National Library of Energy BETA

Sample records for heap overflow lets

  1. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Gain Elevated Privileges | Department of Energy 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities

  2. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  3. V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain ... AnyConnect VPN Client Two Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws ...

  4. U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges U-056: Linux Kernel HFS Buffer Overflow Lets Local Users Gain Root Privileges December 9, 2011 - 8:00am...

  5. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  6. T-583: Linux Kernel OSF Partition Table Buffer Overflow Lets Local Users Obtain Information

    Broader source: Energy.gov [DOE]

    A local user can create a storage device with specially crafted OSF partition tables. When the kernel automatically evaluates the partition tables, a buffer overflow may occur and data from kernel heap space may leak to user-space.

  7. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  8. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  9. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute ... The vendor has issued a fix (16.0.0.282). Addthis Related Articles V-228: RealPlayer ...

  10. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  11. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  12. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  13. T-567: Linux Kernel Buffer Overflow in ldm_frag_add() May Let Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user may be able to obtain elevated privileges on the target system. A physically local user can connect a storage device with a specially crafted LDM partition table to trigger a buffer overflow in the ldm_frag_add() function in 'fs/partitions/ldm.c' and potentially execute arbitrary code with elevated privileges.

  14. V-228: RealPlayer Buffer Overflow and Memory Corruption Error...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute ... Lets Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid ...

  15. U-115: Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

  16. Colton Heaps | Department of Energy

    Office of Environmental Management (EM)

    Colton Heaps About Us Colton Heaps - Project Leader at NREL Colton Heaps Colton Heaps is a project leader at NREL specializing in renewable energy project development, energy efficiency, sustainable design, and financial analysis. Mr. Heap's support for the Office of Indian Energy focuses on the energy issues of tribes that receive assistance through the START Renewable Energy Project Development Assistance Program. Prior to joining NREL, Mr. Heaps served as a civil engineering officer in the

  17. T-548: Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow

    Broader source: Energy.gov [DOE]

    Novell ZENworks Handheld Management (ZHM) is vulnerable to a heap-based buffer overflow, caused by improper bounds checking by the ZfHIPCnd.exe Access Point process. By sending a specially-crafted request to TCP port 2400, a remote attacker could overflow a buffer and execute arbitrary code on the system with SYSTEM privileges or cause the application to crash.

  18. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  19. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  20. T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell ZENworks Configuration Management, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to a boundary error in novell-tftp.exe when parsing requests. This can be exploited to cause a heap-based buffer overflow via a specially crafted request sent to UDP port 69. The vulnerability is reported in versions 10.3.1, 10.3.2, and 11.0.

  1. T-626: Xen Multiple Buffer Overflow and Integer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    It was found that the xc_try_bzip2_decode() and xc_try_lzma_decode() decode routines did not correctly check for a possible buffer size overflow in the decoding loop. As well, several integer overflow flaws and missing error/range checking were found that could lead to an infinite loop. A privileged guest user could use these flaws to crash the guest or, possibly, execute arbitrary code in the privileged management domain (Dom0). (CVE-2011-1583)

  2. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability June 20, 2013 - 6:00am Addthis...

  3. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Tracker Alert CVE-2010-4393 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted AVI file that, when loaded by the target user, will trigger ...

  4. Power-law connections: From Zipf to Heaps and beyond

    SciTech Connect (OSTI)

    Eliazar, Iddo I.; Cohen, Morrel H.

    2013-05-15

    In this paper we explore the asymptotic statistics of a general model of rank distributions in the large-ensemble limit; the construction of the general model is motivated by recent empirical studies of rank distributions. Applying Lorenzian, oligarchic, and Heapsian asymptotic analyses we establish a comprehensive set of closed-form results linking together rank distributions, probability distributions, oligarchy sizes, and innovation rates. In particular, the general results reveal the fundamental underlying connections between Zipfs law, Paretos law, and Heaps lawthree elemental empirical power-laws that are ubiquitously observed in the sciences. -- Highlights: ? The large-ensemble asymptotic statistics of rank distributions are explored. ? Lorenzian, oligarchic, and Heapsian asymptotic analyses are applied. ? Associated oligarchy sizes and induced innovation rates are analyzed. ? General elemental statistical connections are established. ? The underlying connections between Zipfs, Paretos and Heaps laws are unveiled.

  5. V-074: IBM Informix Genero libpng Integer Overflow Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 74: IBM Informix Genero libpng Integer Overflow Vulnerability V-074: IBM Informix Genero libpng Integer Overflow Vulnerability January 22, 2013 - 12:11am Addthis PROBLEM: IBM Informix Genero libpng Integer Overflow Vulnerability PLATFORM: IBM Informix Genero releases prior to 2.41 - all platforms ABSTRACT: A vulnerability has been reported in libpng. REFERENCE LINKS: IBM Security Bulletin: 1620982 Secunia Advisory SA51905 Secunia Advisory SA48026 CVE-2011-3026 IMPACT

  6. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Symantec was notified of a pre-authentication buffer overflow found in the Symantec Endpoint Protection Manager (SEPM) and Symantec Endpoint Protection Center (SPC)

  7. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  8. Event heap: a coordination infrastructure for dynamic heterogeneous application interactions in ubiquitous computing environments

    DOE Patents [OSTI]

    Johanson, Bradley E.; Fox, Armando; Winograd, Terry A.; Hanrahan, Patrick M.

    2010-04-20

    An efficient and adaptive middleware infrastructure called the Event Heap system dynamically coordinates application interactions and communications in a ubiquitous computing environment, e.g., an interactive workspace, having heterogeneous software applications running on various machines and devices across different platforms. Applications exchange events via the Event Heap. Each event is characterized by a set of unordered, named fields. Events are routed by matching certain attributes in the fields. The source and target versions of each field are automatically set when an event is posted or used as a template. The Event Heap system implements a unique combination of features, both intrinsic to tuplespaces and specific to the Event Heap, including content based addressing, support for routing patterns, standard routing fields, limited data persistence, query persistence/registration, transparent communication, self-description, flexible typing, logical/physical centralization, portable client API, at most once per source first-in-first-out ordering, and modular restartability.

  9. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability August 16, 2013 - 5:52am Addthis...

  10. U-128: VMware ESX/ESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in VMware ESX. A local user can obtain elevated privileges on the target system.

  11. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  12. V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 14: RealPlayer MP4 Processing Buffer Overflow Vulnerability V-114: RealPlayer MP4 Processing Buffer Overflow Vulnerability March 19, 2013 - 12:01am Addthis PROBLEM: RealPlayer MP4 Processing Buffer Overflow Vulnerability PLATFORM: Versions prior to 16.0.1.18. ABSTRACT: A vulnerability has been reported in RealPlayer REFERENCE LINKS: RealNetworks, Inc Secunia Advisory SA52692 CVE-2013-1750 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability is caused due to an error when

  13. V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow.

  14. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

  15. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be...

  16. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  17. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July...

  18. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  19. V-235: Cisco Mobility Services Engine Configuration Error Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login ... and Local Users Gain Elevated Privileges V-076: Cisco Wireless LAN Controller Bugs Let ...

  20. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  1. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  2. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  3. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  4. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  5. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  6. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  7. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  8. T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

  9. Defining a Possible Low LET Bystander Effect

    SciTech Connect (OSTI)

    Charles R. Geard

    2009-05-04

    Current radiation protection guidelines assume a linear response to ionizing radiations down through doses where epidemiological studies provide very limited to no information as to the propriety of such assumptions. The bystander response is a non-targeted effect which might impact such guidelines. These studies while clearly affirming a bystander response for high LET radiations, do not provide such affirmation for environmentally relevant low dose, low LET radiations. Caution and further study are necessary before making judgements that could impact on current standards.

  10. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  11. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  12. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  13. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  14. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE)

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  15. T-556: BMC PATROL Agent Service Daemon stack-based buffer overflow

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768.

  16. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  17. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  18. U-242: Linux Kernel Netlink SCM_CREDENTIALS Processing Flaw Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain Elevated Privileges U-242: Linux Kernel Netlink SCMCREDENTIALS Processing Flaw Lets Local Users Gain...

  19. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  20. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  1. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  2. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  3. V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges May...

  4. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  5. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  6. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  7. Solar Decathlon 2015: Let the Competition Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let the Competition Begin Solar Decathlon 2015: Let the Competition Begin February 13, 2014 - 1:00pm Addthis The Solar Decathlon competition has provided more than 17,000 college students with the training and hands-on experience. This video highlights how the competition is shaping the careers of the students involved and making sustainable home design popular. | Video by Matty Greene, Energy Department. Richard King Richard King Director, Solar Decathlon Solar Decathlon 2015 Team Facts: This

  8. T-703: Cisco Unified Communications Manager Open Query Interface Lets

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Obtain Database Contents | Department of Energy 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5

  9. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Decathlon 2013: Let the Building Begin Solar Decathlon 2013: Let the Building Begin Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric Grigorian,

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  11. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  12. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  13. FROM HOT JUPITERS TO SUPER-EARTHS VIA ROCHE LOBE OVERFLOW

    SciTech Connect (OSTI)

    Valsecchi, Francesca; Rasio, Frederic A.; Steffen, Jason H.

    2014-09-20

    Through tidal dissipation in a slowly spinning host star, the orbits of many hot Jupiters may decay down to the Roche limit. We expect that the ensuing mass transfer will be stable in most cases. Using detailed numerical calculations, we find that this evolution is quite rapid, potentially leading to the complete removal of the gaseous envelope in a few gigayears, and leaving behind an exposed rocky core (a {sup h}ot super-Earth{sup )}. Final orbital periods are quite sensitive to the details of the planet's mass-radius relation and to the effects of irradiation and photo-evaporation, but could be as short as a few hours or as long as several days. Our scenario predicts the existence of planets with intermediate masses ({sup h}ot Neptunes{sup )} that should be found precisely at their Roche limit and in the process of losing mass through Roche lobe overflow. The observed excess of small single-planet candidate systems observed by Kepler may also be the result of this process. If so, the properties of their host stars should track those of the hot Jupiters. Moreover, the number of systems that produced hot Jupiters could be two to three times larger than one would infer from contemporary observations.

