National Library of Energy BETA

Sample records for hat kernel security

  1. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  2. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  3. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    update | Department of Energy 12: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat

  4. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    update | Department of Energy 12: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat

  5. T-667: Red Hat Enterprise Linux kernel security and bug fix update

    Broader source: Energy.gov [DOE]

    It was found that an mmap() call with the MAP_PRIVATE flag on "/dev/zero" would create transparent hugepages and trigger a certain robustness check. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2011-2479, Moderate)

  6. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...

    Office of Environmental Management (EM)

    A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red ... A local user can access the file to obtain the broker username and password. A local user ...

  7. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  8. V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has been reported in Linux Kernel. REFERENCE LINKS: Secunia Advisory SA53670 Red Hat Bugzilla - Bug 968036 CVE-2013-2850 IMPACT ASSESSMENT: Medium DISCUSSION: The...

  9. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  10. V-233: Red Hat update for JBoss Fuse | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat update for JBoss Fuse V-233: Red Hat update for JBoss Fuse September 3, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for JBoss Fuse PLATFORM: Red Hat JBoss Fuse 6.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited by malicious people to bypass certain security restrictions and cause a DoS. REFERENCE LINKS: Secunia Advisory SA54683 Redhat Advisory RHSA-2013:1185-1 CVE-2013-0269 CVE-2013-1768 CVE-2013-1821 CVE-2013-2160 IMPACT ASSESSMENT: Medium

  11. T-610: Red Hat kdenetwork security update

    Office of Energy Efficiency and Renewable Energy (EERE)

    A directory traversal flaw was found in the way KGet, a download manager, handled the "file" element in Metalink files.

  12. Mexican Hat, Utah, Disposal Site Fact Sheet

    Office of Legacy Management (LM)

    Mexican Hat, Utah, Disposal Site This fact sheet provides information about the Uranium Mill Tailings Radiation Control Act of 1978 Title I processing site at Mexican Hat, Utah. This site is managed by the U.S. Department of Energy Office of Legacy Management. Location of the Mexican Hat, Utah, Disposal Cell Site Location and History The Mexican Hat disposal site is located on the Navajo Reservation in southeast Utah, 1.5 miles southwest of the town of Mexican Hat and 1 mile south of the San

  13. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  14. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  15. Math Kernel Library (MKL)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kernel Library (MKL) Math Kernel Library (MKL) Description The Intel Math Kernel Library (Intel MKL) contains highly optimized, extensively threaded math routines for science, engineering, and financial applications. Core math functions include BLAS, LAPACK, ScaLAPACK, Sparse Solvers, Fast Fourier Transforms, Vector Math, and more. MKL is available on NERSC computer platforms where the Intel compilers are available. For instances, on Cori and Edison. If you use intel compilers to compile your

  16. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  17. Iterative software kernels

    SciTech Connect (OSTI)

    Duff, I.

    1994-12-31

    This workshop focuses on kernels for iterative software packages. Specifically, the three speakers discuss various aspects of sparse BLAS kernels. Their topics are: `Current status of user lever sparse BLAS`; Current status of the sparse BLAS toolkit`; and `Adding matrix-matrix and matrix-matrix-matrix multiply to the sparse BLAS toolkit`.

  18. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  19. V-138: Red Hat update for icedtea-web | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat update for icedtea-web V-138: Red Hat update for icedtea-web April 19, 2013 - 6:00am Addthis PROBLEM: Red Hat has issued an update for icedtea-web PLATFORM: Red Hat ...

  20. Robotic Intelligence Kernel: Communications

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel-Comms is the communication server that transmits information between one or more robots using the RIK and one or more user interfaces. It supports event handling and multiple hardware communication protocols.

  1. Robotic Intelligence Kernel: Driver

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel-Driver is built on top of the RIK-A and implements a dynamic autonomy structure. The RIK-D is used to orchestrate hardware for sensing and action as well as software components for perception, communication, behavior and world modeling into a single cognitive behavior kernel that provides intrinsic intelligence for a wide variety of unmanned ground vehicle systems.

  2. Long-term surveillance plan for the Mexican Hat disposal site Mexican Hat, Utah

    SciTech Connect (OSTI)

    1997-06-01

    This long-term surveillance plan (LTSP) describes the U.S. Department of Energy`s (DOE) long-term care program for the Uranium Mill Tailings Remedial Action (UMTRA) Project Mexican Hat, Utah, disposal site. This LSTP describes the long-term surveillance program the DOE will implement to ensure the Mexican Hat disposal site performs as designed and is cared for in a manner that protects the public health and safety and the environment. Before each disposal site is licensed for custody and long-term care, the Nuclear Regulatory Commission (NRC) requires the DOE to submit such a site-specific LTSP.

  3. DOE - Office of Legacy Management -- MexHat

    Office of Legacy Management (LM)

    Utah Mexican Hat, Utah, Disposal Site UMTRCA Title I site mex_map The Mexican Hat disposal site, a Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and requires routine inspection and maintenance, records-related activities, and stakeholder support. For more information about the Mexican Hat site, view the fact sheet.

  4. Robotic Intelligence Kernel: Visualization

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel-Visualization is the software that supports the user interface. It uses the RIK-C software to communicate information to and from the robot. The RIK-V illustrates the data in a 3D display and provides an operating picture wherein the user can task the robot.

  5. Robotic Intelligence Kernel: Architecture

    Energy Science and Technology Software Center (OSTI)

    2009-09-16

    The INL Robotic Intelligence Kernel Architecture (RIK-A) is a multi-level architecture that supports a dynamic autonomy structure. The RIK-A is used to coalesce hardware for sensing and action as well as software components for perception, communication, behavior and world modeling into a framework that can be used to create behaviors for humans to interact with the robot.

  6. DOE - Office of Legacy Management -- MexHat

    Office of Legacy Management (LM)

    Radiation Control Act Title I Disposal Sites-Mexican Hat, Utah, Disposal Site Communications and Outreach Plan for the Navajo Nation Uranium Mill Tailings Radiation Control ...

  7. Engineering assessment of inactive uranium mill tailings: Mexican Hat Site, Mexican Hat, Utah

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Mexican Hat site in order to revise the March 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Mexican Hat, Utah. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.2 million tons of tailings at the Mexican Hat site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The four alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material to removal of the tailings to remote disposal sites and decontamination of the tailings site. Cost estimates for the four options range from about $15,200,000 for stabilization in place, to about $45,500,000 for disposal at a distance of about 16 mi. Three principal alternatives for the reprocessing of the Mexican Hat tailings were examined: heap leaching; treatment at an existing mill; and reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $115/lb of U/sub 3/O/sub 8/ whether by heap leach or conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Reprocessing the Mexican Hat tailings for uranium recovery is not economically attractive under present conditions.

  8. WARM SPITZER PHOTOMETRY OF THREE HOT JUPITERS: HAT-P-3b, HAT-P-4b AND HAT-P-12b

    SciTech Connect (OSTI)

    Todorov, Kamen O.; Deming, Drake; Knutson, Heather A.; Burrows, Adam; Fortney, Jonathan J.; Laughlin, Gregory; Lewis, Nikole K.; Cowan, Nicolas B.; Agol, Eric; Desert, Jean-Michel; Sada, Pedro V.; Charbonneau, David; Langton, Jonathan; Showman, Adam P.

    2013-06-20

    We present Warm Spitzer/IRAC secondary eclipse time series photometry of three short-period transiting exoplanets, HAT-P-3b, HAT-P-4b and HAT-P-12b, in both the available 3.6 and 4.5 {mu}m bands. HAT-P-3b and HAT-P-4b are Jupiter-mass objects orbiting an early K and an early G dwarf star, respectively. For HAT-P-3b we find eclipse depths of 0.112%+0.015%-0.030% (3.6 micron) and 0.094%+0.016%-0.009% (4.5 {mu}m). The HAT-P-4b values are 0.142%+0.014%-0.016% (3.6 micron) and 0.122%+0.012%-0.014% 4.5 {mu}m). The two planets' photometry is consistent with inefficient heat redistribution from their day to night sides (and low albedos), but it is inconclusive about possible temperature inversions in their atmospheres. HAT-P-12b is a Saturn-mass planet and is one of the coolest planets ever observed during secondary eclipse, along with the hot Neptune GJ 436b and the hot Saturn WASP-29b. We are able to place 3{sigma} upper limits on the secondary eclipse depth of HAT-P-12b in both wavelengths: <0.042% (3.6 {mu}m) and <0.085% (4.5 {mu}m). We discuss these results in the context of the Spitzer secondary eclipse measurements of GJ 436b and WASP-29b. It is possible that we do not detect the eclipses of HAT-P-12b due to high eccentricity, but find that weak planetary emission in these wavelengths is a more likely explanation. We place 3{sigma} upper limits on the |e cos {omega}| quantity (where e is eccentricity and {omega} is the argument of periapsis) for HAT-P-3b (<0.0081) and HAT-P-4b (<0.0042), based on the secondary eclipse timings.

