber Security Division (NCSD), established the

  1. T-596: 0-Day Windows Network Interception Configuration Vulnerability |

    Energy Savers [EERE]

    Department of Energy 96: 0-Day Windows Network Interception Configuration Vulnerability T-596: 0-Day Windows Network Interception Configuration Vulnerability April 6, 2011 - 5:48am Addthis PROBLEM: 0-Day exploit of IPv4 and IPv6 mechanics and how it applies to Microsoft Windows Operating systems. PLATFORM: Microsoft Operating Systems (OS) Windows Vista, Windows 7, and Windows 2008 Server ABSTRACT: The links below describe a parasitic IPv6 layered over a native IPv4 network. This attack can

  2. U.S. Energy Sector Vulnerability Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Energy Sector Vulnerability Report U.S. Energy Sector Vulnerability Report As part of the Administration's efforts to support climate change preparedness and resilience planning -- and to advance the Energy Department's goal of promoting energy security -- the Department is assessing the threats of climate change and extreme weather to the Nation' energy system. Two reports have been released that examine the current and potential future impacts of climate change and extreme weather on the

  3. Property:File/Author | Open Energy Information

    Open Energy Info (EERE)

    Author Jump to: navigation, search Property Name FileAuthor Property Type String Description Individual that created the original file. Note that this will often not be the same...

  4. EPA to Require Electronic Filing of EISs

    Broader source: Energy.gov [DOE]

    Starting October 1, 2012, all Federal agencies must file their draft and final EISs electronically, pursuant to amended EIS Filing System Guidelines issued by the Environmental Protection Agency (EPA) (77 FR 51530; August 24, 2012).

  5. File:INL-geothermal-hi.pdf | Open Energy Information

    Open Energy Info (EERE)

    hi.pdf Jump to: navigation, search File File history File usage Hawaii Geothermal Resources Size of this preview: 748 600 pixels. Full resolution (4,566 3,660 pixels, file...

  6. File:HI well abandonment.pdf | Open Energy Information

    Open Energy Info (EERE)

    HI well abandonment.pdf Jump to: navigation, search File File history File usage File:HI well abandonment.pdf Size of this preview: 364 600 pixels. Full resolution (1,275 ...

  7. File:Invitation-English (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    Invitation-English (2).pdf Jump to: navigation, search File File history File usage File:Invitation-English (2).pdf Size of this preview: 321 598 pixels. Other resolution: 322...

  8. File:Application procedures.pdf | Open Energy Information

    Open Energy Info (EERE)

    Application procedures.pdf Jump to: navigation, search File File history File usage File:Application procedures.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  9. File:(131112) Presentacion LAC LEDs.pdf | Open Energy Information

    Open Energy Info (EERE)

    (131112) Presentacion LAC LEDs.pdf Jump to: navigation, search File File history File usage File:(131112) Presentacion LAC LEDs.pdf Size of this preview: 800 600 pixels. Go to...

  10. File:0 - OverallFlow-1.pdf | Open Energy Information

    Open Energy Info (EERE)

    OverallFlow-1.pdf Jump to: navigation, search File File history File usage Metadata File:0 - OverallFlow-1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  11. File:Wind-turbine-economics-student.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-student.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-student.pdf Size of this preview: 463 599...

  12. File:Wind-turbine-economics-teacher.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-teacher.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-teacher.pdf Size of this preview: 463 599...

  13. File:Wind-turbine-economics-lp.pdf | Open Energy Information

    Open Energy Info (EERE)

    Wind-turbine-economics-lp.pdf Jump to: navigation, search File File history File usage Metadata File:Wind-turbine-economics-lp.pdf Size of this preview: 463 599 pixels. Other...

  14. File:DOD DOI MOU.pdf | Open Energy Information

    Open Energy Info (EERE)

    DOD DOI MOU.pdf Jump to: navigation, search File File history File usage File:DOD DOI MOU.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  15. File:DIA Visual Development.pdf | Open Energy Information

    Open Energy Info (EERE)

    DIA Visual Development.pdf Jump to: navigation, search File File history File usage File:DIA Visual Development.pdf Size of this preview: 800 600 pixels. Go to page 1 2 3 4 5 6...

  16. File:Title V Checklist.pdf | Open Energy Information

    Open Energy Info (EERE)

    Title V Checklist.pdf Jump to: navigation, search File File history File usage File:Title V Checklist.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  17. File:Air Density Lab.pdf | Open Energy Information

    Open Energy Info (EERE)

    Air Density Lab.pdf Jump to: navigation, search File File history File usage Metadata File:Air Density Lab.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  18. File:4003-3 (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4003-3 (1).pdf Jump to: navigation, search File File history File usage File:4003-3 (1).pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full...

  19. File:3-200-71.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-71.pdf Jump to: navigation, search File File history File usage File:3-200-71.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  20. File:3-200-43.pdf | Open Energy Information

    Open Energy Info (EERE)

    3-200-43.pdf Jump to: navigation, search File File history File usage File:3-200-43.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  1. File:05NVBSundryNotice (2).pdf | Open Energy Information

    Open Energy Info (EERE)

    5NVBSundryNotice (2).pdf Jump to: navigation, search File File history File usage Metadata File:05NVBSundryNotice (2).pdf Size of this preview: 463 599 pixels. Other resolution:...

  2. File:DEQ Circular 2.pdf | Open Energy Information

    Open Energy Info (EERE)

    DEQ Circular 2.pdf Jump to: navigation, search File File history File usage File:DEQ Circular 2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  3. File:Sw swppp guide.pdf | Open Energy Information

    Open Energy Info (EERE)

    Sw swppp guide.pdf Jump to: navigation, search File File history File usage File:Sw swppp guide.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  4. File:07HICCertificationOfPublicConvenienceAndNecessity.pdf |...