  14. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  15. Solar Decathlon 2013: Let the Building Begin | Department of Energy

    Energy Savers [EERE]

    Let the Building Begin Solar Decathlon 2013: Let the Building Begin September 30, 2013 - 10:45am Addthis Day 7 Construction 1 of 22 Day 7 Construction During the 7th day of construction, the Solar Decathlon village has started to take shape. The houses open to the public on October 3, 2013 at 11 am. Image: Stefano Paltera, Energy Department Day 7 Construction 2 of 22 Day 7 Construction The University of North Carolina at Charlotte team members assemble their Solar Decathlon entry. Image: Eric

  16. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  17. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    execute arbitrary code. 4) An error within the internal memory mapping of non-local JavaScript variables can be exploited to cause a buffer overflow and potentially execute...

  18. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 -...

  19. T-621: Citrix XenServer Lets Local Administrative Users on the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service May 12, 2011 -...

  20. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  1. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  2. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  3. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  4. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  5. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  6. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service ...

  7. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  8. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  9. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  10. V-179: Blackberry Z10 Flaw Lets Physically Local Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry Z10 Flaw Lets Physically Local Users Access the Device V-179: Blackberry Z10 Flaw Lets Physically Local Users Access the Device June 17, 2013 - 1:09am Addthis...

  11. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host V-194: Citrix XenServer Memory Management Error Lets Local Administrative...

  12. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the...

  13. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions ...

  14. V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target...

  15. V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs...

  16. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  17. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  18. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  19. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  20. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  1. V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April...

  2. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  3. U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain...

  4. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  5. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  6. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  7. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  8. Shrinking the trash heap

    SciTech Connect (OSTI)

    Gillis, A.M.

    1992-02-01

    This article evaluates uses of composted solid wastes. Uses are described for agriculture, horticulture, silviculture, for soil amendments and for land reclamation projects. Researchers are exploring problems related to the availability and toxicity of metals in the compost and the effects of these metals in the food supply. Consumer acceptance has been the major drawback to successful marketing of the product.

  9. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  10. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  11. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Energy Savers [EERE]

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  12. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big

    Energy Savers [EERE]

    Rewards | Department of Energy Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards, as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website. PDF icon Spotlight on Austin, Texas More Documents & Publications Spotlight on Austin, Texas: Best Offer Ever Produces Upgrades in Record Time Spotlight on

  13. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  14. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  15. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  16. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  17. Debate response: Which rate designs provide revenue stability and efficient price signals? Let the debate continue.

    SciTech Connect (OSTI)

    Boonin, David Magnus

    2009-11-15

    Let's engage in further discussion that provides solutions and details, not just criticisms and assertions. Let's engage in a meaningful dialogue about the conditions where real-time pricing or critical peak pricing with decoupling or the SFV rate design with a feebate is most effective. (author)

  18. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  19. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  20. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  1. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Energy Savers [EERE]

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  2. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Energy Savers [EERE]

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  3. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  4. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  5. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  6. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  7. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat...

  8. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    server and command line utilities for server administration. Addthis Related Articles T-671: Red Hat system-config-firewall Lets Local Users Gain Root Privileges V-041: Red Hat...

  9. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  10. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  11. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  12. Let's Try That Again: Selling the Teapot Dome Oil Field | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Let's Try That Again: Selling the Teapot Dome Oil Field Let's Try That Again: Selling the Teapot Dome Oil Field January 30, 2015 - 11:28am Addthis A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. A solitary oil pump at the Teapot Dome Oilfield in Wyoming. | Department of Energy photo. Allison Lantero Allison Lantero Digital Content Specialist, Office of Public Affairs In 1922, President Warren Harding's Interior Secretary Albert Fall found

  13. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  14. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  15. INFOGRAPHIC: Let's Get to Work on Solar Soft Costs | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Let's Get to Work on Solar Soft Costs INFOGRAPHIC: Let's Get to Work on Solar Soft Costs December 2, 2013 - 1:00pm Addthis Learn how soft costs are contributing to the price of solar energy systems in the United States. <a href="http://www.energy.gov/eere/articles/help-solve-solar-s-big-challenge">Learn more about what the Energy Department is doing to lower soft costs and increase deployment of solar energy systems.</a> | Infographic by SunShot Learn how soft costs are

  16. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Energy Savers [EERE]

    Users Access or Modify SSL/TLS Sessions | Department of Energy 6: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  17. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  18. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 7: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  19. Let's Keep Talking: Women in STEM Tweet Up | Department of Energy

    Office of Environmental Management (EM)

    Let's Keep Talking: Women in STEM Tweet Up Let's Keep Talking: Women in STEM Tweet Up April 11, 2012 - 2:37pm Addthis The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department file photo The Energy Department's Dr. Karina Edmonds and Erin Pierce talk to thousands as part of the Women in STEM Tweet Up on March 22, 2012. | Photo credit: Quentin Kruger | Energy Department

  20. Don't Let Your Money and Hot Water Go Down the Drain | Department of Energy

    Office of Environmental Management (EM)

    Don't Let Your Money and Hot Water Go Down the Drain Don't Let Your Money and Hot Water Go Down the Drain December 9, 2008 - 4:00am Addthis John Lippert Do you look at your retirement savings statements and feel like you're sending your money down the drain? Do you deposit more money each paycheck into your retirement account, but find the balance goes down, not up? Pssst, want to invest in a "sure thing?" No, this isn't a scam. It's a device that has no moving parts to break down, but

  1. Effects of estrogen and gender on cataractogenesis induced by high-LET radiation

    SciTech Connect (OSTI)

    Henderson, M.A.; Rusek, A.; Valluri, S.; Garrett, J.; Lopez, J.; Caperell-Grant, A.; Mendonca, M.; Bigsby, R.; Dynlacht, J.

    2010-02-01

    Planning for long-duration manned lunar and interplanetary missions requires an understanding of radiation-induced cataractogenesis. Previously, it was demonstrated that low-linear energy transfer (LET) irradiation with 10 Gy of {sup 60}Co {gamma} rays resulted in an increased incidence of cataracts in male rats compared to female rats. This gender difference was not due to differences in estrogen, since male rats treated with the major secreted estrogen 17-{beta}-estradiol (E2) showed an identical increase compared to untreated males. We now compare the incidence and rate of progression of cataracts induced by high-LET radiation in male and female Sprague-Dawley rats. Rats received a single dose of 1 Gy of 600 MeV {sup 56}Fe ions. Lens opacification was measured at 2-4 week intervals with a slit lamp. The incidence and rate of progression of radiation-induced cataracts was significantly increased in the animals in which estrogen was available from endogenous or exogenous sources. Male rats with E2 capsules implanted had significantly higher rates of progression compared to male rats with empty capsules implanted (P = 0.025) but not compared to the intact female rats. These results contrast with data obtained after low-LET irradiation and suggest the possibility that the different types of damage caused by high- and low-LET radiation may be influenced differentially by steroid sex hormones.

  2. U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

  3. SU-E-T-555: A Protontherapy Inverse Treatment Planning System Prototype with Linear Energy Transfer (LET) Optimization

    SciTech Connect (OSTI)

    Sanchez-Parcerisa, D; Carabe-Fernandez, A

    2014-06-01

    Purpose: Develop and benchmark an inverse treatment planning system (TPS) for proton radiotherapy integrating fast analytical dose and LET calculations in patient geometries and a dual objective function with both dose and LET components, enabling us to apply optimization techniques to improve the predicted outcome of treatments based on radiobiological models. Methods: The software package was developed in MATLAB and implements a fluence-dose calculation technique based on a pencil beam model for dose calculations and a 3D LET model based on the extension of the LET in the radial direction as a function of the predicted radiological pathway. Both models were benchmarked against commissioning data from our institution, dose calculations performed with a commercial treatment planning system and Monte Carlo simulations. The optimization is based on the adaptive simulated annealing approach . Results: The dose and LET calculations were tested in a water phantom and several real patient treatments. The pass rate for the gamma index analysis (3%/3mm) test was above 90% for all test cases analyzed, and the calculation time was of the order of seconds. The inverse planning module produced plans with a significantly higher mean LET in the target compared to traditional plans, without any loss of target coverage. The clinical relevance of this improvement is under consideration . Conclusion: The developed treatment planning system is a valuable clinical and research tool that enables us to incorporate LET effects into proton radiotherapy planning in a streamlined fashion.

  4. Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1 Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Workforce All About Contractors Austin Energy, a municipally owned utility, has a long history of collaborating closely with the building contractors in its area to deliver energy efficiency programs, which benefits both parties involved. Because contractors understand that Austin Energy has made a long-term commitment to supporting energy efficiency, they have been willing to invest time and money into the technical

  5. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  6. V-123: VMware ESX / ESXi libxml2 Buffer Underflow Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    (2044373) Addthis Related Articles U-128: VMware ESXESXi Buffer Overflow and Null Pointer Dereference Lets Local Users Gain Elevated Privileges T-552: Cisco Nexus 1000V...

  7. SU-E-T-354: Peak Temperature Ratio of TLD Glow Curves to Investigate the Spatial Dependence of LET in a Clinical Proton Beam

    SciTech Connect (OSTI)

    Reft, C [UniversityChicago, Chicago, IL (United States); Pankuch, M; Ramirez, H [ProCure Treatment Centers, Warrenville, IL (United States)

    2014-06-01

    Purpose: Use the ratio of the two high temperature peaks (HTR) in TLD 700 glow curves to investigate spatial dependence of the linear energy transfer (LET) in proton beams. Studies show that the relative biological effectiveness (RBE) depends upon the physical dose as well as its spatial distribution. Although proton therapy uses a spatially invariant RBE of 1.1, studies suggest that the RBE increases in the distal edge of a spread out Bragg peak (SOBP) due to the increased LET. Methods: Glow curve studies in TLD 700 show that the 280 C temperature peak is more sensitive to LET radiation than the 210 C temperature peak. Therefore, the areas under the individual temperature peaks for TLDs irradiated in a proton beam normalized to the peak ratio for 6 MV photons are used to determine the HTR to obtain information on its LET. TLD 700 chips with dimensions 0.310.310.038 cc are irradiated with 90 MeV protons at varying depths in a specially designed blue wax phantom to investigate LET spatial dependence. Results: Five TLDs were placed at five different depths of the percent depth dose curve (PDD) of range 16.2 cm: center of the SOPB and approximately at the 99% distal edge, 90%, 75% and 25% of the PDD, respectively. HTR was 1.3 at the center of the SOBP and varied from 2.2 to 3.9 which can be related to an LET variation from 0.5 to 18 KeV/? via calibration with radiation beams of varying LET. Conclusion: HTR data show a spatially invariant LET slightly greater than the 6 MV radiations in the SOBP, but a rapidly increasing LET at the end of the proton range. These results indicate a spatial variation in RBE with potential treatment consequences when selecting treatment margins to minimize the uncertainties in proton RBE.