  9. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  10. V-163: Red Hat Network Satellite Server Inter-Satellite Sync...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May...

  11. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  12. Robotic intelligence kernel

    DOE Patents [OSTI]

    Bruemmer, David J.

    2009-11-17

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes a robot intelligence kernel (RIK) that includes a multi-level architecture and a dynamic autonomy structure. The multi-level architecture includes a robot behavior level for defining robot behaviors, that incorporate robot attributes and a cognitive level for defining conduct modules that blend an adaptive interaction between predefined decision functions and the robot behaviors. The dynamic autonomy structure is configured for modifying a transaction capacity between an operator intervention and a robot initiative and may include multiple levels with at least a teleoperation mode configured to maximize the operator intervention and minimize the robot initiative and an autonomous mode configured to minimize the operator intervention and maximize the robot initiative. Within the RIK at least the cognitive level includes the dynamic autonomy structure.

  13. DOE - Office of Legacy Management -- Mexican Hat Mill Site - UT 0-02A

    Office of Legacy Management (LM)

    Mill Site - UT 0-02A Site ID (CSD Index Number): UT.0-02A Site Name: Mexican Hat Mill Site Site Summary: Site Link: Mexican Hat, Utah, Disposal Site External Site Link: Alternate Name(s): Mexican Hat Mill Site Uranium Mill in Mexican Hat Alternate Name Documents: Location: Mexican Hat, Utah, Navajo Nation Location Documents: Historical Operations (describe contaminants): Historical Operations Documents: Eligibility Determination: Uranium Mill Tailings Radiation Control Act (UMTRCA) Title I site

  14. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  15. U-156: Red Hat update for JBoss Enterprise Portal Platform | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 56: Red Hat update for JBoss Enterprise Portal Platform U-156: Red Hat update for JBoss Enterprise Portal Platform April 26, 2012 - 7:00am Addthis PROBLEM: Red Hat update for JBoss Enterprise Portal Platform PLATFORM: JBoss Enterprise Portal Platform 5.x ABSTRACT: Update for JBoss Enterprise Portal Platform Reference Links: Secunia Advisory SA48954 CVE-2011-4314 CVE-2012-0818 IMPACT ASSESSMENT: Medium Discussion: Red Hat has issued an update for JBoss Enterprise Portal Platform. This

  16. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding

    2007-06-05

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  17. HAT-P-44b, HAT-P-45b, AND HAT-P-46b: Three transiting hot Jupiters in possible multi-planet systems

    SciTech Connect (OSTI)

    Hartman, J. D.; Bakos, G. .; Bhatti, W.; Csubry, Z.; Penev, K.; De Val-Borro, M.; Torres, G.; Latham, D. W.; Bieryla, A.; Bky, B.; Noyes, R. W.; Esquerdo, G. A.; Kovcs, G.; Johnson, J. A.; Howard, A. W.; Marcy, G. W.; Buchhave, L. A.; Fischer, D. A.; Everett, M.; Szklenr, T.; and others

    2014-06-01

    We report the discovery by the HATNet survey of three new transiting extrasolar planets orbiting moderately bright (V = 13.2, 12.8, and 11.9) stars. The planets have orbital periods of 4.3012, 3.1290, and 4.4631 days, masses of 0.35, 0.89, and 0.49 M {sub J}, and radii of 1.24, 1.43, and 1.28 R {sub J}. The stellar hosts have masses of 0.94, 1.26, and 1.28 M {sub ?}. Each system shows significant systematic variations in its residual radial velocities, indicating the possible presence of additional components. Based on its Bayesian evidence, the preferred model for HAT-P-44 consists of two planets, including the transiting component, with the outer planet having a period of 872 days, eccentricity of 0.494 0.081, and a minimum mass of 4.0 M {sub J}. Due to aliasing we cannot rule out alternative solutions for the outer planet having a period of 220 days or 438 days. For HAT-P-45, at present there is not enough data to justify the additional free parameters included in a multi-planet model; in this case a single-planet solution is preferred, but the required jitter of 22.5 6.3 m s{sup 1} is relatively high for a star of this type. For HAT-P-46 the preferred solution includes a second planet having a period of 78 days and a minimum mass of 2.0 M {sub J}, however the preference for this model over a single-planet model is not very strong. While substantial uncertainties remain as to the presence and/or properties of the outer planetary companions in these systems, the inner transiting planets are well characterized with measured properties that are fairly robust against changes in the assumed models for the outer planets. Continued radial velocity monitoring is necessary to fully characterize these three planetary systems, the properties of which may have important implications for understanding the formation of hot Jupiters.

  18. Linux Kernel Error Detection and Correction

    Energy Science and Technology Software Center (OSTI)

    2007-04-11

    EDAC-utils consists fo a library and set of utilities for retrieving statistics from the Linux Kernel Error Detection and Correction (EDAC) drivers.

  19. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  20. Time Adaptive Conditional Kernel Density Estimation for Wind...

    Office of Scientific and Technical Information (OSTI)

    Time Adaptive Conditional Kernel Density Estimation for Wind Power Forecasting Citation Details In-Document Search Title: Time Adaptive Conditional Kernel Density Estimation for ...

  1. Linux Kernel Co-Scheduling For Bulk Synchronous Parallel Applications...

    Office of Scientific and Technical Information (OSTI)

    Linux Kernel Co-Scheduling For Bulk Synchronous Parallel Applications Citation Details In-Document Search Title: Linux Kernel Co-Scheduling For Bulk Synchronous Parallel ...

  2. UMTRA Project Site Observational Work Plan, Mexican Hat, Utah

    SciTech Connect (OSTI)

    Not Available

    1994-09-01

    Surface cleanup activities at the Mexican Hat UMTRA processing site are nearing completion. Ground Water contamination at the Mexican Hat site is a result of uranium milling operations. The extent of residual process water has been identified, and it is limited to the uppermost aquifer in the vicinity of the site. Deeper aquifers are not affected because of an upward hydraulic gradient and the presence of a confining unit (the deeper aquifers are protected by hydrogeologic isolation). The uppermost unit is returning to its pre-milling, mainly unsaturated state. The unit that contains the contaminated water is not a ground water resource because it qualifies as Class III (limited use) based on limited yield. Ground water in the uppermost unit is currently not used and is not anticipated to be used as a ground water resource. The nearby San Juan River and a converted oil exploration well provide all of the water needs for the area. There are no current threats to human health or livestock; and, because the zone of contamination does not represent a ground water resource, none are anticipated in the future. There are, however, seeps where contaminated water is exposed at land surface. The seeps create potential exposure pathways for plants and wildlife. It is not known at this time if there is a risk to the environment. Additional investigations are needed and are described in this document to confirm the presence or absence of potential environmental risks. Additional hydrogeologic investigations are not required. The proposed ground water compliance strategy for the site is no remediation, because the ground water in the uppermost aquifer (which is also the zone of contamination) qualifies for supplemental standards based on Class III, limited yield, and because there are no threats to human health. Domestic and agricultural water is pumped from a deeper aquifer that is isolated from the contaminated zone.

  3. Environmental assessment of remedial action at the Mexican Hat uranium mill tailings site, Mexican Hat, Utah. [Contains glossary

    SciTech Connect (OSTI)

    Not Available

    1987-10-01

    This document assesses the environmental impacts of the proposed remedial action at the Mexican Hat uranium mill tailings site located on the Navajo Reservation in southern Utah. The site covers 235 acres and contains 69 acres of tailings and several of the original mill structures. Remedial action must be performed in accordance with standards and with the concurrence of the US Nuclear Regulatory Commission and the Navajo Nation. The proposed action is to stabilize the tailings within the present tailings site by consolidating the tailings and associated contaminated soils into a recontoured pile. A radon barrier of compacted earth would be constructed over the pile, and various erosion control measures would be taken to assure the long-term stability of the pile. The no action alternative is also assessed in this document. 240 refs., 12 figs., 20 tabs.