    Open Energy Info (EERE)

    7HICCertificationOfPublicConvenienceAndNecessity.pdf Jump to: navigation, search File File history File usage Metadata File:07HICCertificationOfPublicConvenienceAndNecessity.pdf...

  5. File:03IDDIndustrialLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    03IDDIndustrialLease.pdf Jump to: navigation, search File File history File usage File:03IDDIndustrialLease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  6. File:07NVCStatePUCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    07NVCStatePUCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:07NVCStatePUCProcess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  7. File:OperatingPermitCheckList.pdf | Open Energy Information

    Open Energy Info (EERE)

    OperatingPermitCheckList.pdf Jump to: navigation, search File File history File usage File:OperatingPermitCheckList.pdf Size of this preview: 463 599 pixels. Other resolution:...

  8. File:04IDAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04IDAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  9. File:01AKALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1AKALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01AKALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  10. File:04UTAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    04UTAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04UTAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  11. File:09FDDBLMAppealsProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    9FDDBLMAppealsProcess.pdf Jump to: navigation, search File File history File usage Metadata File:09FDDBLMAppealsProcess.pdf Size of this preview: 463 599 pixels. Other...

  12. File:04TXAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4TXAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04TXAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  13. File:CaveProtectionLaw.pdf | Open Energy Information

    Open Energy Info (EERE)

    CaveProtectionLaw.pdf Jump to: navigation, search File File history File usage Metadata File:CaveProtectionLaw.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  14. File:03IDFLandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3IDFLandUsePermit.pdf Jump to: navigation, search File File history File usage File:03IDFLandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  15. File:Salt2.pdf | Open Energy Information

    Open Energy Info (EERE)

    Salt2.pdf Jump to: navigation, search File File history File usage Metadata File:Salt2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page...

  16. File:UtilityPermitFranchiseApp.pdf | Open Energy Information

    Open Energy Info (EERE)

    UtilityPermitFranchiseApp.pdf Jump to: navigation, search File File history File usage Metadata File:UtilityPermitFranchiseApp.pdf Size of this preview: 463 599 pixels. Other...

  17. File:2008Guidelines.pdf | Open Energy Information

    Open Energy Info (EERE)

    2008Guidelines.pdf Jump to: navigation, search File File history File usage File:2008Guidelines.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go...

  18. File:AEO2012earlyrelease.pdf | Open Energy Information

    Open Energy Info (EERE)

    AEO2012earlyrelease.pdf Jump to: navigation, search File File history File usage File:AEO2012earlyrelease.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  19. File:08TXATransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    08TXATransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08TXATransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  20. File:04AKCGeothermalExplorationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKCGeothermalExplorationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:04AKCGeothermalExplorationPermit.pdf Size of this preview: 463 599...

  1. File:Notify98.pdf | Open Energy Information

    Open Energy Info (EERE)

    Notify98.pdf Jump to: navigation, search File File history File usage File:Notify98.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  2. File:06IDCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6IDCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  3. File:03UTCStateEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCStateEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03UTCStateEncroachmentOverview.pdf Size of this preview: 463 599 pixels....

  4. File:01HIALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    01HIALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01HIALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  5. File:05AKADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05AKADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  6. File:0708pmtgpres.pdf | Open Energy Information

    Open Energy Info (EERE)

    0708pmtgpres.pdf Jump to: navigation, search File File history File usage File:0708pmtgpres.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to...

  7. File:01ORALandUseConsiderations.pdf | Open Energy Information

    Open Energy Info (EERE)

    1ORALandUseConsiderations.pdf Jump to: navigation, search File File history File usage Metadata File:01ORALandUseConsiderations.pdf Size of this preview: 463 599 pixels. Other...

  8. File:03TXBLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXBLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03TXBLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  9. File:03UTBStateEasementProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    03UTBStateEasementProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03UTBStateEasementProcess.pdf Size of this preview: 463 599 pixels. Other...

  10. File:FormA1.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA1.pdf Jump to: navigation, search File File history File usage File:FormA1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  11. File:Div15.pdf | Open Energy Information

    Open Energy Info (EERE)

    Div15.pdf Jump to: navigation, search File File history File usage File:Div15.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3 4 5...

  12. File:03MTCEncroachmentOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    03MTCEncroachmentOverview.pdf Jump to: navigation, search File File history File usage Metadata File:03MTCEncroachmentOverview.pdf Size of this preview: 463 599 pixels. Other...

  13. File:03AKELandUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3AKELandUsePermit.pdf Jump to: navigation, search File File history File usage Metadata File:03AKELandUsePermit.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  14. File:06HICDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6HICDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06HICDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  15. File:OilSands.pdf | Open Energy Information

    Open Energy Info (EERE)

    OilSands.pdf Jump to: navigation, search File File history File usage File:OilSands.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  16. File:FormA2.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA2.pdf Jump to: navigation, search File File history File usage File:FormA2.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  17. File:06UTATransportation.pdf | Open Energy Information

    Open Energy Info (EERE)

    6UTATransportation.pdf Jump to: navigation, search File File history File usage Metadata File:06UTATransportation.pdf Size of this preview: 463 599 pixels. Other resolution: 464...

  18. File:09IDAStateEnvironmentalProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDAStateEnvironmentalProcess.pdf Jump to: navigation, search File File history File usage File:09IDAStateEnvironmentalProcess.pdf Size of this preview: 463 599 pixels. Other...

  19. File:08HIABulkTransmissionSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    HIABulkTransmissionSiting.pdf Jump to: navigation, search File File history File usage Metadata File:08HIABulkTransmissionSiting.pdf Size of this preview: 463 599 pixels. Other...

  20. File:08CADPermitToConstruct.pdf | Open Energy Information

    Open Energy Info (EERE)

    CADPermitToConstruct.pdf Jump to: navigation, search File File history File usage Metadata File:08CADPermitToConstruct.pdf Size of this preview: 463 599 pixels. Other...

  1. File:FormA3.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA3.pdf Jump to: navigation, search File File history File usage File:FormA3.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Full resolution...

  2. File:VallesGeothermalAreasMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesGeothermalAreasMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesGeothermalAreasMap.pdf Size of this preview: 593 599 pixels. Other...

  3. File:08NVATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8NVATransmission.pdf Jump to: navigation, search File File history File usage File:08NVATransmission.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  4. File:FormA4.pdf | Open Energy Information

    Open Energy Info (EERE)

    FormA4.pdf Jump to: navigation, search File File history File usage File:FormA4.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  5. File:05IDADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    5IDADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05IDADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  6. File:03UTFEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3UTFEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03UTFEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  7. File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf | Open...

    Open Energy Info (EERE)

    3AKDStateNoncompetitiveMineralLeasingProcess.pdf Jump to: navigation, search File File history File usage Metadata File:03AKDStateNoncompetitiveMineralLeasingProcess.pdf Size of...

  8. File:VallesLocationMap.pdf | Open Energy Information

    Open Energy Info (EERE)

    VallesLocationMap.pdf Jump to: navigation, search File File history File usage Metadata File:VallesLocationMap.pdf Size of this preview: 800 479 pixels. Full resolution (934...

  9. File:06UTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06UTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  10. File:App easement pdf.pdf | Open Energy Information

    Open Energy Info (EERE)

    App easement pdf.pdf Jump to: navigation, search File File history File usage File:App easement pdf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  11. File:471503p.pdf | Open Energy Information

    Open Energy Info (EERE)

    471503p.pdf Jump to: navigation, search File File history File usage File:471503p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  12. File:EnergyResourcePermittingNV.pdf | Open Energy Information

    Open Energy Info (EERE)

    EnergyResourcePermittingNV.pdf Jump to: navigation, search File File history File usage File:EnergyResourcePermittingNV.pdf Size of this preview: 463 599 pixels. Other...

  13. File:LulApplicationForm.pdf | Open Energy Information

    Open Energy Info (EERE)

    LulApplicationForm.pdf Jump to: navigation, search File File history File usage File:LulApplicationForm.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  14. File:08COAStateTransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8COAStateTransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08COAStateTransmission.pdf Size of this preview: 463 599 pixels. Other...

  15. File:303003p.pdf | Open Energy Information

    Open Energy Info (EERE)

    303003p.pdf Jump to: navigation, search File File history File usage File:303003p.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2 3...

  16. File:03HICEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3HICEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03HICEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  17. File:01WAALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1WAALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01WAALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  18. File:04FDBExplorationPreApplicationProcess.pdf | Open Energy...

    Open Energy Info (EERE)

    FDBExplorationPreApplicationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04FDBExplorationPreApplicationProcess.pdf Size of this preview: 463...

  19. File:01TXALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1TXALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01TXALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  20. File:06MTCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6MTCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06MTCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  1. File:1985facilitysitingguide.pdf | Open Energy Information

    Open Energy Info (EERE)

    1985facilitysitingguide.pdf Jump to: navigation, search File File history File usage File:1985facilitysitingguide.pdf Size of this preview: 389 600 pixels. Go to page 1 2 3 4 5...

  2. File:06HIDOtherOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    06HIDOtherOverview.pdf Jump to: navigation, search File File history File usage File:06HIDOtherOverview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  3. File:03FDBTribalLandLeasing.pdf | Open Energy Information

    Open Energy Info (EERE)

    03FDBTribalLandLeasing.pdf Jump to: navigation, search File File history File usage Metadata File:03FDBTribalLandLeasing.pdf Size of this preview: 463 599 pixels. Other...

  4. File:1200Capplicationf.pdf | Open Energy Information

    Open Energy Info (EERE)

    200Capplicationf.pdf Jump to: navigation, search File File history File usage File:1200Capplicationf.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600...

  5. File:WindP.pdf | Open Energy Information

    Open Energy Info (EERE)

    WindP.pdf Jump to: navigation, search File File history File usage Metadata File:WindP.pdf Size of this preview: 466 599 pixels. Other resolution: 467 600 pixels. Go to page...

  6. File:04AKAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4AKAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04AKAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  7. File:03NVBStateLandAccess.pdf | Open Energy Information

    Open Energy Info (EERE)

    NVBStateLandAccess.pdf Jump to: navigation, search File File history File usage Metadata File:03NVBStateLandAccess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  8. File:08FDCNIETCProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    08FDCNIETCProcess.pdf Jump to: navigation, search File File history File usage Metadata File:08FDCNIETCProcess.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  9. File:06CAATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6CAATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06CAATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  10. File:06NVCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6NVCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06NVCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  11. File:06AKCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    AKCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06AKCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  12. File:06IDATransportationPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    06IDATransportationPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDATransportationPermit.pdf Size of this preview: 463 599 pixels. Other...

  13. File:03MTEEncroachmentPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    3MTEEncroachmentPermit.pdf Jump to: navigation, search File File history File usage Metadata File:03MTEEncroachmentPermit.pdf Size of this preview: 463 599 pixels. Other...

  14. File:09HIBHawaiiEAProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    09HIBHawaiiEAProcess.pdf Jump to: navigation, search File File history File usage Metadata File:09HIBHawaiiEAProcess.pdf Size of this preview: 463 599 pixels. Other resolution:...

  15. File:03IDGTermEasement.pdf | Open Energy Information

    Open Energy Info (EERE)

    3IDGTermEasement.pdf Jump to: navigation, search File File history File usage Metadata File:03IDGTermEasement.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  16. File:05DrillingPermittingOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    5DrillingPermittingOverview.pdf Jump to: navigation, search File File history File usage Metadata File:05DrillingPermittingOverview.pdf Size of this preview: 463 599 pixels....

  17. File:03FDAFederalLandLeasing.pdf | Open Energy Information

    Open Energy Info (EERE)

    03FDAFederalLandLeasing.pdf Jump to: navigation, search File File history File usage Metadata File:03FDAFederalLandLeasing.pdf Size of this preview: 463 599 pixels. Other...