  8. MOLECULAR MECHANISM OF SUPPRESSION OF NEOPLASTIC TRANSFORMATION BY LOW DOSES OF LOW LET RADIATION

    SciTech Connect (OSTI)

    J.LESIE REDPATH, PH.D.

    2011-03-29

    We are currently funded (9/01-8/04) by the DOE Low Dose Radiation Research Program to examine mechanisms underlying the suppression of neoplastic transformation in vitro by low doses of low LET radiation. For the new studies proposed under Notice 04-21, we intend to follow up on our observation that upregulation of DNA repair may be an important factor and that its importance is dose-dependent. The experimental system will be the human hybrid cell neoplastic transformation assay that we are currently using. We propose to test the following hypothesis: Down-regulation of DNA dsb repair will abrogate the low dose suppression of neoplastic transformation. Using the technique of RNA silencing, it is proposed to test the effect of down-regulation of the two major DNA dsb repair pathways, homologous recombination (HR) and non-homologous end-joining (NHEJ), on the dose response relationship for neoplastic transformation. Based on prior studies, we predict that this will result in abrogation of the suppressive effect at doses in the range 1 to 10 cGy, but not at lower doses. The proposed experiments will also help address the question as to which of the two DNA repair pathways may be the most important in causing suppression of transformation. HR is a pathway that is predominant in S and G2 phase cells and is known to be less error-prone than the NHEJ pathway that is predominant in G1 phase. We hypothesize that down-regulation of HR will result in the most effective abrogation of suppression. An important component of this study will be the determination of the how abrogation of DNA dsb repair impacts the spontaneous transformation frequency, presumably a consequence of endogeneous DNA damage. Experiments will be carried out using partially synchronized populations of cells enriched for G1 and S/G2 respectively. In addition to the endpoint of neoplastic transformation the impact of down-regulation of HR and NHEJ on the formation and disappearance of the DNA dsb marker, gamma-H2AX, will be studied.

  9. Oxidative Stress and Skeletal Health with Low-Dose, Low-LET (Linear Energy Transfer) Ionizing Radiation

    SciTech Connect (OSTI)

    Globus, Ruth K.

    2014-11-03

    We performed in vivo and in vitro experiments to accomplish the following specific aims of this project: 1) determine if low dose, low LET radiation affects skeletal remodeling at structural, cellular and molecular levels and 2) determine if low dose, low LET radiation modulates skeletal health during aging via oxidative mechanisms. A third aim is supported by NASA supplement to this DOE grant focusing on the influence of high LET radiation on bone. A series of experiments were conducted at the NASA Space Radiation Laboratory at Brookhaven, NSRL-BNL, using iron (56Fe) or a sequential exposure to protons / iron / protons, and separate experiments at NASA Ames Research Center (ARC) using 137Cs. The following provides a summary of key findings. (1) Exposure of nine-week old female mice to priming doses of gamma radiation (10cGy x 5) did not significantly affect bone volume/total volume (BV/TV) or microarchitecture as analyzed by 3D microcomputed tomography. As expected, exposure to the challenge dose of 2 Gy gamma irradiation resulted in significant decreases in BV/TV. The priming dose combined with the 2Gy challenge dose had no further effect on BV/TV compared to challenge dose alone, with the sole exception of the Structural Model Index (SMI). SMI reflects the ratio of rods-to-plates in cancellous bone tissue, such that higher SMI values indicate a tendency toward a weaker structure compared to lower SMI values. Mice treated with both priming and challenge dose had 25% higher SMI values compared to sham-irradiated controls and 7% higher values compared to mice treated with the challenge dose alone. Thus, although this priming regimen had relatively modest effects on cancellous tissue, the difference in SMI suggests this fractionated priming doses have adverse, rather than beneficial, effects on bone structure. (2) In 10-week old male mice, a single exposure to 100cGy of 137Cs reduces trabecular bone number and connectivity density by 20% and 36% respectively one month after irradiation (IR). At four months post-IR, these animals were comparable to sham-treated controls with regards to the abovementioned structural parameters. Irradation at 1 or 10 cGy did not result in any significant changes in bone structural parameters. (3) Irradiation of 16-wk old male mice with high doses of 56Fe or proton (50 or 200cGy), but not at low doses (5 or 10cGy), showed a similar loss of cancellous BV/TV and trabecular number at five weeks post-IR. (4) Age-related bone loss overtook acute radiation-induced decrements in bone structure within four months post-IR with 100 cGy gamma and 12 months post-IR with 200 cGy iron. Transgenic mice globally overexpressing human catalase gene in mitochondria did not exhibit cancellous bone loss as assessed at four month post-IR with 10 cGy proton, 50 cGy iron, or in combination. (5) The cellular and molecular mechanisms responsible for loss of bone with radiation are mediated primarily through increased osteoclastogenesis. Our data provide evidence that there are increases in gene expression of TNF alpha and MCP1 in the bone marrow cells 24 hours post-IR and of osteoclastogenic differentiation factor RANKL by day 3. These cytokines in the marrow may stimulate mature osteoclasts or drive osteoclastogenesis from precursors. (6) Osteoblastogenesis from marrow progenitors evaluated ex vivo decreased following whole body 56Fe irradiation at a dose threshold between 20 and 50 cGy whereas osteoclastogenesis ex vivo increased with doses as low as 10cGy two days post-IR of mice. However, the latter finding was not observed in more than a single experiment. (7) Gamma irradiation of cells in vitro requires relatively high doses (200cGy) to disturb normal osteoblastogenesis and osteoclastogenesis as evidenced by decrements in mineralized nodule formation, osteoclast counts, and expression of osteoblast related genes such as runx2, col1a1. (8) We also investigated the effect of antioxidants on osteoblastogenesis following low dose in vitro gamma irradiation (15cGy) on day four bone marrow stromal cell cultures. Super

  10. Heap/stack guard pages using a wakeup unit

    DOE Patents [OSTI]

    Gooding, Thomas M; Satterfield, David L; Steinmacher-Burow, Burkhard

    2014-04-29

    A method and system for providing a memory access check on a processor including the steps of detecting accesses to a memory device including level-1 cache using a wakeup unit. The method includes invalidating level-1 cache ranges corresponding to a guard page, and configuring a plurality of wakeup address compare (WAC) registers to allow access to selected WAC registers. The method selects one of the plurality of WAC registers, and sets up a WAC register related to the guard page. The method configures the wakeup unit to interrupt on access of the selected WAC register. The method detects access of the memory device using the wakeup unit when a guard page is violated. The method generates an interrupt to the core using the wakeup unit, and determines the source of the interrupt. The method detects the activated WAC registers assigned to the violated guard page, and initiates a response.

  11. Global garbage collection for distributed heap storage systems

    SciTech Connect (OSTI)

    Ali, K.A.M.; Haridi, S.

    1986-10-01

    The authors present a garbage-collection algorithm, suitable for loosely-coupled multi-processor systems, in which the processing elements (PEs) share only the communication medium. The algorithm is global, i.e., it involves all the PEs in the system. It allows space compaction, and it uses a system-wide marking phase to mark all accessible objects where a combination of parallel breadth-first/depth-first strategies is used for tracing the object-graphs according to a decentralized credit mechanism that regulates the number of garbage collections messages in the system. The credit mechanism is crucial for determining the space requirement of the garbage-collection messages. Also a variation of this algorithm is presented for systems with high locality of reference. It allows each PE to perform first its local garbage collection and only invokes the global garbage collection when the freed space by the local collector is insufficient.

  12. Real-time Molecular Study of Bystander Effects of Low dose Low LET radiation Using Living Cell Imaging and Nanoparticale Optics

    SciTech Connect (OSTI)

    Natarajan, Mohan; Xu, Nancy R; Mohan, Sumathy

    2013-06-03

    In this study two novel approaches are proposed to investigate precisely the low dose low LET radiation damage and its effect on bystander cells in real time. First, a flow shear model system, which would provide us a near in vivo situation where endothelial cells in the presence of extra cellular matrix experiencing continuous flow shear stress, will be used. Endothelial cells on matri-gel (simulated extra cellular matrix) will be subjected to physiological flow shear (that occurs in normal blood vessels). Second, a unique tool (Single nano particle/single live cell/single molecule microscopy and spectroscopy; Figure A) will be used to track the molecular trafficking by single live cell imaging. Single molecule chemical microscopy allows one to single out and study rare events that otherwise might be lost in assembled average measurement, and monitor many target single molecules simultaneously in real-time. Multi color single novel metal nanoparticle probes allow one to prepare multicolor probes (Figure B) to monitor many single components (events) simultaneously and perform multi-complex analysis in real-time. These nano-particles resist to photo bleaching and hence serve as probes for unlimited timeframe of analysis. Single live cell microscopy allows one to image many single cells simultaneously in real-time. With the combination of these unique tools, we will be able to study under near-physiological conditions the cellular and sub-cellular responses (even subtle changes at one molecule level) to low and very low doses of low LET radiation in real time (milli-second or nano-second) at sub-10 nanometer spatial resolution. This would allow us to precisely identify, at least in part, the molecular mediators that are responsible of radiation damage in the irradiated cells and the mediators that are responsible for initiating the signaling in the neighboring cells. Endothelial cells subjected to flow shear (2 dynes/cm2 or 16 dynes/cm2) and exposed to 0.1, 1 and 10 cGy on coverslips will be examined for (a) low LET radiation-induced alterations of cellular function and its physiological relevance in real time; and (b) radiation damage triggered bystander effect on the neighboring unirradiated cells. First, to determine the low LET radiation induced alteration of cellular function we will examine: (i) the real time transformation of single membrane transporters in single living cells; (ii) the pump efficiency of membrane efflux pump of live cells in real time at the molecular level; (iii) the kinetics of single-ligand receptor interaction on single live cell surface (Figure C); and (iv) alteration in chromosome replication in living cell. Second, to study the radiation triggered bystander responses, we will examine one of the key signaling pathway i.e. TNF- alpha/NF-kappa B mediated signaling. TNF-alpha specific nano particle sensors (green) will be developed to detect the releasing dynamics, transport mechanisms and ligand-receptor binding on live cell surface in real time. A second sensor (blue) will be developed to simultaneously monitor the track of NF-kB inside the cell. The proposed nano-particle optics approach would complement our DOE funded study on biochemical mechanisms of TNF-alpha- NF-kappa B-mediated bystander effect.