  4. KITTEN Lightweight Kernel 0.1 Beta

    Energy Science and Technology Software Center (OSTI)

    2007-12-12

    The Kitten Lightweight Kernel is a simplified OS (operating system) kernel that is intended to manage a compute node's hardware resources. It provides a set of mechanisms to user-level applications for utilizing hardware resources (e.g., allocating memory, creating processes, accessing the network). Kitten is much simpler than general-purpose OS kernels, such as Linux or Windows, but includes all of the esssential functionality needed to support HPC (high-performance computing) MPI, PGAS and OpenMP applications. Kitten providesmore » unique capabilities such as physically contiguous application memory, transparent large page support, and noise-free tick-less operation, which enable HPC applications to obtain greater efficiency and scalability than with general purpose OS kernels.« less

  5. TICK: Transparent Incremental Checkpointing at Kernel Level

    Energy Science and Technology Software Center (OSTI)

    2004-10-25

    TICK is a software package implemented in Linux 2.6 that allows the save and restore of user processes, without any change to the user code or binary. With TICK a process can be suspended by the Linux kernel upon receiving an interrupt and saved in a file. This file can be later thawed in another computer running Linux (potentially the same computer). TICK is implemented as a Linux kernel module, in the Linux version 2.6.5

  6. T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and...

    Energy Savers [EERE]

    A local user can access the file to obtain the broker username and password. A local user can access the broker username and password. This can be exploited to connect to the ...

  7. U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability

    Broader source: Energy.gov [DOE]

    If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password.

  8. Fast generation of sparse random kernel graphs

    SciTech Connect (OSTI)

    Hagberg, Aric; Lemons, Nathan; Du, Wen -Bo

    2015-09-10

    The development of kernel-based inhomogeneous random graphs has provided models that are flexible enough to capture many observed characteristics of real networks, and that are also mathematically tractable. We specify a class of inhomogeneous random graph models, called random kernel graphs, that produces sparse graphs with tunable graph properties, and we develop an efficient generation algorithm to sample random instances from this model. As real-world networks are usually large, it is essential that the run-time of generation algorithms scales better than quadratically in the number of vertices n. We show that for many practical kernels our algorithm runs in time at most ο(n(logn)²). As an example, we show how to generate samples of power-law degree distribution graphs with tunable assortativity.

  9. Fast generation of sparse random kernel graphs

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Hagberg, Aric; Lemons, Nathan; Du, Wen -Bo

    2015-09-10

    The development of kernel-based inhomogeneous random graphs has provided models that are flexible enough to capture many observed characteristics of real networks, and that are also mathematically tractable. We specify a class of inhomogeneous random graph models, called random kernel graphs, that produces sparse graphs with tunable graph properties, and we develop an efficient generation algorithm to sample random instances from this model. As real-world networks are usually large, it is essential that the run-time of generation algorithms scales better than quadratically in the number of vertices n. We show that for many practical kernels our algorithm runs in timemore » at most ο(n(logn)²). As an example, we show how to generate samples of power-law degree distribution graphs with tunable assortativity.« less

  10. Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah: Appendices C--E. Final report

    SciTech Connect (OSTI)

    1993-02-01

    This document provides appendices C, D, and E this Remedial Action Plan (RAP) which is a revision of the original Mexican Hat Remedial Action Plan and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. Appendix C provide the Radiological Support Plan, Appendix D provides the Site Characterization, and Appendix E provides the Water Resources Protection Strategy.

  11. LightWeight KerneL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Catamount n-Way LightWeight KerneL 1 R&D 100 Entry Catamount n-Way LightWeight KerneL 2 R&D 100 Entry Submitting organization Sandia National Laboratories PO Box 5800 Albuquerque, NM 87185-1319 USA Ron Brightwell Phone: (505) 844-2099 Fax: (505) 845-7442 rbbrigh@sandia.gov AFFIRMATION: I affirm that all information submitted as a part of, or supplemental to, this entry is a fair and accurate representation of this product. _____________________________ Ron Brightwell Joint entry

  12. Fabrication of Uranium Oxycarbide Kernels for HTR Fuel

    SciTech Connect (OSTI)

    Charles Barnes; CLay Richardson; Scott Nagley; John Hunn; Eric Shaber

    2010-10-01

    Babcock and Wilcox (B&W) has been producing high quality uranium oxycarbide (UCO) kernels for Advanced Gas Reactor (AGR) fuel tests at the Idaho National Laboratory. In 2005, 350-µm, 19.7% 235U-enriched UCO kernels were produced for the AGR-1 test fuel. Following coating of these kernels and forming the coated-particles into compacts, this fuel was irradiated in the Advanced Test Reactor (ATR) from December 2006 until November 2009. B&W produced 425-µm, 14% enriched UCO kernels in 2008, and these kernels were used to produce fuel for the AGR-2 experiment that was inserted in ATR in 2010. B&W also produced 500-µm, 9.6% enriched UO2 kernels for the AGR-2 experiments. Kernels of the same size and enrichment as AGR-1 were also produced for the AGR-3/4 experiment. In addition to fabricating enriched UCO and UO2 kernels, B&W has produced more than 100 kg of natural uranium UCO kernels which are being used in coating development tests. Successive lots of kernels have demonstrated consistent high quality and also allowed for fabrication process improvements. Improvements in kernel forming were made subsequent to AGR-1 kernel production. Following fabrication of AGR-2 kernels, incremental increases in sintering furnace charge size have been demonstrated. Recently small scale sintering tests using a small development furnace equipped with a residual gas analyzer (RGA) has increased understanding of how kernel sintering parameters affect sintered kernel properties. The steps taken to increase throughput and process knowledge have reduced kernel production costs. Studies have been performed of additional modifications toward the goal of increasing capacity of the current fabrication line to use for production of first core fuel for the Next Generation Nuclear Plant (NGNP) and providing a basis for the design of a full scale fuel fabrication facility.

  13. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  14. Measurement of nonlinear index by a relay-imaged top-hat Z-scan technique

    SciTech Connect (OSTI)

    Shimada, T.; Kurnit, N.A.; Sheik-Bahae, M.

    1996-04-01

    Measurements of the nonlinear index of a number of optical materials of interest for the National Ignition Facility have been performed at 1,064 nm and 355 nm by a modified version of the ``top-hat`` technique and the results compared with the more standard gaussian-beam Z-scan technique. The top-hat technique has the advantages of higher sensitivity and smaller uncertainties introduced by beam-quality considerations. The authors have made what they feel to be an additional improvement by placing the defining aperture for the top hat at the front focal plane of the lens that focuses the beam into the sample and then reimaging the input aperture with a second lens onto a ccd camera. Reimaging eliminates diffraction fringes and provides a stationary image even for a wedged sample; recording the entire image permits minimization of spurious effects such as varying interference fringes.

  15. A spin-orbit alignment for the hot Jupiter HATS-3b

    SciTech Connect (OSTI)

    Addison, B. C.; Tinney, C. G.; Wright, D. J.; Bayliss, D.

    2014-09-10

    We have measured the alignment between the orbit of HATS-3b (a recently discovered, slightly inflated Hot Jupiter) and the spin axis of its host star. Data were obtained using the CYCLOPS2 optical-fiber bundle and its simultaneous calibration system feeding the UCLES spectrograph on the Anglo-Australian Telescope. The sky-projected spin-orbit angle of ? = 3 25 was determined from spectroscopic measurements of the Rossiter-McLaughlin effect. This is the first exoplanet discovered through the HATSouth transit survey to have its spin-orbit angle measured. Our results indicate that the orbital plane of HATS-3b is consistent with being aligned to the spin axis of its host star. The low obliquity of the HATS-3 system, which has a relatively hot mid F-type host star, agrees with the general trend observed for Hot Jupiter host stars with effective temperatures >6250 K to have randomly distributed spin-orbit angles.

  16. Remedial Action Plan for the codisposal and stabilization of the Monument Valley and Mexican Hat uranium mill tailings at Mexican Hat, Utah

    SciTech Connect (OSTI)

    1993-02-01

    This document is a revision of the original Mexiacan Hat Remedial Action Plan (RAP) and RAP Modification submitted in July 1988 and January 1989, respectively, along with updated design documents. This RAP has been developed to serve a two-fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Section 2.0 presents the EPA standards, including a discussion of their objectives. Section 3. 0 summarizes the present site characteristics and provides a definition of site-specific problems. Section 4.0 is the site design for the proposed action. Section 5.0 presents the water resources protection strategy. Section 6.0 summarizes the plan for ensuring health and safety protection for the surrounding community and the on- site workers. Section 7.0 lists the responsibilities of the project participants. Section 8.0 describes the features of the long-term surveillance and maintenance plan.