  18. File:03TXAStateGeothermalLease.pdf | Open Energy Information

    Open Energy Info (EERE)

    TXAStateGeothermalLease.pdf Jump to: navigation, search File File history File usage Metadata File:03TXAStateGeothermalLease.pdf Size of this preview: 463 599 pixels. Other...

  19. File:04FDAExplorationApplication.pdf | Open Energy Information

    Open Energy Info (EERE)

    4FDAExplorationApplication.pdf Jump to: navigation, search File File history File usage Metadata File:04FDAExplorationApplication.pdf Size of this preview: 463 599 pixels. Other...

  20. File:06UTBStormWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    UTBStormWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06UTBStormWaterPermit.pdf Size of this preview: 463 599 pixels. Other resolution:...

  1. File:01ORALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    1ORALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01ORALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  2. File:08AKATransmission.pdf | Open Energy Information

    Open Energy Info (EERE)

    8AKATransmission.pdf Jump to: navigation, search File File history File usage Metadata File:08AKATransmission.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  3. File:01LandUseOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    1LandUseOverview.pdf Jump to: navigation, search File File history File usage Metadata File:01LandUseOverview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  4. File:UtahEnergyForumSiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    UtahEnergyForumSiting.pdf Jump to: navigation, search File File history File usage File:UtahEnergyForumSiting.pdf Size of this preview: 800 600 pixels. Go to page 1 2 3 4 5 6 7...

  5. File:05NVADrillingWellDevelopment.pdf | Open Energy Information

    Open Energy Info (EERE)

    05NVADrillingWellDevelopment.pdf Jump to: navigation, search File File history File usage Metadata File:05NVADrillingWellDevelopment.pdf Size of this preview: 463 599 pixels....

  6. File:01NMALandUsePlanning.pdf | Open Energy Information

    Open Energy Info (EERE)

    01NMALandUsePlanning.pdf Jump to: navigation, search File File history File usage Metadata File:01NMALandUsePlanning.pdf Size of this preview: 463 599 pixels. Other resolution:...

  7. File:03IDELicenseAgreement.pdf | Open Energy Information

    Open Energy Info (EERE)

    IDELicenseAgreement.pdf Jump to: navigation, search File File history File usage File:03IDELicenseAgreement.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  8. File:04COAStateExplorationProcess.pdf | Open Energy Information

    Open Energy Info (EERE)

    4COAStateExplorationProcess.pdf Jump to: navigation, search File File history File usage Metadata File:04COAStateExplorationProcess.pdf Size of this preview: 463 599 pixels....

  9. File:06ORCDrinkingWaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    06ORCDrinkingWaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06ORCDrinkingWaterPermit.pdf Size of this preview: 463 599 pixels. Other...

  10. File:08HIATransmissionLineApproval.pdf | Open Energy Information

    Open Energy Info (EERE)

    8HIATransmissionLineApproval.pdf Jump to: navigation, search File File history File usage Metadata File:08HIATransmissionLineApproval.pdf Size of this preview: 463 599 pixels....

  11. File:06IDBConstructionStormwaterPermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    6IDBConstructionStormwaterPermit.pdf Jump to: navigation, search File File history File usage Metadata File:06IDBConstructionStormwaterPermit.pdf Size of this preview: 463 599...

  12. File:04CAAExploration.pdf | Open Energy Information

    Open Energy Info (EERE)

    4CAAExploration.pdf Jump to: navigation, search File File history File usage Metadata File:04CAAExploration.pdf Size of this preview: 463 599 pixels. Other resolution: 464 ...

  13. File:ExpeditedReview.pdf | Open Energy Information

    Open Energy Info (EERE)

    ExpeditedReview.pdf Jump to: navigation, search File File history File usage File:ExpeditedReview.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels....

  14. File:Ca1.pdf | Open Energy Information

    Open Energy Info (EERE)

    Ca1.pdf Jump to: navigation, search File File history File usage Metadata File:Ca1.pdf Size of this preview: 463 599 pixels. Other resolution: 464 600 pixels. Go to page 1 2...

  15. File:07TXAEnergyFacilitySiting.pdf | Open Energy Information

    Open Energy Info (EERE)

    07TXAEnergyFacilitySiting.pdf Jump to: navigation, search File File history File usage Metadata File:07TXAEnergyFacilitySiting.pdf Size of this preview: 463 599 pixels. Other...

  16. File:03COAGeothermalLease (5).pdf | Open Energy Information

    Open Energy Info (EERE)

    3COAGeothermalLease (5).pdf Jump to: navigation, search File File history File usage Metadata File:03COAGeothermalLease (5).pdf Size of this preview: 463 599 pixels. Other...

  17. File:09HICHawaiiEISProcess (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    09HICHawaiiEISProcess (1).pdf Jump to: navigation, search File File history File usage File:09HICHawaiiEISProcess (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  18. File:04HIAExplorationPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    4HIAExplorationPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:04HIAExplorationPermit (1).pdf Size of this preview: 463 599 pixels. Other...

  19. File:03CODAccessPermit (1).pdf | Open Energy Information

    Open Energy Info (EERE)

    3CODAccessPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:03CODAccessPermit (1).pdf Size of this preview: 463 599 pixels. Other resolution:...