  13. T-604: Google Chrome updated version of the Adobe Flash player

    Broader source: Energy.gov [DOE]

    The Chrome Stable channel has been updated to 10.0.648.205 for Windows, Mac, Linux and Chrome Frame. This release contains a new version of Adobe Flash 0-Day CVE-2011-0611. Update also includes a fix for a security vulnerability Critical CVE-2011-1300: Off-by-three in GPU process, CVE-2011-1301: Use-after-free in the GPU process, and CVE-2011-1302: Heap overflow in the GPU process.

  14. V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities ...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    source code repository Addthis Related Articles V-222: SUSE update for Filezilla V-157: Adobe Reader Acrobat Multiple Vulnerabilities V-066: Adobe AcrobatReader Multiple Flaws...

  15. U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Visiting a maliciously crafted website may lead to an unexpected application termination or arbitrary code execution.

  16. T-629: Avaya WinPDM Multiple Buffer Overflow Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities where malicious people are able to gain system access and execute arbitrary code with the privileges of a local user.

  17. T-588: HP Virtual SAN Appliance Stack Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  18. V-148: Novell iPrint Client Unspecified Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Novell iPrint Client, which can be exploited by malicious people to compromise a user's system

  19. U-114: IBM Personal Communications WS File Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability in WorkStation files (.ws) by IBM Personal Communications could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code on vulnerable installations of IBM Personal Communications.

  20. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-108: Net4Switch ipswcom ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to a boundary error within the "CxDbgPrint()" function (cxcmrt.dll) when creating a debug message string.

  2. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in IBM Rational ClearQuest. A remote user can cause arbitrary code to be executed on the target user's system.

  3. V-056: FreeType BDF Glyph Processing Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in FreeType. A remote user can cause arbitrary code to be executed on the target user's system.

  4. T-559: Stack-based buffer overflow in oninit in IBM Informix...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    exploit this vulnerability. The specific flaw exists within the oninit process bound to TCP port 9088 when processing the arguments to the USELASTCOMMITTED option in a SQL query....

  5. V-219: Kingsoft Writer 2012 WPS Font Names Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    Kaveh Ghaemmaghami has discovered a vulnerability in Kingsoft Writer 2012, which can be exploited by malicious people to compromise a user's system.

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  7. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  8. Let's Compare Tritium Design Practices Across The DOE Complex

    Office of Energy Efficiency and Renewable Energy (EERE)

    Presentation from the 32nd Tritium Focus Group Meeting held in Germantown, Maryland on April 23-25, 2013.

  9. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  10. V-098: Linux Kernel Extended Verification Module Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

  11. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SDK and JRE 1.4.233 and prior ABSTRACT: A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or...

  12. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  13. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  14. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  15. V-160: Wireshark Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a crash via specially crafted packets. 6) An error in the MPEG DSM-CC dissector (dissectorspacket-mpeg-dsmcc.c) can be exploited to cause a crash via...

  16. INDUSTRIAL USES OF GEOTHERMAL ENERGY IN THE USA Dr. John W. Lund...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Large scale operations dominate - Gold ore heap leaching - Onion dehydration ... HEAP LEACHING 1 Used in gold recovery from Nevada mines Process consists of ...

  17. Using High Performance Libraries and Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is a user extensible heap manager built on top of jemalloc which enables control of memory characteristics and a partitioning of the heap between kinds of memory (including user...

  18. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  19. T-571: Linux Kernel dns_resolver Key Processing Error Lets Local Users Deny Services

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  20. U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  1. T-601: Windows Kernel win32k.sys Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in the Windows Kernel. A local user can obtain elevated privileges on the target system. A local user can trigger a use-after free or null pointer dereference to execute arbitrary commands on the target system with kernel level privileges.

  2. U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions.

  3. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  4. T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A local user can send spoofed signals to other processes in certain cases.

  5. Let us count the ways. We've built programs that reflect

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We develop computational tools, algorithms and strategies to analyze, understand, create, design and build complex engineered, natural or human systems. Contact Mark Bryden,...

  6. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  7. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  8. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  9. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644, CVE-2012-0585,...

  10. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba....

  11. U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    EMC Documentum Content Server contains a privilege elevation vulnerability that may allow an unauthorized user to obtain highest administrative privileges on the system.

  12. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  13. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  14. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  15. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  16. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny...

    Broader source: Energy.gov (indexed) [DOE]

    unavailable and may cause the domain 0 kernel to panic. There is no requirement for memory sharing to be in use. Impact: A guest kernel can cause the host to become unresponsive...

  17. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  18. T-621: Citrix XenServer Lets Local Administrative Users on the Guest OS Deny Service

    Broader source: Energy.gov [DOE]

    A local administrative user on a guest operating system can interrupt the normal operation of the target hypervisor.

  19. U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges.

  20. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  1. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial...

  2. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  3. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the target system. PLATFORM: VMware Workstation 6.5.5 and 7.1.3 and prior; VIX API for Linux 1.10.2 and prior ABSTRACT: The VMware vmrun utility is susceptible to a local...

  4. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  5. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  6. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  7. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  8. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  9. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  10. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  11. V-218: HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access

    Broader source: Energy.gov [DOE]

    This security update resolves a vulnerability in the HP Service Manager which allows people to have access to unauthorized information

  12. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  13. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  14. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  15. U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player.

  16. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  17. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Device Manager (ASDM) Administrative Access * Telnet Access * SSH Access * Virtual ... Security Focus Bugtraq ID: 45768 SecurityTracker Alert ID: 1024963 CVE-2010-4692 ...

  18. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  19. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  20. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  1. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can create a specially crafted file that, when loaded by the target user, will trigger a memory corruption error in WebKit and execute arbitrary code on the target ...

  2. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  5. Letting the Sun Shine on Solar Costs: An Empirical Investigation of Photovoltaic Cost Trends in California

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.; Cappers, P.; Margolis, R.

    2006-01-01

    This report provides a comprehensive analysis of grid-connected solar photovoltaic (PV) cost trends in California, which is by far the largest PV market in the United States. The findings of this work may help stakeholders to understand important trends in the California PV market, and policymakers to design more effective solar incentive programs--a particularly important objective given the recent announcement from the California Public Utilities Commission (CPUC) to establish an 11-year, $3.2 billion incentive program for customer-sited solar. The study statistically analyzes the installed cost of grid-connected PV systems funded by the state's two largest solar rebate programs, overseen by the California Energy Commission (CEC) [operating since 1998] and the CPUC [operating since 2001].

  6. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  7. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  8. U-017: HP MFP Digital Sending Software Lets Local Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP MFP Digital Sending Software. A local user can obtain potentially sensitive information.

  9. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Kdump uses the SSH "StrictHostKeyCheckingno" option when dumping to SSH targets. A remote user on the local network with the ability to conduct a man-in-the-middle attack can ...

  10. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ...

  11. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSLTLS ... remote user with the ability to conduct a man-in-the-middle attack on an HTTPS connection ...

  12. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server via a MitM (Man-in-the-Middle) ...

  13. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can send an SMS message with a specially crafted User Data Header (UDH) value that specifies an alternate reply address. The recipient's iPhone will display the...

  14. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  15. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  16. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  18. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  19. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2013-1009,...

  20. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1) An unspecified error when handling TeXML files can be exploited to cause memory corruption. 2) A boundary error when handling H.263 encoded movie files can be exploited to...

  1. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system - CVE-2010-1823,...

  2. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system CVE-2011-3016, CVE-2011-3021,...

  3. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    or instant messages. BlackBerry has described a workaround (disabling the use of JavaScript in the BlackBerry Browser) in their advisory. BlackBerry Device storage space...

  4. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  5. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  6. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  7. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g., UDP, TCP) data from the specially crafted IP packet. Nexus 1000v, 5000, and 7000 Series Switches...

  8. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  9. U-227: bind-dyndb-ldap DN Escaping Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in bind-dyndb-ldap, which can be exploited by malicious people to cause a DoS (Denial of Service).

  10. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  11. T-617: BIND RPZ Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    When a name server is configured with a response policy zone (RPZ), queries for type RRSIG can trigger a server crash.

  12. Turn Down the Temp, But Don't Let Your Pipes Freeze! | Department...

    Energy Savers [EERE]

    But she can't be the only person out there who thought of this, so I'd like to remind you all out there: Please, save energy Saving energy is good. But please, please think of ...

  13. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... of Cisco's software license terms found at http:www.cisco.comenUSdocsgeneralwarrantyEnglishEU1KEN.html, or as otherwise set forth at Cisco.com Downloads at http:...

  14. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  15. V-199: Solaris Bugs Let Local Users Gain Root Privileges, Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    recommends applying July Critical Patch Update Addthis Related Articles V-181: Oracle Java SE Critical Patch Update Advisory - June 2013 V-051: Oracle Solaris Java Multiple...

  16. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  17. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  18. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  19. T-591: VMware vmrun Utility Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    The VMware vmrun utility is susceptible to a local privilege escalation in non-standard configurations.

  20. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  1. BLM and NEPA: Lets`s get back to the future

    SciTech Connect (OSTI)

    Meridith, D.P.

    1995-12-01

    This talk is a personalized account of the relationship between The National Environmental Policy Act (NEPA) and the Bureau of Land Management (BLM) and the challenges the BLM faces in the future.

  2. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  3. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  4. V-188: Apache XML Security XPointer Expressions Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability V-188: Apache XML Security XPointer Expressions Processing Buffer Overflow Vulnerability June...

  5. From ZZ to ZH : How Low Can These Cross Sections Go or Everybody, Let's Cross Section Limbo!

    SciTech Connect (OSTI)

    Strauss, Emanuel Alexandre; /SUNY, Stony Brook

    2009-08-01

    We report on two searches performed at the D0 detector at the Fermi National Laboratory. The first is a search for Z di-boson production with a theoretical cross section of 1.4 pb. The search was performed on 2.6 fb{sup -1} of data and contributed to the first observation of ZZ production at a hadron collider. The second is a search for a low mass Standard Model Higgs in 4.2 fb{sup -1} of data. The Higgs boson is produced in association with a Z boson where the Higgs decays hadronically and the Z decays to two leptons. The ZZ search was performed in both the di-electron and di-muon channels. For the ZH search, we will focus on the muonic decays where we expanded the traditional coverage by considering events in which one of the two muons fails the selection requirement, and is instead reconstructed as an isolated track. We consider Higgs masses between 100 and 150 GeV, with theoretical cross sections ranging from 0.17 to 0.042 pb, and set upper limits on the ZH production cross-section at 95% confidence level.