  17. Red Hat Enterprise Virtualization - KVM-based infrastructure services at BNL

    SciTech Connect (OSTI)

    Cortijo, D.

    2011-06-14

    Over the past 18 months, BNL has moved a large percentage of its Linux-based servers and services into a Red Hat Enterprise Virtualization (RHEV) environment. This presentation will address our approach to virtualization, critical decision points, and a discussion of our implementation. Specific topics will include an overview of hardware and software requirements, networking, and storage; discussion of the decision of Red Hat solution over competing products (VMWare, Xen, etc); details on some of the features of RHEV - both current and on their roadmap; Review of performance and reliability gains since deployment completion; path forward for RHEV at BNL and caveats and potential problems.

  18. WASP-35b, WASP-48b, AND HAT-P-30b/WASP-51b: TWO NEW PLANETS AND AN INDEPENDENT DISCOVERY OF A HAT PLANET

    SciTech Connect (OSTI)

    Enoch, B.; Brown, D. J. A.; Cameron, A. Collier; Anderson, D. R.; Smalley, B.; Barros, S. C. C.; Faedi, F.; Gillon, M.; Hebrard, G.; Bouchy, F.; Lister, T. A.; Street, R. A.; Queloz, D.; Triaud, A. H. M. J.; Santerne, A.; West, R. G.; Butters, O.; Bento, J.; Fossati, L.; Haswell, C. A.

    2011-09-15

    We report the detection of WASP-35b, a planet transiting a metal-poor ([Fe/H] = -0.15) star in the Southern hemisphere, WASP-48b, an inflated planet which may have spun-up its slightly evolved host star of 1.75 R{sub sun} in the Northern hemisphere, and the independent discovery of HAT-P-30b/WASP-51b, a new planet in the Northern hemisphere. Using WASP, RISE, Faulkes Telescope South, and TRAPPIST photometry, with CORALIE, SOPHIE, and NOT spectroscopy, we determine that WASP-35b has a mass of 0.72 {+-} 0.06 M{sub J} and radius of 1.32 {+-} 0.05R{sub J} , and orbits with a period of 3.16 days, WASP-48b has a mass of 0.98 {+-} 0.09 M{sub J} , radius of 1.67 {+-} 0.10 R{sub J} , and orbits in 2.14 days, while HAT-P-30b/WASP-51b, with an orbital period of 2.81 days, is found to have a mass of 0.76 {+-} 0.05 M{sub J} and radius of 1.42 {+-} 0.03 R{sub J} , agreeing with values of 0.71 {+-} 0.03 M{sub J} and 1.34 {+-} 0.07 R{sub J} reported for HAT-P-30b.

  19. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  20. Wilson Dslash Kernel From Lattice QCD Optimization

    SciTech Connect (OSTI)

    Joo, Balint; Smelyanskiy, Mikhail; Kalamkar, Dhiraj D.; Vaidyanathan, Karthikeyan

    2015-07-01

    Lattice Quantum Chromodynamics (LQCD) is a numerical technique used for calculations in Theoretical Nuclear and High Energy Physics. LQCD is traditionally one of the first applications ported to many new high performance computing architectures and indeed LQCD practitioners have been known to design and build custom LQCD computers. Lattice QCD kernels are frequently used as benchmarks (e.g. 168.wupwise in the SPEC suite) and are generally well understood, and as such are ideal to illustrate several optimization techniques. In this chapter we will detail our work in optimizing the Wilson-Dslash kernels for Intel Xeon Phi, however, as we will show the technique gives excellent performance on regular Xeon Architecture as well.

  1. PERI Auto-tuning Memory Intensive Kernels

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PERI - Auto-tuning Memory Intensive Kernels for Multicore Samuel Williams † , Kaushik Datta † , Jonathan Carter , Leonid Oliker † , John Shalf , Katherine Yelick † , David Bailey CRD/NERSC, Lawrence Berkeley National Laboratory, Berkeley, CA 94720, USA † Computer Science Division, University of California at Berkeley, Berkeley, CA 94720, USA E-mail: SWWilliams@lbl.gov, kdatta@eecs.berkeley.edu, JTCarter@lbl.gov, LOliker@lbl.gov, JShalf@lbl.gov, KAYelick@lbl.gov, DHBailey@lbl.gov

  2. HATS-5b: A TRANSITING HOT SATURN FROM THE HATSouth SURVEY

    SciTech Connect (OSTI)

    Zhou, G.; Bayliss, D.; Schmidt, B.; Penev, K.; Bakos, G. .; Hartman, J. D.; Csubry, Z.; Jordn, A.; Brahm, R.; Rabus, M.; Suc, V.; Espinoza, N.; Mancini, L.; Mohler, M.; Ciceri, S.; Henning, T.; Buchhave, L.; Bky, B.; Noyes, R. W.; Butler, R. P.; and others

    2014-06-01

    We report the discovery of HATS-5b, a transiting hot Saturn orbiting a G-type star, by the HATSouth survey. HATS-5b has a mass of M{sub p} ? 0.24 M {sub J}, radius of R{sub p} ? 0.91 R {sub J}, and transits its host star with a period of P ? 4.7634 days. The radius of HATS-5b is consistent with both theoretical and empirical models. The host star has a V-band magnitude of 12.6, mass of 0.94 M {sub ?}, and radius of 0.87 R {sub ?}. The relatively high scale height of HATS-5b and the bright, photometrically quiet host star make this planet a favorable target for future transmission spectroscopy follow-up observations. We reexamine the correlations in radius, equilibrium temperature, and metallicity of the close-in gas giants and find hot Jupiter-mass planets to exhibit the strongest dependence between radius and equilibrium temperature. We find no significant dependence in radius and metallicity for the close-in gas giant population.

  3. Atmospheric circulation of eccentric hot Jupiter HAT-P-2B

    SciTech Connect (OSTI)

    Lewis, Nikole K.; Showman, Adam P.; Fortney, Jonathan J.; Knutson, Heather A.; Marley, Mark S.

    2014-11-10

    The hot Jupiter HAT-P-2b has become a prime target for Spitzer Space Telescope observations aimed at understanding the atmospheric response of exoplanets on highly eccentric orbits. Here we present a suite of three-dimensional atmospheric circulation models for HAT-P-2b that investigate the effects of assumed atmospheric composition and rotation rate on global scale winds and thermal patterns. We compare and contrast atmospheric models for HAT-P-2b, which assume one and five times solar metallicity, both with and without TiO/VO as atmospheric constituents. Additionally we compare models that assume a rotation period of half, one, and two times the nominal pseudo-synchronous rotation period. We find that changes in assumed atmospheric metallicity and rotation rate do not significantly affect model predictions of the planetary flux as a function of orbital phase. However, models in which TiO/VO are present in the atmosphere develop a transient temperature inversion between the transit and secondary eclipse events that results in significant variations in the timing and magnitude of the peak of the planetary flux compared with models in which TiO/VO are omitted from the opacity tables. We find that no one single atmospheric model can reproduce the recently observed full orbit phase curves at 3.6, 4.5 and 8.0 ?m, which is likely due to a chemical process not captured by our current atmospheric models for HAT-P-2b. Further modeling and observational efforts focused on understanding the chemistry of HAT-P-2b's atmosphere are needed and could provide key insights into the interplay between radiative, dynamical, and chemical processes in a wide range of exoplanet atmospheres.

  4. PySKI: THE PYTHON SPARSE KERNEL INTERFACE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    This content is based on slides produced by Tom Deakin and Simon which were based on slides by Tim and Simon with help from Ben Gaster (Qualcomm) . Agenda Lectures Exercises An Introduction to OpenCL Logging in and running the Vadd program Understanding Host programs Chaining Vadd kernels together Kernel programs The D = A + B + C problem Writing Kernel Programs Matrix Multiplication Lunch Working with the OpenCL memory model Several ways to Optimize matrix multiplication High Performance OpenCL

  5. Linux Kernel Co-Scheduling and Bulk Synchronous Parallelism ...

    Office of Scientific and Technical Information (OSTI)

    Sponsoring Org: SC USDOE - Office of Science (SC) Country of Publication: United States Language: English Subject: operating system noise; operating system interference; kernel ...

  6. U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

  7. U-175: Linux Kernel KVM Memory Slot Management Flaw

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user on the guest operating system can cause denial of service conditions on the host operating system.

  8. Design and fabrication of hat-shaped stiffened panel by resin transfer molding method

    SciTech Connect (OSTI)

    Bell, R.; Ibekwe, S.I.; Mensah, P.F.; Chehl, S.S.