  20. A Metadata-Rich File System

    SciTech Connect (OSTI)

    Ames, S; Gokhale, M B; Maltzahn, C

    2009-01-07

    Despite continual improvements in the performance and reliability of large scale file systems, the management of file system metadata has changed little in the past decade. The mismatch between the size and complexity of large scale data stores and their ability to organize and query their metadata has led to a de facto standard in which raw data is stored in traditional file systems, while related, application-specific metadata is stored in relational databases. This separation of data and metadata requires considerable effort to maintain consistency and can result in complex, slow, and inflexible system operation. To address these problems, we have developed the Quasar File System (QFS), a metadata-rich file system in which files, metadata, and file relationships are all first class objects. In contrast to hierarchical file systems and relational databases, QFS defines a graph data model composed of files and their relationships. QFS includes Quasar, an XPATH-extended query language for searching the file system. Results from our QFS prototype show the effectiveness of this approach. Compared to the defacto standard, the QFS prototype shows superior ingest performance and comparable query performance on user metadata-intensive operations and superior performance on normal file metadata operations.

  1. Climate variability and climate change vulnerability and adaptation. Workshop summary

    SciTech Connect (OSTI)

    Bhatti, N.; Cirillo, R.R.; Dixon, R.K.

    1995-12-31

    Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

  2. U-042: Mac RealPlayer Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    42: Mac RealPlayer Multiple Vulnerabilities U-042: Mac RealPlayer Multiple Vulnerabilities November 21, 2011 - 9:15am Addthis PROBLEM: Mac RealPlayer Multiple Vulnerabilities. PLATFORM: Versions 12.0.0.1701 and prior. ABSTRACT: Multiple vulnerabilities have been reported in Mac RealPlayer, which can be exploited by malicious people to compromise a user's system. reference LINKS: Secunia Advisory: SA46963 Secunia Vulnerability Report: Mac RealPlayer 12.x Secunia Advisory: SA46954 IMPACT

  3. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 9: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities April 17, 2012 - 8:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM: Apache OFBiz 10.x ABSTRACT: The vulnerabilities are reported in version 10.04.01. Prior

  4. Index of /radsafe/files

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    radsafe/files [ICO] Name Last modified Size Description [DIR] Parent Directory - [TXT] Today.txt 12-Mar-2016 00:00 565 [ ] directions for the radiation detector.doc 23-Jul-1999 00:13 38K [DIR] groundloop/ 12-Mar-2016 00:13 - [DIR] logs/ 12-Mar-2016 00:13 - [ ] test.eps 16-Nov-2010 08:28 25K

  5. BEM~RANDu~~ TO: FILE

    Office of Legacy Management (LM)

    BEM~RANDu~~ TO: FILE FROM: a. Rq- -__-----_- -_--- SUBJECT: cl;-; nAC; a-.. & ~3 -+.e-&&& SITE NAHE: CITY: M; /L-)-J L ce --_--__---__-~_~~~_-~~~~~~ STATE: WE -----_ OWNER(S) ------_- Past: ------------------------ Current: --_----_--_--------------- Owner ctx-atacted 0 yes 0 no) if ye8, date contacted ---__-------- TYPE OF OPERATION -_-__--_--_--_--_ 0 Research & Development w Facility Type 0 Production scale testing 0 Pilot Scale 0 Manufacturing (3 Bench Scale Process 0

  6. MEMORANDU TO: FILE FHOM: SUBJECT:

    Office of Legacy Management (LM)

    ' .- _. I _ ' 1.3 7 -3 , MEMORANDU TO: FILE FHOM: SUBJECT: Curre"t: Ll&k&&d ________ l- ; if yes, date contacted ___ 0 Production scale testing Cl Pilot Scale 0 Bench Scale Process 0 Theoretical Studies 0 Sample & Analysis 0 Production 0 Disposal /Storage TYPE OF CONTRACT --------------_- 0 Prime 13 Subcontract& 0 Purchase Order 0 Cl Facility Type 0 Manufacturing 0 University 0 Research Organization *i Government Sponsored Facility 0 Other --------------_-----_ Other

  7. MEMORANDUM I TO: FILE DATE

    Office of Legacy Management (LM)

    MEMORANDUM I TO: FILE DATE -----_-_- FaOM: ~~,~hkcid!,~- ' ALTERNATE CITY: I\ptw)a.yk --~---_--___-~--~---______ STATE: I current: ------------_------_-~~~~~ if yes, date contacted ____ TYPE OF OPERATION -_---_---------__ 0 Research & Development 6 Facility Type 0 Production scale testing 0 Pilat Scale 0 Bench Scale Process 0 Theoretical Studies Sample $ rraductian & Analysis a Manufacturing I 0 University I (1 Research Organization 0 Government Sponao&ed Facility 0 Cither I

  8. MEtlORANDUM TO: FILE

    Office of Legacy Management (LM)

    \ MEtlORANDUM / TO: FILE "ATE--$ SUBJECT: ___ NfiME: ALTERNATE w-------- CITY:J!M ------------------ST~~=-i-!-~~- P Pest:-___----_____--______,__ Current: -----_-~~----~~~~~-------- Owner contacted 0 yes q no3 if yes, date contacted TYPE OF OPERATION ----------------- 0 Research & Development q Facility Type 0 Production scale testing 0 Pilot Scale q rlanuf ecturing 0 Bench Scale Process q University 0 Theor&i&l Studies 0 Research Organization 0 Sample & 'Anal*sis 0

  9. Chemical Safety Vulnerability Working Group report. Volume 1

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

  10. Energy Department Issues Tribal Energy System Vulnerabilities to Climate

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Change and Extreme Weather Report, $6M for Native American Clean Energy Projects | Department of Energy Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects Energy Department Issues Tribal Energy System Vulnerabilities to Climate Change and Extreme Weather Report, $6M for Native American Clean Energy Projects September 2, 2015 - 3:30pm Addthis NEWS MEDIA CONTACT 202-586-4940 DOENews@hq.doe.gov The U.S. Department of Energy

  11. File:07COCCertificateOfPublicConvenienceAndNecessity.pdf | Open...

    Open Energy Info (EERE)

    | Sign Up Search File Edit History File:07COCCertificateOfPublicConvenienceAndNecessity.pdf Jump to: navigation, search File File history File usage Metadata File:07COCCertificate...