  6. U-193: NetBSD System Call Return Value Validation Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    On Intel CPUs, the sysret instruction can be manipulated into returning to specific non-canonical addresses, which may yield a CPU reset. We cannot currently rule out with utter confidence that this vulnerability could not also be used to execute code with kernel privilege instead of crashing the system.

  7. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  8. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  9. U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions.

  12. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  13. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  14. U-230: Sudo on Red Hat Enterprise Linux %postun Symlink Flaw Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    An updated sudo package that fixes one security issue and several bugs is now available for Red Hat Enterprise Linux 5.

  15. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  16. U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute arbitrary code on the target user's system.

  17. V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Symantec Enterprise Vault (EV) for File System Archiving has an unquoted search path in the File Collector and File PlaceHolder services

  18. U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions.

  19. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  20. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  1. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system

  2. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  3. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Apple OS X. A remote user can execute arbitrary code on the target system. A remote user can obtain a password hash in certain cases. A local user can obtain elevated privileges on the target system. A local user can obtain password keystrokes.

  4. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  5. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization.

  7. T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash.

  8. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  9. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  10. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  11. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  12. Beijing Jike Energy New Technology Development Co Ltd | Open...

    Open Energy Info (EERE)

    China Zip: 100080 Sector: Geothermal energy, Wind energy Product: Focuses on photovoltaics (PV), windPV hybrid power systems and Geothermal heap pump systems. References:...

  13. 4th Quarter 2015 Domestic Uranium Production Report

    U.S. Energy Information Administration (EIA) Indexed Site

    or dissolving-out from mined rock, of the soluble uranium constituents by the natural action of percolating a prepared chemical solution through mounded (heaped) rock material. ...

  14. 2014 Domestic Uranium Production Report

    U.S. Energy Information Administration (EIA) Indexed Site

    or dissolving-out from mined rock, of the soluble uranium constituents by the natural action of percolating a prepared chemical solution through mounded (heaped) rock material. ...

  15. Sandia National Laboratories: Products and Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Gages, Fixtures, Molds Power Sources & Batteries Manufacturing, Shop Overflow through the Manufacturing Processes & Services Department Energy, Security & International Procurement...

  16. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  17. Health effects models for nuclear power plant accident consequence analysis: Low LET radiation: Part 2, Scientific bases for health effects models

    SciTech Connect (OSTI)

    Abrahamson, S.; Bender, M.; Book, S.; Buncher, C.; Denniston, C.; Gilbert, E.; Hahn, F.; Hertzberg, V.; Maxon, H.; Scott, B.

    1989-05-01

    This report provides dose-response models intended to be used in estimating the radiological health effects of nuclear power plant accidents. Models of early and continuing effects, cancers and thyroid nodules, and genetic effects are provided. Two-parameter Weibull hazard functions are recommended for estimating the risks of early and continuing health effects. Three potentially lethal early effects -- the hematopoietic, pulmonary and gastrointestinal syndromes -- are considered. Linear and linear-quadratic models are recommended for estimating cancer risks. Parameters are given for analyzing the risks of seven types of cancer in adults -- leukemia, bone, lung, breast, gastrointestinal, thyroid and ''other''. The category, ''other'' cancers, is intended to reflect the combined risks of multiple myeloma, lymphoma, and cancers of the bladder, kidney, brain, ovary, uterus and cervix. Models of childhood cancers due to in utero exposure are also provided. For most cancers, both incidence and mortality are addressed. Linear and linear-quadratic models are also recommended for assessing genetic risks. Five classes of genetic disease -- dominant, x-linked, aneuploidy, unbalanced translocation and multifactorial diseases --are considered. In addition, the impact of radiation-induced genetic damage on the incidence of peri-implantation embryo losses is discussed. The uncertainty in modeling radiological health risks is addressed by providing central, upper, and lower estimates of all model parameters. Data are provided which should enable analysts to consider the timing and severity of each type of health risk. 22 refs., 14 figs., 51 tabs.

  18. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  19. 'Let the phage do the work': Using the phage P22 coat protein structures as a framework to understand its folding and assembly mutants

    SciTech Connect (OSTI)

    Teschke, Carolyn M., E-mail: Teschke@uconn.ed [Departments of Molecular and Cell Biology, and Chemistry, 91 N. Eagleville Rd., U-3125, University of Connecticut, Storrs, CT 06269-3125 (United States); Parent, Kristin N. [Department of Chemistry and Biochemistry, University of California, San Diego, La Jolla, CA (United States)

    2010-06-05

    The amino acid sequence of viral capsid proteins contains information about their folding, structure and self-assembly processes. While some viruses assemble from small preformed oligomers of coat proteins, other viruses such as phage P22 and herpesvirus assemble from monomeric proteins (Fuller and King, 1980). The subunit assembly process is strictly controlled through protein:protein interactions such that icosahedral structures are formed with specific symmetries, rather than aberrant structures. dsDNA viruses commonly assemble by first forming a precursor capsid that serves as a DNA packaging machine. DNA packaging is accompanied by a conformational transition of the small precursor procapsid into a larger capsid for isometric viruses. Here we highlight the pseudo-atomic structures of phage P22 coat protein and rationalize several decades of data about P22 coat protein folding, assembly and maturation generated from a combination of genetics and biochemistry.

  20. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  2. memP

    Energy Science and Technology Software Center (OSTI)

    2010-02-05

    The lightweight heap profiling tool memP Version 1 provides a library that can be used with MPI applications that make use of heap memory allocations to provide profile data based on the per-task high-water-mark of heap allocation. The memP output is generated as a text report that can present summary information or specific detail of the allocation call site data for each task The memP library source code is based on teh mpiP MPI profilingmore » library (http://mpip.sourceforge.net), but is substantially different in functionality and organization.« less

  3. Programming Tuning Options on Hopper

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for its internal buffers too. When to Use Huge Pages For MPI applications, map the static data andor heap onto huge pages. For SHMEM applications, map the static data and...

  4. V-003: Suse Update For Mozillafirefox - Critical | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    * MFSA 2012-86CVE-2012-4185CVE-2012-4186CVE-2012-4187 CVE-2012-4188 Heap memory corruption issues found using Address Sanitizer * MFSA 2012-87CVE-2012-3990 (bmo787704)...

  5. U-115: Novell GroupWise Client Address Book Processing Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    is vulnerable to an exploit where a malformed address book could cause heap memory corruption, which could lead to remote code execution under the privilege of the user that...

  6. Using High Performance Libraries and Tools

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    High Performance Libraries and Tools Using High Performance Libraries and Tools Memkind Library on Edison The memkind library is a user extensible heap manager built on top of jemalloc which enables control of memory characteristics and a partitioning of the heap between kinds of memory (including user defined kinds of memory). This library can be used to simulate the benefit of the high bandwidth memory that will be available on KNL system on the dual socket Edison compute nodes (the two

  7. U-207: Pidgin 'mxit_show_message()' Function Stack-Based Buffer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    PROBLEM: Pidgin 'mxitshowmessage()' Function Stack-Based Buffer Overflow Vulnerability. PLATFORM: Versions prior to Pidgin 2.10.5 vulnerable. ABSTRACT: Pidgin is prone to a...

  8. 05-05-2010 NNSA-B-10-0144

    National Nuclear Security Administration (NNSA)

    of EnergyNational Nuclear Security Administration (DOENNSA) proposes to modify the overflow lines for the twin, 10,000 (10K) gallon (gal), elevated water storage tanks ...

  9. All Beams 2013.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mass (amu) A MeV Total Energy (MeV) Energy at Bragg Peak (MeV) Range in Si (m) Range at Bragg (m) Range to Bragg Peak (m) Initial LET (vacuum) Initial LET (air) LET at...

  10. Useful Graphs and Charts - Ion Beams - Radiation Effects Facility...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Times 15 MeVu LET vs Range Graph 25 MeVu LET vs Range Graph 40 Mevu LET vs Range Graph Radiation Effects Facility Cyclotron Institute Texas A&M University MS 3366 ...

  11. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users ... Lets Remote Users Obtain Database Contents V-076: Cisco Wireless LAN Controller Bugs Let ...

  12. V-117: Symantec Enterprise Vault for File System Archiving Unquoted...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local...

  13. V-177: VMware vCenter Chargeback Manager File Upload Handling...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

  14. Domestic Uranium Production Report - Quarterly

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3. U.S. uranium mills and heap leach facilities by owner, location, capacity, and operating status Operating status at the end of Owner Mill and Heap Leach1 Facility name County, state (existing and planned locations) Capacity (short tons of ore per day) 2014 1st quarter 2015 2nd quarter 2015 3rd quarter 2015 4th Quarter 2015 Anfield Resources Shootaring Canyon Uranium Mill Garfield, Utah 750 Standby Standby Standby Standby Standby EFR White Mesa LLC White Mesa Mill San Juan, Utah 2,000

  15. Subterranean drilling and in situ treatment of wastes using a contamination control system and methods relating thereto

    DOE Patents [OSTI]

    Jessmore, James J.; Loomis, Guy G.; Pettet, Mark C.; Flyckt, Melissa C.

    2004-09-28

    Systems and methods relating to subterranean drilling while maintaining containment of any contaminants released during the drilling. A thrust block installed over a zone of interest provides an overflow space for retaining any contaminants and excess sealant returns. Negative air pressure may be maintained in the overflow space by a ventilation system. Access ports in the thrust block seal the overflow space from the surrounding environment with a membrane seal. A flexible sack seal in the access port may be connected to a drill shroud prior to drilling, providing containment during drilling after the drill bit penetrates the membrane seal. The drill shroud may be adapted to any industry standard drilling rig and includes a connection conduit for connecting to the flexible sack seal and a flexible enclosure surrounding the drill shaft and of a length to accommodate full extension thereof. Upon withdrawal, the sack seal may be closed off and separated, maintaining containment of the overflow space and the drill shroud.