    1998-12-31

    Hat-shaped stiffened composite panels were fabricated by resin transfer molding (RTM) process. As application of these compression load bearing panels in aircraft wings and fuselage increases, this promising manufacturing technique would contribute towards the goal of attaining reduced part counts and cheaper manufacturing costs. Rigid foam which increases the structural efficiency of panels was utilized in this process. Also Balsa wood was considered as an alternative to the rigid foam and employed as a permanent mandrel in fabricating one of the panels. Buckling analysis result by finite element method and modified closed form solution suggested by Agarwal et al. (1974) agree. Once this process is fine-tuned, it would provide a cheaper method of fabricating composite hat-stiffened panels.

  9. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  10. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  11. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  12. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  13. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  14. Characterization of the atmosphere of the hot Jupiter HAT-P-32Ab and the M-dwarf companion HAT-P-32B

    SciTech Connect (OSTI)

    Zhao, Ming; Wright, Jason T.; Curtis, Jason; O'Rourke, Joseph G.; Knutson, Heather A.; Ngo, Henry; Burrows, Adam; Fortney, Johnathan; Fulton, Benjamin J.; Baranec, Christoph; Riddle, Reed; Hinkley, Sasha; Law, Nicholas M.; Muirhead, Philip S.; Showman, Adam P.; Burruss, Rick

    2014-12-01

    We report secondary eclipse photometry of the hot Jupiter HAT-P-32Ab, taken with Hale/Wide-field Infra-Red Camera (WIRC) in H and K{sub S} bands and with Spitzer/IRAC at 3.6 and 4.5 μm. We carried out adaptive optics imaging of the planet host star HAT-P-32A and its companion HAT-P-32B in the near-IR and the visible. We clearly resolve the two stars from each other and find a separation of 2.''923 ± 0.''004 and a position angle 110.°64 ± 0.°12. We measure the flux ratios of the binary in g'r'i'z' and H and K{sub S} bands, and determine T {sub eff}= 3565 ± 82 K for the companion star, corresponding to an M1.5 dwarf. We use PHOENIX stellar atmosphere models to correct the dilution of the secondary eclipse depths of the hot Jupiter due to the presence of the M1.5 companion. We also improve the secondary eclipse photometry by accounting for the non-classical, flux-dependent nonlinearity of the WIRC IR detector in the H band. We measure planet-to-star flux ratios of 0.090% ± 0.033%, 0.178% ± 0.057%, 0.364% ± 0.016%, and 0.438% ± 0.020% in the H, K{sub S} , 3.6 and 4.5 μm bands, respectively. We compare these with planetary atmospheric models, and find they prefer an atmosphere with a temperature inversion and inefficient heat redistribution. However, we also find that the data are equally well described by a blackbody model for the planet with T {sub p} = 2042 ± 50 K. Finally, we measure a secondary eclipse timing offset of 0.3 ± 1.3 minutes from the predicted mid-eclipse time, which constrains e = 0.0072{sub −0.0064}{sup +0.0700} when combined with radial velocity data and is more consistent with a circular orbit.

  15. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  16. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  17. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  18. DOE - Office of Legacy Management -- Mexican Hat AEC Ore Buying Station -

    Office of Legacy Management (LM)

    UT 0-02 AEC Ore Buying Station - UT 0-02 Site ID (CSD Index Number): UT.0-02 Site Name: Mexican Hat AEC Ore Buying Station Site Summary: The history of domestic uranium procurement under U.S. Atomic Energy Commission (AEC) contracts identifies a number of ore buying stations (sampling and storage sites) that were operated during the period late-1949 through the mid-1960s. During this period the AEC established ore-buying stations in new uranium producing areas where it appeared that ore

  19. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  20. HATS-3b: AN INFLATED HOT JUPITER TRANSITING AN F-TYPE STAR

    SciTech Connect (OSTI)

    Bayliss, D.; Zhou, G.; Schmidt, B.; Penev, K.; Bakos, G. .; Hartman, J. D.; Csubry, Z.; Jordn, A.; Suc, V.; Rabus, M.; Brahm, R.; Espinoza, N.; Mancini, L.; Mohler-Fischer, M.; Henning, T.; Nikolov, N.; Csk, B.; Bky, B.; Noyes, R. W.; Buchhave, L.; and others

    2013-11-01

    We report the discovery by the HATSouth survey of HATS-3b, a transiting extrasolar planet orbiting a V = 12.4 F dwarf star. HATS-3b has a period of P = 3.5479 days, mass of M{sub p} = 1.07 M {sub J}, and radius of R{sub p} = 1.38 R {sub J}. Given the radius of the planet, the brightness of the host star, and the stellar rotational velocity (vsin i = 9.0 km s{sup 1}), this system will make an interesting target for future observations to measure the Rossiter-McLaughlin effect and determine its spin-orbit alignment. We detail the low-/medium-resolution reconnaissance spectroscopy that we are now using to deal with large numbers of transiting planet candidates produced by the HATSouth survey. We show that this important step in discovering planets produces log g and T {sub eff} parameters at a precision suitable for efficient candidate vetting, as well as efficiently identifying stellar mass eclipsing binaries with radial velocity semi-amplitudes as low as 1 km s{sup 1}.

  1. A Bayesian analysis of HAT-P-7b using the EXONEST algorithm

    SciTech Connect (OSTI)

    Placek, Ben; Knuth, Kevin H.

    2015-01-13

    The study of exoplanets (planets orbiting other stars) is revolutionizing the way we view our universe. High-precision photometric data provided by the Kepler Space Telescope (Kepler) enables not only the detection of such planets, but also their characterization. This presents a unique opportunity to apply Bayesian methods to better characterize the multitude of previously confirmed exoplanets. This paper focuses on applying the EXONEST algorithm to characterize the transiting short-period-hot-Jupiter, HAT-P-7b (also referred to as Kepler-2b). EXONEST evaluates a suite of exoplanet photometric models by applying Bayesian Model Selection, which is implemented with the MultiNest algorithm. These models take into account planetary effects, such as reflected light and thermal emissions, as well as the effect of the planetary motion on the host star, such as Doppler beaming, or boosting, of light from the reflex motion of the host star, and photometric variations due to the planet-induced ellipsoidal shape of the host star. By calculating model evidences, one can determine which model best describes the observed data, thus identifying which effects dominate the planetary system. Presented are parameter estimates and model evidences for HAT-P-7b.

  2. Final audit report of remedial action construction at the UMTRA Project Mexican Hat, Utah -- Monument Valley, Arizona, sites

    SciTech Connect (OSTI)

    1995-10-01

    The final audit report for remedial action at the Mexican Hat, Utah, Monument Valley, Arizona, Uranium Mill Tailings Remedial Action (UMTRA) Project sites consists of a summary of the radiological surveillances/audits, quality assurance (QA) in-process surveillances, and QA remedial action close-out inspections performed by the US Department of Energy (DOE) and the Technical Assistance Contractor (TAC); on-site construction reviews (OSCR) performed by the US Nuclear Regulatory Commission (NRC); and a surveillance performed by the Navajo Nation. This report refers to remedial action activities performed at the Mexican Hat, Utah--Monument Valley, Arizona, Uranium Mill Tailings Remedial Action (UMTRA) Project sites.

  3. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  4. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  5. On flame kernel formation and propagation in premixed gases

    SciTech Connect (OSTI)

    Eisazadeh-Far, Kian; Metghalchi, Hameed [Northeastern University, Mechanical and Industrial Engineering Department, Boston, MA 02115 (United States); Parsinejad, Farzan [Chevron Oronite Company LLC, Richmond, CA 94801 (United States); Keck, James C. [Massachusetts Institute of Technology, Cambridge, MA 02139 (United States)

    2010-12-15

    Flame kernel formation and propagation in premixed gases have been studied experimentally and theoretically. The experiments have been carried out at constant pressure and temperature in a constant volume vessel located in a high speed shadowgraph system. The formation and propagation of the hot plasma kernel has been simulated for inert gas mixtures using a thermodynamic model. The effects of various parameters including the discharge energy, radiation losses, initial temperature and initial volume of the plasma have been studied in detail. The experiments have been extended to flame kernel formation and propagation of methane/air mixtures. The effect of energy terms including spark energy, chemical energy and energy losses on flame kernel formation and propagation have been investigated. The inputs for this model are the initial conditions of the mixture and experimental data for flame radii. It is concluded that these are the most important parameters effecting plasma kernel growth. The results of laminar burning speeds have been compared with previously published results and are in good agreement. (author)

  6. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  7. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  8. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  9. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  11. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  12. Assessment of the radiological impact of the inactive uranium-mill tailings at Mexican Hat, Utah

    SciTech Connect (OSTI)

    Haywood, F.F.; Goldsmith, W.A.; Ellis, B.S.; Hubbard, H.M. Jr.; Fox, W.F.; Shinpaugh, W.H.