  12. File:03COEUtilitySpecialUsePermit.pdf | Open Energy Information

    Open Energy Info (EERE)

    Community Login | Sign Up Search File Edit History File:03COEUtilitySpecialUsePermit.pdf Jump to: navigation, search File File history File usage Metadata File:03COEUtilitySpec...

  13. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload ...

  14. SEDS CSV File Documentation: Price and Expenditure

    Gasoline and Diesel Fuel Update (EIA)

    Price and Expenditure Estimates The State Energy Data System (SEDS) comma-separated value (CSV) files contain the price and expenditure estimates shown in the tables located on the SEDS website. There are three files that contain estimates for all states and years. Prices contains the price estimates for all states and Expenditures contains the expenditure estimates for all states. The third file, Adjusted Consumption for Expenditure Calculations contains adjusted consumption estimates used in

  15. 1990 RECS Public Use Microdata Files

    Gasoline and Diesel Fuel Update (EIA)

    90 Microdata 1990 RECS Public Use Microdata Files Data for: 1990 Released: September 2008 The 1990 Residential Energy Consumption Survey (RECS) was designed by the Energy Information Administration (EIA) to provide information on how households in the United States and District of Columbia use energy within the home. The RECS Public Use Files are comma separated value (.txt) files. Each record corresponds to a single responding household. The smallest level of geographic detail available is the

  16. 1987 RECS Public Use Microdata Files

    Gasoline and Diesel Fuel Update (EIA)

    87 Microdata 1987 RECS Public Use Microdata Files Data for: 1987 Released: September 2008 The 1987 Residential Energy Consumption Survey (RECS) was designed by the Energy Information Administration (EIA) to provide information on how households in the United States and District of Columbia use energy within the home. The RECS Public Use Files are comma separated value (.txt) files. Each record corresponds to a single responding household. The smallest level of geographic detail available is the

  17. Regulatory Guide on Conducting a Security Vulnerability Assessment

    SciTech Connect (OSTI)

    Ek, David R.

    2016-01-01

    This document will provide guidelines on conducting a security vulnerability assessment at a facility regulated by the Radiation Protection Centre. The guidelines provide a performance approach assess security effectiveness. The guidelines provide guidance for a review following the objectives outlined in IAEA NSS#11 for Category 1, 2, & 3 sources.

  18. Vulnerability of the US to future sea level rise

    SciTech Connect (OSTI)

    Gornitz, V. . Goddard Inst. for Space Studies); White, T.W.; Cushman, R.M. )

    1991-01-01

    The differential vulnerability of the conterminous United States to future sea level rise from greenhouse climate warming is assessed, using a coastal hazards data base. This data contains information on seven variables relating to inundation and erosion risks. High risk shorelines are characterized by low relief, erodible substrate, subsidence, shoreline retreat, and high wave/tide energies. Very high risk shorelines on the Atlantic Coast (Coastal Vulnerability Index {ge}33.0) include the outer coast of the Delmarva Peninsula, northern Cape Hatteras, and segments of New Jersey, Georgia and South Carolina. Louisiana and sections of Texas are potentially the most vulnerable, due to anomalously high relative sea level rise and erosion, coupled with low elevation and mobile sediments. Although the Pacific Coast is generally the least vulnerable, because of its rugged relief and erosion-resistant substrate, the high geographic variability leads to several exceptions, such as the San Joaquin-Sacramento Delta area, the barrier beaches of Oregon and Washington, and parts of the Puget Sound Lowlands. 31 refs., 2 figs., 3 tabs.

  19. Vulnerability analysis for complex networks using aggressive abstraction.

    SciTech Connect (OSTI)

    Colbaugh, Richard; Glass, Kristin L.

    2010-06-01

    Large, complex networks are ubiquitous in nature and society, and there is great interest in developing rigorous, scalable methods for identifying and characterizing their vulnerabilities. This paper presents an approach for analyzing the dynamics of complex networks in which the network of interest is first abstracted to a much simpler, but mathematically equivalent, representation, the required analysis is performed on the abstraction, and analytic conclusions are then mapped back to the original network and interpreted there. We begin by identifying a broad and important class of complex networks which admit vulnerability-preserving, finite state abstractions, and develop efficient algorithms for computing these abstractions. We then propose a vulnerability analysis methodology which combines these finite state abstractions with formal analytics from theoretical computer science to yield a comprehensive vulnerability analysis process for networks of realworld scale and complexity. The potential of the proposed approach is illustrated with a case study involving a realistic electric power grid model and also with brief discussions of biological and social network examples.

  20. GTRI: Removing Vulnerable Civilian Nuclear and Radiological Material |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Removing Vulnerable Civilian Nuclear and Radiological Material | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Countering Nuclear Terrorism About Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Library Bios Congressional Testimony Fact Sheets

  1. File

    U.S. Energy Information Administration (EIA) Indexed Site

    Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Colorado","Electric Power ...

  2. File

    U.S. Energy Information Administration (EIA) Indexed Site

    3,"Alabama","Alabama","Electric Power Sector","Railroad",214186 2014,3,"Alabama","Alabama","Coke Plant","Railroad",81151 2014,3,"Alabama","Alabama","Industrial Plants Excluding ...

  3. File

    U.S. Energy Information Administration (EIA) Indexed Site

    3,"Alabama","Alabama","Electric Power Sector","Railroad",796189 2013,3,"Alabama","Alabama","Coke Plant","Railroad",25825 2013,3,"Alabama","Alabama","Industrial Plants Excluding ...

  4. File

    U.S. Energy Information Administration (EIA) Indexed Site

    4,2,"Alabama","Alabama","Coke Plant","Railroad",87406 2014,2,"Alabama","Alabama","Coke Plant","Truck",97501 2014,2,"Alabama","Alabama","Electric Power Sector","Railroad",95016 ...

  5. File

    U.S. Energy Information Administration (EIA) Indexed Site

    3,"Alabama","Alabama","Coke Plant","Railroad",81151 2014,3,"Alabama","Alabama","Coke Plant","Truck",156509 2014,3,"Alabama","Alabama","Electric Power Sector","Railroad",214186 ...