  16. Valve for controlling solids flow

    DOE Patents [OSTI]

    Staiger, M.D.

    1982-09-29

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and means for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  17. Valve for controlling solids flow

    DOE Patents [OSTI]

    Staiger, M. Daniel (Idaho Falls, ID)

    1985-01-01

    A valve for controlling the flow of solids comprises a vessel having an overflow point, an inlet line for discharging solids into the vessel positioned within the vessel such that the inlet line's discharge point is lower than the vessel's overflow point, and apparatus for introducing a fluidizing fluid into the vessel. The fluidizing fluid fluidizes the solids within the vessel so that they overflow at the vessel's overflow point. For the removal of nuclear waste product the vessel may be placed within a sealed container having a bottom connected transport line for transporting the solids to storage or other sites. The rate of solids flow is controlled by the flow rate of the fluidizing fluid and by V-notch weirs of different sizes spaced about the top of the vessel.

  18. CX-008336: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Pad 90 Overflow Parking Lot Project CX(s) Applied: B1.15 Date: 05/01/2012 Location(s): New York Offices(s): Naval Nuclear Propulsion Program

  19. CX-008202: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Renewable Energy Ground Mounted Photovoltaic Grid System Overflow CX(s) Applied: B5.16 Date: 03/29/2012 Location(s): Other Location Offices(s): Golden Field Office

  20. V-062: Asterisk Two Denial of Service Vulnerabilities | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    user can also exploit this via HTTP and XMPP. IMPACT: An error when handling TCP sessions can be exploited to cause a stack overflow and crash the service. An error...

  1. CX-008279: Categorical Exclusion Determination

    Broader source: Energy.gov [DOE]

    Building 8 Compressor Aftercooler Rupture Disc Overflow Piping Project CX(s) Applied: B1.3, B1.15 Date: 05/09/2012 Location(s): West Virginia Offices(s): National Energy Technology Laboratory

  2. Improving Reuse & Recycling | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Improving Reuse & Recycling series of images of recycling: trash heap, light bulbs, circuit boards diagram for focus area three, improving reuse and recycling (A click on the org chart image will lead to a pdf version that includes hotlinks for the e-mail addresses of the leaders.)

  3. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local ... Scripting and URL Redirection Attacks V-151: RSA Archer eGRC Bugs Let Remote ...

  4. V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

  5. V-227: VMware Workstation and Player vmware-mount Command Flaw...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root...

  6. INDUSTRIAL ASSESSMENT CENTERS: IAC Quarterly Update

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... With a site audit, we can truly set our brain free; let it run amok with ideas for ... got a trusty pair of khakis, boots, and a willingness to let your brain run free on site. ...

  7. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  8. QER- Comment of Xcel Energy

    Broader source: Energy.gov [DOE]

    Attached are the comments of Xcel Energy Services Inc. Please let me know if you have any questions.

  9. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1995-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  10. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1997-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  11. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    1996-04-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 50-250 citations and includes a subject term index and title list.) (Copyright NERAC, Inc. 1995)

  12. Desulfurization of coal and petroleum. (Latest citations from the NTIS bibliographic database). Published Search

    SciTech Connect (OSTI)

    Not Available

    1994-02-01

    The bibliography contains citations concerning the desulfurization of coal, coal liquids, and crude oil. Flotation heap leaching, oxydesulfurization, metal oxide, microwave process, and chlorination are among the pre-combustion processes discussed. Coal liquefaction and gasification are only included if sulfur removal is stressed. Flue gas desulfurization and other post-combustion sulfur control processes are excluded. (Contains 250 citations and includes a subject term index and title list.)

  13. Indian Country Solar Energy Potential Estimates & DOE IE Updates

    Office of Environmental Management (EM)

    Financing Colton Heaps National Renewable Energy Laboratory 1 2 1 Potential 3 Refinement 5 Operations & Maintenance 2 Options 4 Implementation 3 Refinement Potential Options Refinement Implementation Operations & Maintenance 60% Implementation 25% Refinement 10% Design 5% Potential What is a "Project"? A completed project is a business with commercial activity. Parent Entity Project Development Stages - % Resource Inputs, Time/$ Project Entity 3 4 4 Host Electricity Sales (PPA)

  14. The Unobtrusive Memory Allocator

    Energy Science and Technology Software Center (OSTI)

    2003-03-31

    This library implements a memory allocator/manager which ask its host program or library for memory refions to manage rather than requesting them from the operating system. This allocator supports multiple distinct heaps within a single executable, each of which may grow either upward or downward in memory. The GNU mmalloc library has been modified in such a way that its allocation algorithms have been preserved, but the manner in which it obtains regions to managemore » has been changed to request memory from the host program or library. Additional modifications allow the allocator to manage each heap as either upward or downward-growing. By allowing the hosting program or library to determine what memory is managed, this package allows a greater degree of control than other memory allocation/management libraries. Additional distinguishing features include the ability to manage multiple distinct heaps with in a single executable, each of which may grow either upward or downward in memory. The most common use of this library is in conjunction with the Berkeley Unified Parallel C (UPC) Runtime Library. This package is a modified version of the LGPL-licensed "mmalloc" allocator from release 5.2 of the "gdb" debugger's source code.« less

  15. Science Careers in Search of Women | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    now, and let us make our dreams tomorrow's reality." -Malala Yousafzai, 2014 Nobel Peace Prize Laurate Argonne Education, in conjunction with Women in Science and Technology,...

  16. U-267: RSA Authentication Agent 7.1 for Microsoft Windows...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  17. "Title","Creator/Author","Publication Date","OSTI Identifier...

    Office of Scientific and Technical Information (OSTI)

    Genome Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September...

  18. Genome Wide Evaluation of Normal Human Tissue in Response to...

    Office of Scientific and Technical Information (OSTI)

    Wide Evaluation of Normal Human Tissue in Response to Controlled, In vivo Low-Dose Low LET Ionizing Radiation Exposure: Pathways and Mechanisms Final Report, September 2013 Rocke,...

  19. DOE MENTOR-PROTÉGÉ

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... agreement including a schedule of mentoring activities. 3. Mentor andor Protg ... Upon approval from the OSDBU, let the Mentoring begin... WHERE ARE THE OPPORTUNITIES? Site ...

  20. EPA Launches 2014 National Building Competition

    Broader source: Energy.gov [DOE]

    Let the battle begin! The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014 National Building Competition.

  1. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  2. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    have been reported in Puppet Puppet Multiple Vulnerabilities March 13, 2013 V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  3. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  4. JC3 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a critical vulnerability that allows for remote code execution June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A...

  5. USASpending.gov to STARS Reconciliation Initiative (and Procurement...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a visual catalog to help you find the right report - Trainedmentored field reporting ... keeping your site informed * Speak up - Let us know about your problems & concerns ... ...

  6. V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service ... Adapters Interface Processor Vulnerability V-135: Cisco ASA Multiple Bugs Let Remote ...

  7. Pueblo of Laguna Utility Authority

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TRIBAL UTILITY KAWAIKA HANU INTERNET LET US GET YOU CONNECTED Kawaika Hanu is your local internet service provider offering high speed internet with competitive rates. ...

  8. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  9. Energy Efficiency Post-2011 Review Scoping Document and Process...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workgroups, please let BPA know in your submitted comments. I. Overview and Timeline The "Energy Efficiency Post-2011 Review" (Review) is a public process to review and consider...

  10. ALSNews Vol. 327

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Beamlines ALS in the News: Keep Up with Our News Releases, and Let Us Keep Up with Yours Winter 2012 Shutdown Update Ring Leaders: Director's Address Announcements: Science...

  11. Be a Safe and Efficient Winter Driver

    Broader source: Energy.gov [DOE]

    We've been advising you on ways to make the home more energy smart, so let's talk about your car for a moment.

  12. Fermilab F

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    please let us know. Sincerely, Michael Witherell Attachment cc: K. Stanfield H. Montgomery S. Holmes J. Appel Excerpt from April 2004 PAC Recommendations P-938 MINERA...

  13. Voluntary Initiative: Designing Incentives Toolkit | Department...

    Office of Environmental Management (EM)

    & Publications Spotlight on Austin, Texas: Let Your Contractor Be Your Guide for Big Rewards Better Buildings Network View | March 2015 Spotlight on Austin, Texas: Best...

  14. QER- Comment of National Rural Electric Cooperative Association 4

    Broader source: Energy.gov [DOE]

    NRECA is submitting additional comments to supplement the one previously filed on October 3rd. Please let me know if you have any questions.

  15. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  16. How to Apply

    Broader source: Energy.gov [DOE]

    Awards are made through a formal process that has changed dramatically since 2011. So let us walk you through it step by step.

  17. U.S. Department of Energy Interim E-QIP Procedures | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Energy Security Symposium OE Releases Second Issue of Energy Emergency Preparedness Quarterly (April 2012) V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets...

  18. Celebrating and supporting women

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Workshop titles ranged from "Computational Thinking" and "Crystal Craziness" to "Sports Nutrition" and "Ocean Density, Currents and Ice." In the "Let's go to the River ...

  19. Roberson Letter - June 2, 2003

    Office of Environmental Management (EM)

    Advisory Boards (SSABs). Let me extend my appreciation for the time and effort put forth by the SSABs in developing a comprehensive set of recommendations to accelerate...

  20. Fiona Ginty | Inventors | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a new biomarker technology platform against multiple cancers. The Road Taken Culture, art, food and work have all let Fiona travel the world. And she's taken critical lessons...

  1. U-021: Cisco Unified Communications Manager Directory Traversal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability...

  2. Apartment Hunting with an Eye to Energy Savings: Part I

    Broader source: Energy.gov [DOE]

    Apartment hunting can be a long and stressful process. Finding that right place is difficult, let alone finding the right place with the right price.

  3. Web Feedback & Questions - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Web Feedback & Questions Web Feedback & Questions Web Feedback & Questions Email Email Page | Print Print Page |Text Increase Font Size Decrease Font Size Please let us know if you ...

  4. SAND2012-2218P

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... renewable energy sources, grid-scale energy storage, distributed generation and demand response applications that let consumers adjust energy use based on changing energy ...

  5. So What Are We Going to Learn?

    Office of Environmental Management (EM)

    Theseus Professional Services, LLC Results Through Service Excellence Slide 4 CODE COMPUTER PROGRAM SOFTWARE Let Agree on Terms Software Used in the Nuclear Industry Results...