    1980-03-01

    High surface soil concentrations of /sup 226/Ra and high above-ground measurements of gamma-ray intensity in the vicinity of the inactive uranium-mill tailings at Mexican Hat show both wind and water erosion of the tailings. The former mill area, occupied by a trade school at the time of this survey, shows a comparatively high level of contamination, probably from unprocessed ore on the surface of the ore storage area near the location of the former mill buildings. However, the estimated health effect of exposure to gamma rays during a 2000-hr work year in the area represents an increase of 0.1% in the risk of death from cancer. Exposure of less than 600 persons within 1.6 km of the tailings to radon daughters results in an estimated 0.2%/year increase in risk of lung cancer.

  13. Implementation of a parallel multilevel secure process. Master's thesis

    SciTech Connect (OSTI)

    Pratt, D.R.

    1988-06-01

    This thesis demonstrates an implementation of a parallel multilevel secure process. This is done within the framework of an electronic-mail system. Security is implemented by GEMSOS, the operating system of the Gemini Trusted Computer Base. A brief history of computer secrecy is followed by a discussion of security kernels. Event counts and sequences are used to provide concurrency control and are covered in detail. The specifications for the system are based upon the requirements for a Headquarters of a hypothetical Marine Battalion in garrison.

  14. SPITZER IRAC SECONDARY ECLIPSE PHOTOMETRY OF THE TRANSITING EXTRASOLAR PLANET HAT-P-1b

    SciTech Connect (OSTI)

    Todorov, Kamen; Deming, Drake; Harrington, Jospeph; Stevenson, Kevin B.; Bowman, William C.; Nymeyer, Sarah; Fortney, Jonathan J.; Bakos, Gaspar A.

    2010-01-01

    We report Spitzer/IRAC photometry of the transiting giant exoplanet HAT-P-1b during its secondary eclipse. This planet lies near the postulated boundary between the pM and pL-class of hot Jupiters, and is important as a test of models for temperature inversions in hot Jupiter atmospheres. We derive eclipse depths for HAT-P-1b, in units of the stellar flux, that are: 0.080% +- 0.008% [3.6 mum], 0.135% +- 0.022% [4.5 mum], 0.203% +- 0.031% [5.8 mum], and 0.238% +- 0.040% [8.0 mum]. These values are best fit using an atmosphere with a modest temperature inversion, intermediate between the archetype inverted atmosphere (HD 209458b) and a model without an inversion. The observations also suggest that this planet is radiating a large fraction of the available stellar irradiance on its dayside, with little available for redistribution by circulation. This planet has sometimes been speculated to be inflated by tidal dissipation, based on its large radius in discovery observations, and on a non-zero orbital eccentricity allowed by the radial velocity data. The timing of the secondary eclipse is very sensitive to orbital eccentricity, and we find that the central phase of the eclipse is 0.4999 +- 0.0005. The difference between the expected and observed phase indicates that the orbit is close to circular, with a 3sigma limit of |e cos omega| < 0.002.

  15. Prediction of spark kernel development in constant volume combustion

    SciTech Connect (OSTI)

    Lim, M.T.; Anderson, R.W.; Arpaci, V.S.

    1987-09-01

    Combustion initiation is studied in atmospheric pressure propane-air mixtures in a constant volume bomb with a high speed (10,000 fps) laser schlieren system. The spark current and voltage waveforms are simultaneously recorded for later model input. A phenomenological model for early flame kernel development is presented which accounts for the initial, breakdown generated, spark kernel and its subsequent growth. The kernel growth is initially controlled by the breakdown process and the subsequent electrical power input. A new, spark power induced, mass entrainment term is shown to model this initially rapid volume increase adequately while later growth is mainly dominated by diffusion. Results and model comparisons are presented for the effects of power input, spark energy, and equivalence ratio.

  16. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  18. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  19. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  20. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  1. U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability August 2,...

  2. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  3. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  4. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  5. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  6. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  7. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  8. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  9. PERI - Auto-tuning Memory Intensive Kernels for Multicore

    SciTech Connect (OSTI)

    Bailey, David H; Williams, Samuel; Datta, Kaushik; Carter, Jonathan; Oliker, Leonid; Shalf, John; Yelick, Katherine; Bailey, David H

    2008-06-24

    We present an auto-tuning approach to optimize application performance on emerging multicore architectures. The methodology extends the idea of search-based performance optimizations, popular in linear algebra and FFT libraries, to application-specific computational kernels. Our work applies this strategy to Sparse Matrix Vector Multiplication (SpMV), the explicit heat equation PDE on a regular grid (Stencil), and a lattice Boltzmann application (LBMHD). We explore one of the broadest sets of multicore architectures in the HPC literature, including the Intel Xeon Clovertown, AMD Opteron Barcelona, Sun Victoria Falls, and the Sony-Toshiba-IBM (STI) Cell. Rather than hand-tuning each kernel for each system, we develop a code generator for each kernel that allows us to identify a highly optimized version for each platform, while amortizing the human programming effort. Results show that our auto-tuned kernel applications often achieve a better than 4X improvement compared with the original code. Additionally, we analyze a Roofline performance model for each platform to reveal hardware bottlenecks and software challenges for future multicore systems and applications.

  10. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  13. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  14. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  17. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  18. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  19. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  20. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  1. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  2. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  3. Results from ORNL Characterization of Nominal 350 ?m NUCO Kernels from the BWXT 59344 batch

    SciTech Connect (OSTI)

    Hunn, John D; Kercher, Andrew K; Menchhofer, Paul A; Price, Jeffery R

    2005-01-01

    This document is a compilation of characterization data obtained on nominal 350 {micro}m natural enrichment uranium oxide/uranium carbide kernels (NUCO) produced by BWXT for the Advanced Gas Reactor Fuel Development and Qualification Program. These kernels were produced as part of a development effort at BWXT to address issues involving forming and heat treatment and were shipped to ORNL for additional characterization and for coating tests. The kernels were identified as G73N-NU-59344. 250 grams were shipped to ORNL. Size, shape, and microstructural analysis was performed. These kernels were preceded by G73B-NU-69300 and G73B-NU-69301, which were kernels produced and delivered to ORNL earlier in the development phase. Characterization of the kernels from G73B-NU-69300 was summarized in ORNL/CF-04/07 'Results from ORNL Characterization of Nominal 350 {micro}m NUCO Kernels from the BWXT 69300 composite'.

  4. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Appendix E. Final report

    SciTech Connect (OSTI)

    1988-07-01

    This document provides Appendix E of the Remedial Action Plan (RAP) presented in 1988 for the stabilization of the inactive uranium mill tailings at the Mexican Hat, Utah site. The RAP was developed to serve a two- fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley, Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by the DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. The RAP has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  9. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  10. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect (OSTI)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  11. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  12. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  13. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  14. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  15. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  16. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  17. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  18. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  20. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  1. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  2. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  3. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  4. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  5. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  8. TORCH Computational Reference Kernels - A Testbed for Computer Science Research

    SciTech Connect (OSTI)

    Kaiser, Alex; Williams, Samuel Webb; Madduri, Kamesh; Ibrahim, Khaled; Bailey, David H.; Demmel, James W.; Strohmaier, Erich

    2010-12-02

    For decades, computer scientists have sought guidance on how to evolve architectures, languages, and programming models in order to improve application performance, efficiency, and productivity. Unfortunately, without overarching advice about future directions in these areas, individual guidance is inferred from the existing software/hardware ecosystem, and each discipline often conducts their research independently assuming all other technologies remain fixed. In today's rapidly evolving world of on-chip parallelism, isolated and iterative improvements to performance may miss superior solutions in the same way gradient descent optimization techniques may get stuck in local minima. To combat this, we present TORCH: A Testbed for Optimization ResearCH. These computational reference kernels define the core problems of interest in scientific computing without mandating a specific language, algorithm, programming model, or implementation. To compliment the kernel (problem) definitions, we provide a set of algorithmically-expressed verification tests that can be used to verify a hardware/software co-designed solution produces an acceptable answer. Finally, to provide some illumination as to how researchers have implemented solutions to these problems in the past, we provide a set of reference implementations in C and MATLAB.