  6. File

    U.S. Energy Information Administration (EIA) Indexed Site

    2,4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 2012,4,"Alabama","Alabama","Coke Plant","Railroad",17349 2012,4,"Alabama","Alabama","Industrial Plants Excluding ...

  7. File

    U.S. Energy Information Administration (EIA) Indexed Site

    4,"Alabama","Alabama","Coke Plant","Railroad",65620 2014,4,"Alabama","Alabama","Coke Plant","Truck",124124 2014,4,"Alabama","Alabama","Electric Power Sector","Railroad",28514 ...

  8. File

    U.S. Energy Information Administration (EIA) Indexed Site

    Electric Power Sector","Truck",12356 2013,1,"Alabama","Alabama","Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",269810 ...

  9. File

    U.S. Energy Information Administration (EIA) Indexed Site

    2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 2013,2,"Alabama","Alabama","Coke Plant","Railroad",116028 2013,2,"Alabama","Alabama","Industrial Plants Excluding ...

  10. File

    U.S. Energy Information Administration (EIA) Indexed Site

    Electric Power Sector","Truck",12356 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Railroad",14493 2013,1,"Alabama","Alabama","Industrial Plants Excluding ...

  11. File

    U.S. Energy Information Administration (EIA) Indexed Site

    4,"Alabama","Alabama","Electric Power Sector","Railroad",28514 2014,4,"Alabama","Alabama","Coke Plant","Railroad",65620 2014,4,"Alabama","Alabama","Electric Power ...

  12. File

    U.S. Energy Information Administration (EIA) Indexed Site

    Coke Plant","Truck",87126 2013,1,"Alabama","Alabama","Industrial Plants Excluding Coke","Truck",267108 2013,1,"Alabama","Indiana","Coke Plant","Railroad",164223 ...

  13. File

    U.S. Energy Information Administration (EIA) Indexed Site

    2,4,"Alabama","Alabama","Coke Plant","Railroad",17349 2012,4,"Alabama","Alabama","Coke Plant","Truck",144411 2012,4,"Alabama","Alabama","Electric Power Sector","Railroad",802677 ...

  14. File

    U.S. Energy Information Administration (EIA) Indexed Site

    2,"Alabama","Alabama","Coke Plant","Railroad",116028 2013,2,"Alabama","Alabama","Coke Plant","Truck",94157 2013,2,"Alabama","Alabama","Electric Power Sector","Railroad",495478 ...

  15. File

    U.S. Energy Information Administration (EIA) Indexed Site

    4,2,"Alabama","Alabama","Electric Power Sector","Railroad",95016 2014,2,"Alabama","Alabama","Coke Plant","Railroad",87406 2014,2,"Alabama","Alabama","Electric Power ...

  16. File

    U.S. Energy Information Administration (EIA) Indexed Site

    3,"Alabama","Alabama","Coke Plant","Railroad",25825 2013,3,"Alabama","Alabama","Coke Plant","Truck",125381 2013,3,"Alabama","Alabama","Electric Power Sector","Railroad",796189 ...

  17. The NERSC Global File System

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC Global File System (NGF) Jason Hick jhick@lbl.gov Storage Systems Group Lead http://www.nersc.gov/nusers/systems/NGF/ CAS2K11 September 11-14, 2011 * Operated by University of California for the US Department of Energy * NERSC serves a large population - Approximately 4000 users, 400 projects, 500 codes - Focus on "unique" resources * High-end computing systems * High-end storage systems - Large shared GPFS (a.k.a. NGF) - Large archive (a.k.a. HPSS) * Interface to high speed

  18. TO: FILE FROM: I SUBJECT:

    Office of Legacy Management (LM)

    TO: FILE FROM: I .- SUBJECT: 9EEEW Pos$:&&~ rk/ErvlK& @orzb Current: Lov?r_ &%2J*l&o3?fi; Owner contacted 0 yes &no; if yes, date contacted . TYPE OF OPERATION ----------------- q Research & Development @ Facility Type 0 Production scale testing 0 Pilot Scale & rlanuf acturing 0 Bench Scale Process 0 University 0 Theoretical Studies 0 Research Organizatil 0 Sample SC Analysis 0 Government Sponsarec 0 Other -------------_ q Production 0 Disposal /Storage TYPE CIF

  19. MEPleRANDUM TO: FILE

    Office of Legacy Management (LM)

    MEPleRANDUM ( TO: FILE , , ------ --------iS"I;=~:ta,,,-;onFa;tedl/~~-r*z .-+a~* & 0 no; TYV= OF CP==ATION ---=-------aY----- 0 8:esearch & Develoyent B Facility Type Q Other information <i.e.,.ccst + fixed fee, unit price, Manufacturing University Research Organizatian I Government Sponsored iaci:i<y Other %&~!$-a---- : 0 F'rcduction scale testing 0 Filet Scale 0 Hench Scale Process 0 Thecrktical Studies 0 Sample 2 Anaiysis .B '.Ct-oduction 0 Disposai/Storage TYPE CIF

  20. File:USFWSList.pdf | Open Energy Information

    Open Energy Info (EERE)

    1,650 pixels, file size: 79 KB, MIME type: applicationpdf, 5 pages) Summary US Fish and Wildlife Service Species List - Salt Wells Geothermal Drilling Project EA Licensing...

  1. Discussion of EIA-411 Data Files

    Gasoline and Diesel Fuel Update (EIA)

    Discussion of Data Files Release Date: December 22, 2011 Next Release Date: November 2012 Historical data are shown with the inclusion of the 'old' regional entity names and that information is contained in file marked with the year 2004 or earlier. For the latest reporting, starting in 2005, the current year data are shown in the last row(s) of each file and those data are shown aligned with the updated regional entity names. Each file contains information on the three power grids and/or

  2. Colorado - Access Permit Application File Review Checklist |...

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library General: Colorado - Access Permit Application File Review Checklist Author Colorado Department of Transportation...