  6. Ion Beams - Radiation Effects Facility / Cyclotron Institute...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Useful Graphs Various ion beams have been developed specifically for the Radiation Effects Facility. These beams provide for a wide scope of LET with high energies for...

  7. Summer in the Arctic | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    ... And let's not forget about summer in the Antarctic, which happens during our winter months. Closely related to NGEE, the Atmospheric Radiation Measurement External link (ARM) ...

  8. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Salapura, Valentina (Chappaqua, NY)

    2010-08-24

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  9. Low latency counter event indication

    DOE Patents [OSTI]

    Gara, Alan G. (Mount Kisco, NY); Salapura, Valentina (Chappaqua, NY)

    2008-09-16

    A hybrid counter array device for counting events with interrupt indication includes a first counter portion comprising N counter devices, each for counting signals representing event occurrences and providing a first count value representing lower order bits. An overflow bit device associated with each respective counter device is additionally set in response to an overflow condition. The hybrid counter array includes a second counter portion comprising a memory array device having N addressable memory locations in correspondence with the N counter devices, each addressable memory location for storing a second count value representing higher order bits. An operatively coupled control device monitors each associated overflow bit device and initiates incrementing a second count value stored at a corresponding memory location in response to a respective overflow bit being set. The incremented second count value is compared to an interrupt threshold value stored in a threshold register, and, when the second counter value is equal to the interrupt threshold value, a corresponding "interrupt arm" bit is set to enable a fast interrupt indication. On a subsequent roll-over of the lower bits of that counter, the interrupt will be fired.

  10. Tailoring Pore Size of Nitrogen-Doped Hollow Carbon Nanospheres for Confi ning Sulfur in LithiumSulfur Batteries

    SciTech Connect (OSTI)

    Zhou, Weidong; Wang, Chong M.; Zhang, Quiglin; Abruna, Hector D.; He, Yang; Wang, Jiangwei; Mao, Scott X.; Xiao, Xingcheng

    2015-08-19

    Three types of nitrogen-doped hollow carbon spheres with different pore sized porous shells are prepared to investigate the performance of sulfur confinement. The reason that why no sulfur is observed in previous research is determined and it is successfully demonstrated that the sulfur/polysulfide will overflow the porous carbon during the lithiation process.

  11. T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Wireshark is prone to multiple denial-of-service and buffer-overflow vulnerabilities. Exploiting these issues may allow attackers to crash the application and deny service to legitimate users. Attackers may also execute arbitrary code in the context of vulnerable users running the application.

  12. Process development of thin strip steel casting

    SciTech Connect (OSTI)

    Sussman, R.C.; Williams, R.S.

    1990-12-01

    An important new frontier is being opened in steel processing with the emergence of thin strip casting. Casting steel directly to thin strip has enormous benefits in energy savings by potentially eliminating the need for hot reduction in a hot strip mill. This has been the driving force for numerous current research efforts into the direct strip casting of steel. The US Department of Energy initiated a program to evaluate the development of thin strip casting in the steel industry. In earlier phases of this program, planar flow casting on an experimental caster was studied by a team of engineers from Westinghouse Electric corporation and Armco Inc. A subsequent research program was designed as a fundamental and developmental study of both planar and melt overflow casting processes. This study was arranged as several separate and distinct tasks which were often completed by different teams of researchers. An early task was to design and build a water model to study fluid flow through different designs of planar flow casting nozzles. Another important task was mathematically modeling of melt overflow casting process. A mathematical solidification model for the formation of the strip in the melt overflow process was written. A study of the material and conditioning of casting substrates was made on the small wheel caster using the melt overflow casting process. This report discusses work on the development of thin steel casting.

  13. SLUDGE PARTICLE SEPAPATION EFFICIENCIES DURING SETTLER TANK RETRIEVAL INTO SCS-CON-230

    SciTech Connect (OSTI)

    DEARING JI; EPSTEIN M; PLYS MG

    2009-07-16

    The purpose of this document is to release, into the Hanford Document Control System, FA1/0991, Sludge Particle Separation Efficiencies for the Rectangular SCS-CON-230 Container, by M. Epstein and M. G. Plys, Fauske & Associates, LLC, June 2009. The Sludge Treatment Project (STP) will retrieve sludge from the 105-K West Integrated Water Treatment System (IWTS) Settler Tanks and transfer it to container SCS-CON-230 using the Settler Tank Retrieval System (STRS). The sludge will enter the container through two distributors. The container will have a filtration system that is designed to minimize the overflow of sludge fines from the container to the basin. FAI/09-91 was performed to quantify the effect of the STRS on sludge distribution inside of and overflow out of SCS-CON-230. Selected results of the analysis and a system description are discussed. The principal result of the analysis is that the STRS filtration system reduces the overflow of sludge from SCS-CON-230 to the basin by roughly a factor of 10. Some turbidity can be expected in the center bay where the container is located. The exact amount of overflow and subsequent turbidity is dependent on the density of the sludge (which will vary with location in the Settler Tanks) and the thermal gradient between the SCS-CON-230 and the basin. Attachment A presents the full analytical results. These results are applicable specifically to SCS-CON-230 and the STRS filtration system's expected operating duty cycles.

  14. Office of Wastewater Management catalog of publications

    SciTech Connect (OSTI)

    1998-09-01

    The contents include: Introduction; Categories of Documents (Biosolids; Construction Grants; Environmental Impact Statements; Federal Registers; Finance; Needs and Assessments; Operation and Maintenance; Permitting Issues; Pollution Prevention and Control; Pretreatment; Small Communities; Storm Water/Combined Sewer Overflows; Treatment; Water Conservation and Efficiency; Water Quality and Standards; and Miscellaneous); and Document Title Index.

  15. RangeTables.xls

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (MeVcmmg) LET vs. Range in Si for 25 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 600 1200 1800 2400 3000 3600 4 He 14 N 22 Ne 0 1 2 3 4 5 6 7 8 9 10 0 100 200 300 400 500...

  16. RangeTables.xlsx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vcmmg) LET vs. Range in Si for 15 MeV SEE Beams (low LET) 4 He 14 N 0 0.5 1 1.5 0 200 400 600 800 1000 1200 1400 Range in Silicon (m) 4 He 14 N 20 Ne 0 1 2 3 4 5 0 50 100 150...

  17. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect (OSTI)

    S. K. Kawatra; T. C. Eisele; K. A. Lewandowski; J. A. Gurtler

    2006-12-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking. This project has identified several acid-resistant binders and agglomeration procedures that can be used for improving the energy efficiency of heap leaching, by preventing the ''ponding'' and ''channeling'' effects that currently cause reduced recovery and extended leaching cycle times. Methods have also been developed for iron ore processing which are intended to improve the performance of pellet binders, and have directly saved energy by increasing filtration rates of the pelletization feed by as much as 23%.

  18. Intel_tools.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ! Cray QBR, Apr 8, 2015 Intel Tools for optimizations HBM tools are available on Edison * The memkind library is a user extensible heap manager. It can be used to test/simulate the benefit of high hand width memory (HBM or HBW) on the dual socket Edison compute nodes today. - Use the QPI bus to simulate slow memory - This is not an accurate model of the bandwidth and latency characteristics of the KNL on package memory, but is a reasonable way to determine which data structures rely critically

  19. Issue

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    01 October 2004 Remembering the B-Complex Piece by piece it was decommissioned through the summer of 2004. August, when the bulldozers arrived to tear down all that remained of buildings B-1 and B-2. 650 NNSA/NSO contractor employees lay in the parking lot, a heap of rubble and debris. The demolition of buildings B-1 and B-2 in the NNSA/NSO Nevada Support Facility complex surprised no one. The buildings were the subject of a lengthy investigation after it was revealed, in March 2002, that a

  20. Domestic Uranium Production Report

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4. U.S. uranium mills by owner, location, capacity, and operating status at end of the year, 2010-14 Owner Mill and Heap Leach1 Facility name County, state (existing and planned locations) Capacity (short tons of ore per day) Operating status at end of the year 2010 2011 2012 2013 2014 EFR White Mesa LLC White Mesa Mill San Juan, Utah 2,000 Operating Operating Operating Operating Processing Alternate Feed Operating-Processing Alternate Feed Energy Fuels Resources Corp Pinon Ridge Mill Montrose,

  1. Indian Country Solar Energy Potential Estimates & DOE IE Updates

    Office of Environmental Management (EM)

    Roles in Renewable Energy Projects Colton Heaps National Renewable Energy Laboratory 1 Federal Tax Incentives * Production Tax Credit (PTC) * Investment Tax Credit (ITC) * Modified Accelerated Cost Recovery System (MACRS) and bonus depreciation 2 Comparison of Tax Incentives PTC ITC Accelerated Depreciation Value Tax credit of 2.3¢/kWh or 1.1¢/kWh, depending on tech Tax credit of 10% or 30% of project costs, depending on tech Depreciation of eligible costs (not all project costs qualify)

  2. Inquiring Minds - Questions About Physics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Getting particles for the accelerator Hi I am 11 and my name is Joshua Pevitz. When I grow up I want to work at Fermilab. I was wondering if you could explain to me about how you let only one atom in the accelerator, if everything is made out of atoms? Your admirer, Joshua Pevitz Dear Joshua, Thanks for your interesting question! Let me give you the simple answer first, and then I will explain. We do not let only one atom at a time into the accelerator. Instead we have more than 10 trillion

  3. System for measuring temporal profiles of scintillation at high and different linear energy transfers by using pulsed ion beams

    SciTech Connect (OSTI)

    Koshimizu, Masanori Asai, Keisuke; Kurashima, Satoshi; Taguchi, Mitsumasa; Kimura, Atsushi; Iwamatsu, Kazuhiro

    2015-01-15

    We have developed a system for measuring the temporal profiles of scintillation at high linear energy transfer (LET) by using pulsed ion beams from a cyclotron. The half width at half maximum time resolution was estimated to be 1.52.2 ns, which we attributed mainly to the duration of the pulsed ion beam and timing jitter between the trigger signal and the arrival of the ion pulse. The temporal profiles of scintillation of BaF{sub 2} at different LETs were successfully observed. These results indicate that the proposed system is a powerful tool for analyzing the LET effects in temporal profiles of scintillation.