  9. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  10. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  11. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  12. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  13. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  14. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  15. Multi-level security for computer networking: SAC digital network approach

    SciTech Connect (OSTI)

    Griess, W.; Poutre, D.L.

    1983-10-01

    For telecommunications systems simultaneously handling data of different security levels, multilevel secure (MLS) operation permits maximum use of resources by automatically providing protection to users with various clearances and needs-to-know. The strategic air command (SAC) is upgrading the primary record data system used to command and control its strategic forces. The upgrade, called the SAC Digital Network (SACDIN), is designed to provide multilevel security to support users and external interfaces, with allowed accesses ranging from unclassified to top secret. SACDIN implements a security kernel based upon the Bell and Lapadula security model. This study presents an overview of the SACDIN security architecture and describes the basic message flow across the MLS network. 7 references.

  16. FABRICATION PROCESS AND PRODUCT QUALITY IMPROVEMENTS IN ADVANCED GAS REACTOR UCO KERNELS

    SciTech Connect (OSTI)

    Charles M Barnes

    2008-09-01

    A major element of the Advanced Gas Reactor (AGR) program is developing fuel fabrication processes to produce high quality uranium-containing kernels, TRISO-coated particles and fuel compacts needed for planned irradiation tests. The goals of the AGR program also include developing the fabrication technology to mass produce this fuel at low cost. Kernels for the first AGR test (“AGR-1) consisted of uranium oxycarbide (UCO) microspheres that werre produced by an internal gelation process followed by high temperature steps tot convert the UO3 + C “green” microspheres to first UO2 + C and then UO2 + UCx. The high temperature steps also densified the kernels. Babcock and Wilcox (B&W) fabricated UCO kernels for the AGR-1 irradiation experiment, which went into the Advance Test Reactor (ATR) at Idaho National Laboratory in December 2006. An evaluation of the kernel process following AGR-1 kernel production led to several recommendations to improve the fabrication process. These recommendations included testing alternative methods of dispersing carbon during broth preparation, evaluating the method of broth mixing, optimizing the broth chemistry, optimizing sintering conditions, and demonstrating fabrication of larger diameter UCO kernels needed for the second AGR irradiation test. Based on these recommendations and requirements, a test program was defined and performed. Certain portions of the test program were performed by Oak Ridge National Laboratory (ORNL), while tests at larger scale were performed by B&W. The tests at B&W have demonstrated improvements in both kernel properties and process operation. Changes in the form of carbon black used and the method of mixing the carbon prior to forming kernels led to improvements in the phase distribution in the sintered kernels, greater consistency in kernel properties, a reduction in forming run time, and simplifications to the forming process. Process parameter variation tests in both forming and sintering steps led

  17. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  18. FABRICATION OF URANIUM OXYCARBIDE KERNELS AND COMPACTS FOR HTR FUEL

    SciTech Connect (OSTI)

    Dr. Jeffrey A. Phillips; Eric L. Shaber; Scott G. Nagley

    2012-10-01

    As part of the program to demonstrate tristructural isotropic (TRISO)-coated fuel for the Next Generation Nuclear Plant (NGNP), Advanced Gas Reactor (AGR) fuel is being irradiation tested in the Advanced Test Reactor (ATR) at Idaho National Laboratory (INL). This testing has led to improved kernel fabrication techniques, the formation of TRISO fuel particles, and upgrades to the overcoating, compaction, and heat treatment processes. Combined, these improvements provide a fuel manufacturing process that meets the stringent requirements associated with testing in the AGR experimentation program. Researchers at Idaho National Laboratory (INL) are working in conjunction with a team from Babcock and Wilcox (B&W) and Oak Ridge National Laboratory (ORNL) to (a) improve the quality of uranium oxycarbide (UCO) fuel kernels, (b) deposit TRISO layers to produce a fuel that meets or exceeds the standard developed by German researches in the 1980s, and (c) develop a process to overcoat TRISO particles with the same matrix material, but applies it with water using equipment previously and successfully employed in the pharmaceutical industry. A primary goal of this work is to simplify the process, making it more robust and repeatable while relying less on operator technique than prior overcoating efforts. A secondary goal is to improve first-pass yields to greater than 95% through the use of established technology and equipment. In the first test, called “AGR-1,” graphite compacts containing approximately 300,000 coated particles were irradiated from December 2006 to November 2009. The AGR-1 fuel was designed to closely replicate many of the properties of German TRISO-coated particles, thought to be important for good fuel performance. No release of gaseous fission product, indicative of particle coating failure, was detected in the nearly 3-year irradiation to a peak burn up of 19.6% at a time-average temperature of 1038–1121°C. Before fabricating AGR-2 fuel, each

  19. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  20. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  1. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  2. AGR-5/6/7 LEUCO Kernel Fabrication Readiness Review

    SciTech Connect (OSTI)

    Marshall, Douglas W.; Bailey, Kirk W.

    2015-02-01

    In preparation for forming low-enriched uranium carbide/oxide (LEUCO) fuel kernels for the Advanced Gas Reactor (AGR) fuel development and qualification program, Idaho National Laboratory conducted an operational readiness review of the Babcock & Wilcox Nuclear Operations Group – Lynchburg (B&W NOG-L) procedures, processes, and equipment from January 14 – January 16, 2015. The readiness review focused on requirements taken from the American Society Mechanical Engineers (ASME) Nuclear Quality Assurance Standard (NQA-1-2008, 1a-2009), a recent occurrence at the B&W NOG-L facility related to preparation of acid-deficient uranyl nitrate solution (ADUN), and a relook at concerns noted in a previous review. Topic areas open for the review were communicated to B&W NOG-L in advance of the on-site visit to facilitate the collection of objective evidences attesting to the state of readiness.

  3. libMSR library and msr-safe kernel module

    Energy Science and Technology Software Center (OSTI)

    2013-09-26

    Modern processors offer a wide range of control and measurement features. While those are traditionally accessed through libraries like PAPI, some newer features no longer follow the traditional model of counters that can be used to only read the state of the processor. For example, Precise Event Based Sampling (PEBS) can generate records that requires a kernel memory for storage. Additionally, new features like power capping and thermal control require similar new access methods. Allmore » of these features are ultimately controlled through Model Specific Registers (MSRs). We therefore need new mechanisms to make such features available to tools and ultimately to the user. libMSR provides a convenient interface to access MSRs and to allow tools to utilize their full functionality.« less

  4. Dynamic extension of the Simulation Problem Analysis Kernel (SPANK)

    SciTech Connect (OSTI)

    Sowell, E.F. . Dept. of Computer Science); Buhl, W.F. )

    1988-07-15

    The Simulation Problem Analysis Kernel (SPANK) is an object-oriented simulation environment for general simulation purposes. Among its unique features is use of the directed graph as the primary data structure, rather than the matrix. This allows straightforward use of graph algorithms for matching variables and equations, and reducing the problem graph for efficient numerical solution. The original prototype implementation demonstrated the principles for systems of algebraic equations, allowing simulation of steady-state, nonlinear systems (Sowell 1986). This paper describes how the same principles can be extended to include dynamic objects, allowing simulation of general dynamic systems. The theory is developed and an implementation is described. An example is taken from the field of building energy system simulation. 2 refs., 9 figs.

  5. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  6. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  7. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  8. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  9. Coupling quantum dots to optical fiber: Low pump threshold laser in the red with a near top hat beam profile

    SciTech Connect (OSTI)

    Cheng, H.; Mironov, A. E.; Ni, J. H.; Yang, H. J.; Chen, W. W.; Dai, Z.; Park, S.-J.; Eden, J. G.; Dragic, P. D.; Dong, J.

    2015-02-23

    Direct coupling of the optical field in a ?244?nm thick, CdSe/ZnS quantum dot film to an optical fiber has yielded lasing in the red (? ? 644?nm) with a threshold pump energy density?hat.

  10. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  11. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  13. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  14. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  15. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  16. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  17. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  19. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  20. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  1. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  2. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  3. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  4. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  5. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  6. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  7. Spark ignited turbulent flame kernel growth. Annual report, January--December, 1992

    SciTech Connect (OSTI)

    Santavicca, D.A.