  3. Core File Settings | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Core File Settings About Core Files By default, a rank that aborts will dump core, and the control system will signal the other ranks to quit (without dumping core). Multiple core files will be generated only when several ranks abort almost simultaneously. The ranks that do not dump core are those that received the system signal to quit before anything bad happened on that rank. The settings listed below can modify this behaviour in various ways. The core files generated will be in a lightweight

  4. Small file aggregation in a parallel computing system

    DOE Patents [OSTI]

    Faibish, Sorin; Bent, John M.; Tzelnic, Percy; Grider, Gary; Zhang, Jingwang

    2014-09-02

    Techniques are provided for small file aggregation in a parallel computing system. An exemplary method for storing a plurality of files generated by a plurality of processes in a parallel computing system comprises aggregating the plurality of files into a single aggregated file; and generating metadata for the single aggregated file. The metadata comprises an offset and a length of each of the plurality of files in the single aggregated file. The metadata can be used to unpack one or more of the files from the single aggregated file.

  5. File:06MTAMontanaOverdimensionalOrOverweightLoadPermit (1).pdf...

    Open Energy Info (EERE)

    MTAMontanaOverdimensionalOrOverweightLoadPermit (1).pdf Jump to: navigation, search File File history File usage Metadata File:06MTAMontanaOverdimensionalOrOverweightLoadPermit...

  6. Distributed File System Test Using Small FilesV1.1

    Energy Science and Technology Software Center (OSTI)

    2004-04-09

    This program tests distributed filesystems using small files for lock and metadata contention. It is useful for debugging.

  7. Climate Change and Infrastructure, Urban Systems, and Vulnerabilities

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Fernandez, Steven J

    2014-01-01

    This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

  8. Detailed Drawings of NERSC File Systems

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    File System Drawing Detailed Drawings of NERSC File Systems Legend Note that "Fiber Channel" are multiple 1-1 direct connections between multiple devices, we use a cloud here to simplify the representations. Hopper Scratch Project Global Scratch Last edited: 2016-02-01 08:06:28

  9. Logjam: A scalable unified log file archiver

    Energy Science and Technology Software Center (OSTI)

    2001-08-01

    Log files are a necessary record of events on any system. However, as systems scale, so does the volume of data captured. To complicate matters, this data can be distributed across all nodes within the system. This creates challenges in ways to obtain these files as well as archiving them in a consistent manner. It has become commonplace to develop a custom written utility for each system that is tailored specifically to that system. Formore » computer centers that contain multiple systems, each system would have their own respective utility for gathering and archiving log files. Each time a new log file is produced, a modification to the utility is necessary. With each modification, risks of errors could be introduced as well as spending time to introduce that change. This is precisely the purpose of logjam. Once installed, the code only requires modification when new features are required. A configuration file is used to identify each log file as well as where to harvest it and how to archive it. Adding a new log file is as simple as defining it in a configuration file and testing can be performed in the production environment.« less

  10. File:SWERA-202.pdf | Open Energy Information

    Open Energy Info (EERE)

    File File history File usage Solar: monthly and annual average global horizontal (GHI) GIS data at 40km resolution for Sri Lanka from NREL Size of this preview: 776 600...

  11. File:SWERA-253.pdf | Open Energy Information

    Open Energy Info (EERE)

    File File history File usage Solar: monthly and annual average global horizontal (GHI) GIS data at 40km resolution for Nepal from NREL Size of this preview: 776 600 pixels....

  12. File:SWERA-203.pdf | Open Energy Information

    Open Energy Info (EERE)

    search File File history File usage Solar: monthly and annual average latitude tilt GIS data at 40km for Sri Lanka from NREL Size of this preview: 776 600 pixels. Full...

  13. File:SWERA-254.pdf | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search File File history File usage Solar: monthly and annual latitude tilt horizontal GIS data at 40km resolution for Nepal from NREL Size of this preview: 776 ...

  14. File:SWERA-248.pdf | Open Energy Information

    Open Energy Info (EERE)

    8.pdf Jump to: navigation, search File File history File usage Solar: monthly latitude tilt GIS data at 40km resolution for Bangladesh from NREL Size of this preview: 776 600...

  15. File:EIA-coalbed-gas.pdf | Open Energy Information

    Open Energy Info (EERE)

    coalbed-gas.pdf Jump to: navigation, search File File history File usage Coalbed Methane Fields, Lower 48 States Size of this preview: 776 600 pixels. Full resolution (1,650...

  16. File:EIA-cbmusa1.pdf | Open Energy Information

    Open Energy Info (EERE)

    cbmusa1.pdf Jump to: navigation, search File File history File usage Coalbed Methane Status Map Size of this preview: 800 480 pixels. Full resolution (9,000 5,400 pixels,...

  17. File:BLM MOU Geothermal.pdf | Open Energy Information

    Open Energy Info (EERE)

    file size: 187 KB, MIME type: applicationpdf, 15 pages) File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  18. File:06 - ConstructionPermitsOverview.pdf | Open Energy Information

    Open Energy Info (EERE)

    file size: 111 KB, MIME type: applicationpdf, 2 pages) File history Click on a datetime to view the file as it appeared at that time. DateTime Thumbnail Dimensions User...

  19. File:NREL-africa-tilt.pdf | Open Energy Information

    Open Energy Info (EERE)

    tilt.pdf Jump to: navigation, search File File history File usage Africa - Annual Flat Plate Tilted at Latitude (PDF) Size of this preview: 776 600 pixels. Full resolution...

  20. File:EIA-topfields.pdf | Open Energy Information

    Open Energy Info (EERE)

    to: navigation, search File File history File usage The 100 Volumetrically Largest U.S. Oil and Gas Fields Size of this preview: 776 600 pixels. Full resolution (6,600 ...