    1994-06-01

    Cyclic combustion variations in spark-ignition engines limit the use of dilute charge strategies for achieving low NO{sub x} emissions and improved fuel economy. Results from an experimental study of the effect of incomplete fuel-air mixing (ifam) on spark-ignited flame kernel growth in turbulent propane-air mixtures are presented. The experiments were conducted in a turbulent flow system that allows for independent variation of flow parameters, ignition system parameters, and the degree of fuel-air mixing. Measurements were made at 1 atm and 300 K conditions. Five cases were studied; a premixed and four incompletely mixed cases with 6%, 13%, 24% and 33% RMS (root-mean-square) fluctuations in the fuel/air equivalence ratio. High speed laser shadowgraphy at 4,000 frames-per-second was used to record flame kernel growth following spark ignition, from which the equivalent flame kernel radius as a function of time was determined. The effect of ifam was evaluated in terms of the flame kernel growth rate, cyclic variations in the flame kernel growth, and the rate of misfire. The results show that fluctuations in local mixture strength due to ifam cause the flame kernel surface to become wrinkled and distorted; and that the amount of wrinkling increases as the degree of ifam. Ifam was also found to result in a significant increase in cyclic variations in the flame kernel growth. The average flame kernel growth rates for the premixed and the incompletely mixed cases were found to be within the experimental uncertainty except for the 33%-RMS-fluctuation case where the growth rate is significantly lower. The premixed and 6%-RMS-fluctuation cases had a 0% misfire rate. The misfire rates were 1% and 2% for the 13%-RMS-fluctuation and 24%-RMS-fluctuation cases, respectively; however, it drastically increased to 23% in the 33%-RMS-fluctuation case.

  8. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  9. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  10. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  11. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  12. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  13. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  14. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  15. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  16. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  17. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  18. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  19. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  20. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  1. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  2. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  3. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  4. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  5. A computational method for solving stochastic Itô–Volterra integral equations based on stochastic operational matrix for generalized hat basis functions

    SciTech Connect (OSTI)

    Heydari, M.H.; Hooshmandasl, M.R.; Maalek Ghaini, F.M.; Cattani, C.

    2014-08-01

    In this paper, a new computational method based on the generalized hat basis functions is proposed for solving stochastic Itô–Volterra integral equations. In this way, a new stochastic operational matrix for generalized hat functions on the finite interval [0,T] is obtained. By using these basis functions and their stochastic operational matrix, such problems can be transformed into linear lower triangular systems of algebraic equations which can be directly solved by forward substitution. Also, the rate of convergence of the proposed method is considered and it has been shown that it is O(1/(n{sup 2}) ). Further, in order to show the accuracy and reliability of the proposed method, the new approach is compared with the block pulse functions method by some examples. The obtained results reveal that the proposed method is more accurate and efficient in comparison with the block pule functions method.

  6. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Appendix D. Final report

    SciTech Connect (OSTI)

    1988-07-01

    This appendix is an assessment of the present conditions of the inactive uranium mill site near Mexican Hat, Utah. It consolidates available engineering, radiological, geotechnical, hydrological, meteorological, and other information pertinent to the design of the Remedial Action Plan. Plan is to characterize the conditions at the mill and tailings site so that the Remedial Action Contractor may complete final designs of the remedial action.

  7. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  8. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  9. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  10. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  13. Remedial Action Plan and site design for stabilization of the inactive uranium mill tailings site at Mexican Hat, Utah: Text, Appendices A--C. Final report

    SciTech Connect (OSTI)

    1988-07-01

    This Remedial Action Plan (RAP) has been developed to serve a two- fold purpose. It presents the activities proposed by the Department of Energy (DOE) to accomplish long-term stabilization and control of the residual radioactive materials (RRM) from Monument Valley Arizona, and Mexican Hat, Utah, at the Mexican Hat disposal site. It also serves to document the concurrence of both the Navajo Nation and the Nuclear Regulatory Commission (NRC) in the remedial action. This agreement, upon execution by DOE and the Navajo Nation and concurrence by the NRC, becomes Appendix B of the Cooperative Agreement. This document has been structured to provide a comprehensive understanding of the remedial action proposed for the Monument Valley and Mexican Hat sites. It includes specific design and construction requirements for the remedial action. Pertinent information and data are included with reference given to the supporting documents. Appendices A,B, and C are provided as part of this document. Appendix A presents regulatory compliance issues, Appendix B provides details of the engineering design, and Appendix C presents the radiological support plan.

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  15. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  16. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  17. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  18. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  19. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  20. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  1. Physics Experiments and Abstract Harmonic Analysis: A Generalized Peano Kernel Theorem for Estimating Errors in Laser Interferometry

    SciTech Connect (OSTI)

    Luttman, A.

    2012-10-08

    This slide-show discusses the use of the Local Polynomial Approximation (LPA) to smooth signals from photonic Doppler velocimetry (PDV) applying a generalized Peano kernel theorem.

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  4. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  5. THE STELLAR OBLIQUITY AND THE LONG-PERIOD PLANET IN THE HAT-P-17 EXOPLANETARY SYSTEM

    SciTech Connect (OSTI)

    Fulton, Benjamin J.; Howard, Andrew W.; Winn, Joshua N.; Albrecht, Simon; Marcy, Geoffrey W.; Isaacson, Howard; Crepp, Justin R.; Bakos, Gaspar A.; Hartman, Joel D.; Johnson, John Asher; Knutson, Heather A.; Zhao Ming

    2013-08-01

    We present the measured projected obliquity-the sky-projected angle between the stellar spin axis and orbital angular momentum-of the inner planet of the HAT-P-17 multi-planet system. We measure the sky-projected obliquity of the star to be {lambda}=19{sup +14}{sub -16} deg by modeling the Rossiter-McLaughlin effect in Keck/HIRES radial velocities (RVs). The anomalous RV time series shows an asymmetry relative to the midtransit time, ordinarily suggesting a nonzero obliquity-but in this case at least part of the asymmetry may be due to the convective blueshift, increasing the uncertainty in the determination of {lambda}. We employ the semi-analytical approach of Hirano et al. that includes the effects of macroturbulence, instrumental broadening, and convective blueshift to accurately model the anomaly in the net RV caused by the planet eclipsing part of the rotating star. Obliquity measurements are an important tool for testing theories of planet formation and migration. To date, the measured obliquities of {approx}50 Jovian planets span the full range, from prograde to retrograde, with planets orbiting cool stars preferentially showing alignment of stellar spins and planetary orbits. Our results are consistent with this pattern emerging from tidal interactions in the convective envelopes of cool stars and close-in planets. In addition, our 1.8 yr of new RVs for this system show that the orbit of the outer planet is more poorly constrained than previously thought, with an orbital period now in the range of 10-36 yr.

  6. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  7. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  8. Carbothermic Synthesis of 820 m UN Kernels: Literature Review, Thermodynamics, Analysis, and Related Experiments

    SciTech Connect (OSTI)

    Lindemer, Terrence; Voit, Stewart L; Silva, Chinthaka M; Besmann, Theodore M; Hunt, Rodney Dale

    2014-01-01

    The U.S. Department of Energy is considering a new nuclear fuel that would be less susceptible to ruptures during a loss-of-coolant accident. The fuel would consist of tristructural isotropic coated particles with large, dense uranium nitride (UN) kernels. This effort explores many factors involved in using gel-derived uranium oxide-carbon microspheres to make large UN kernels. Analysis of recent studies with sufficient experimental details is provided. Extensive thermodynamic calculations are used to predict carbon monoxide and other pressures for several different reactions that may be involved in conversion of uranium oxides and carbides to UN. Experimentally, the method for making the gel-derived microspheres is described. These were used in a microbalance with an attached mass spectrometer to determine details of carbothermic conversion in argon, nitrogen, or vacuum. A quantitative model is derived from experiments for vacuum conversion to an uranium oxide-carbide kernel.

  9. Problematic projection to the in-sample subspace for a kernelized anomaly detector

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Theiler, James; Grosklos, Guen

    2016-03-07

    We examine the properties and performance of kernelized anomaly detectors, with an emphasis on the Mahalanobis-distance-based kernel RX (KRX) algorithm. Although the detector generally performs well for high-bandwidth Gaussian kernels, it exhibits problematic (in some cases, catastrophic) performance for distances that are large compared to the bandwidth. By comparing KRX to two other anomaly detectors, we can trace the problem to a projection in feature space, which arises when a pseudoinverse is used on the covariance matrix in that feature space. Here, we show that a regularized variant of KRX overcomes this difficulty and achieves superior performance over a widemore » range of bandwidths.« less

  10. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  11. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  12. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  13. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  14. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  15. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  16. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  17. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  18. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  19. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  20. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  1. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  2. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  3. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  4. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  7. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  8. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  9. Provision of mobile and man-portable radiation detection equipment;
  10. Regional cooperation on safeguards...

  11. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  12. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.