  4. Device and method for automated separation of a sample of whole blood into aliquots

    DOE Patents [OSTI]

    Burtis, Carl A. (Oak Ridge, TN); Johnson, Wayne F. (Loudon, TN)

    1989-01-01

    A device and a method for automated processing and separation of an unmeasured sample of whole blood into multiple aliquots of plasma. Capillaries are radially oriented on a rotor, with the rotor defining a sample chamber, transfer channels, overflow chamber, overflow channel, vent channel, cell chambers, and processing chambers. A sample of whole blood is placed in the sample chamber, and when the rotor is rotated, the blood moves outward through the transfer channels to the processing chambers where the blood is centrifugally separated into a solid cellular component and a liquid plasma component. When the rotor speed is decreased, the plasma component backfills the capillaries resulting in uniform aliquots of plasma which may be used for subsequent analytical procedures.

  5. Apparatus and method for continuous separation of magnetic particles from non-magnetic fluids

    DOE Patents [OSTI]

    Oder, Robin R. (Export, PA); Jamison, Russell E. (Lower Burrell, PA)

    2010-02-09

    A magnetic separator vessel (1) for separating magnetic particles from non-magnetic fluid includes a separation chamber having an interior and exterior wall, a top and bottom portion; a magnet (3) having first and second poles (2) positioned adjacent to the exterior wall, wherein the first pole is substantially diametrically opposed to the second pole; a inlet port (5) is directed into the top portion of the separation chamber, wherein the inlet port (5) is positioned adjacent to one of the first and second poles (2), wherein the inlet port (5) is adapted to transfer a mixture into the separation chamber; an underflow port (6) in communication with the bottom portion, wherein the underflow port (6) is adapted to receive the magnetic particles; and an overflow port (9) in communication with the separation chamber, wherein the overflow port (9) is adapted to receive the non-magnetic fluid.

  6. NOVEL BINDERS AND METHODS FOR AGGLOMERATION OF ORE

    SciTech Connect (OSTI)

    S.K. Kawatra; T.C. Eisele; J.A. Gurtler; C.A. Hardison; K. Lewandowski

    2004-04-01

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. Primary examples of this are copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process, and advanced ironmaking processes, where binders must function satisfactorily over an extraordinarily large range of temperatures (from room temperature up to over 1200 C). As a result, operators of many facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of a broad range of mineral agglomeration applications, particularly heap leaching and advanced primary ironmaking.

  7. Novel Binders and Methods for Agglomeration of Ore

    SciTech Connect (OSTI)

    S. K. Kawatra; T. C. Eisele; J. A. Gurtler

    2004-03-31

    Many metal extraction operations, such as leaching of copper, leaching of precious metals, and reduction of metal oxides to metal in high-temperature furnaces, require agglomeration of ore to ensure that reactive liquids or gases are evenly distributed throughout the ore being processed. Agglomeration of ore into coarse, porous masses achieves this even distribution of fluids by preventing fine particles from migrating and clogging the spaces and channels between the larger ore particles. Binders are critically necessary to produce agglomerates that will not break down during processing. However, for many important metal extraction processes there are no binders known that will work satisfactorily. A primary example of this is copper heap leaching, where there are no binders that will work in the acidic environment encountered in this process. As a result, operators of acidic heap-leach facilities see a large loss of process efficiency due to their inability to take advantage of agglomeration. The large quantities of ore that must be handled in metal extraction processes also means that the binder must be inexpensive and useful at low dosages to be economical. The acid-resistant binders and agglomeration procedures developed in this project will also be adapted for use in improving the energy efficiency and performance of other agglomeration applications, particularly advanced primary ironmaking.

  8. ALSNews Vol. 302

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALSNews Vol. 302 Print Wednesday, 30 September 2009 00:00 In This Issue Berkeley Lab Guest House Officially Opens Safety First: Shielding-Control End Points Established Site Access Tied to GERT Training Starting October 1 Harnessing the Bacterial Production of Nanomagnets Eli Rotenberg Awarded First Kai Seigbahn Prize UEC Corner: In Haiku, by Ken Goldberg ALS Science Cafe Attracts Overflow Crowd Shutdown Features Seismic Retrofit, Air Handler Replacement Operations News Links Boron-based

  9. ALSNews Vol. 302

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Print In This Issue Berkeley Lab Guest House Officially Opens Safety First: Shielding-Control End Points Established Site Access Tied to GERT Training Starting October 1 Harnessing the Bacterial Production of Nanomagnets Eli Rotenberg Awarded First Kai Seigbahn Prize UEC Corner: In Haiku, by Ken Goldberg ALS Science Cafe Attracts Overflow Crowd Shutdown Features Seismic Retrofit, Air Handler Replacement Operations News Links Boron-based compounds trick a biomedical protein Gunning for free

  10. 17th Annual ALS Users' Association Meeting

    SciTech Connect (OSTI)

    Robinson, Art; Tamura, Lori

    2004-11-29

    It's not exactly Russian roulette, but scheduling October events outdoors is not risk-free, even in usually sunny California. An overflow crowd of more than 400 registered users, ALS staff, and vendors enjoyed a full indoor program featuring science highlights and workshops spread over two and a half days from October 18 to October 20. However, a major storm, heralding the onset of the San Francisco Bay Area rainy season, posed a few weather challenges for the events on the ALS patio.

  11. LIQUID CYCLONE CONTACTOR

    DOE Patents [OSTI]

    Whatley, M.E.; Woods, W.M.

    1962-09-01

    This invention relates to liquid-liquid extraction systems. The invention, an improved hydroclone system, comprises a series of serially connected, axially aligned hydroclones, each of which is provided with an axially aligned overflow chamber. The chambers are so arranged that rotational motion of a fluid being passed through the system is not lost in passing from chamber to chamber; consequently, this system is highly efficient in contacting and separating two immiscible liquids. (AEC)

  12. NREL: Technology Deployment - Disaster Resiliency and Recovery Example

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project: Galena, Alaska Galena, Alaska Photo of workers building a raised house. New construction in Galena is more resistant to flooding. In May 2013, the Yukon River overflowed its banks with water and ballistic ice, severely damaging 90% of the homes and businesses in the remote Alaskan community of Galena. To help the community recover effectively and prepare for future floods, NREL received funding from the Federal Emergency Management Agency (FEMA) to identify energy-efficient

  13. WTP Calculation Sheet: Determining the LAW Glass Former Constituents and Amounts for G2 and Acm Models. 24590-LAW-M4C-LFP-00002, Rev. B

    SciTech Connect (OSTI)

    Gimpel, Rodney F.; Kruger, Albert A.

    2013-12-16

    The purpose of this calculation is to determine the LAW glass former recipe and additives with their respective amounts. The methodology and equations contained herein are to be used in the G2 and ACM models until better information is supplied by R&T efforts. This revision includes calculations that determines the mass and volume of the bulk chemicals/minerals needed per batch. Plus, it contains calculations (for the G2 model) to help prevent overflow in LAW Feed Preparation Vessel.

  14. Plain Language Training | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Plain Language Training Plain Language Training The Department has an active and popular Plain Language Training Program. Between April 2013 and March 2014, there were six Plain Language Training Classes at Forrestal and two at Germantown, attended by a total of 189 employees and contractors. Classes generally reach their size limit, and overflows are placed in the next scheduled class. Since August 2011, there have been 23 Plain Language Classes at Forrestal and eight at Germantown. In April

  15. Mass-loss evolution of close-in exoplanets: Evaporation of hot Jupiters and the effect on population

    SciTech Connect (OSTI)

    Kurokawa, H.; Nakamoto, T.

    2014-03-01

    During their evolution, short-period exoplanets may lose envelope mass through atmospheric escape owing to intense X-ray and extreme ultraviolet (XUV) radiation from their host stars. Roche-lobe overflow induced by orbital evolution or intense atmospheric escape can also contribute to mass loss. To study the effects of mass loss on inner planet populations, we calculate the evolution of hot Jupiters considering mass loss of their envelopes and thermal contraction. Mass loss is assumed to occur through XUV-driven atmospheric escape and the following Roche-lobe overflow. The runaway effect of mass loss results in a dichotomy of populations: hot Jupiters that retain their envelopes and super Earths whose envelopes are completely lost. Evolution primarily depends on the core masses of planets and only slightly on migration history. In hot Jupiters with small cores (? 10 Earth masses), runaway atmospheric escape followed by Roche-lobe overflow may create sub-Jupiter deserts, as observed in both mass and radius distributions of planetary populations. Comparing our results with formation scenarios and observed exoplanets populations, we propose that populations of closely orbiting exoplanets are formed by capturing planets at/inside the inner edges of protoplanetary disks and subsequent evaporation of sub-Jupiters.

  16. Pacific Northwest Smart Grid Demonstration Project SUCCESS STORIES

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Engineering. "Knowing there was an aging issue with one cable, we thought: let's look at demand response to reduce the load." Failing cable leads to fast launch By September 2010,...

  17. Do we get actual vendor name while we searched with zip code...

    Open Energy Info (EERE)

    let me know? Submitted by SUTHARI on 29 September, 2014 - 08:02 1 answer Points: 0 Hi SUTHARI, we had a bug in the U.S. Utility Rate Database affecting zip codes with leading...

  18. 11-2015 | netl.doe.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of freedom, and let us reconsecrate ourselves to the task of promoting an enduring peace so that their efforts shall not have been in vain." As Americans, we owe a tremendous...

  19. Y-12s Moon Box ? a big hit in Texas

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    not rub against anything that would mar its shiny finish. Then off it went to Texas. In planning this trip, I first considered shipping the Moon Box, but I did not want to let it...

  20. Using the NEW NX Service Yushu Yao NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7, 2011 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 9...

  1. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    14, 13 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 2...

  2. Using the NEW NX Service Yushu Yao NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for them Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 9...

  3. X marks the spot: Researchers confirm novel method for controlling...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    much like changing the settings on iTunes or a stereo lets one explore the behavior of music. This discovery gives fusion researchers a tool to access different intrinsic rotation...

  4. Fascinating Fluids

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    If it gets sticky, dip it back into the solution. What is going on here? Don't let your ball dry on fabric or furniture. Borrow a disposable diaper from someone with a baby. Cut it...

  5. Microsoft Word - Another Way BPA, Request No. HQ-2012-01166-F...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    b5. If you need to see those, let me know. chris -----Original Message----- From: Fishman, Janet Sent: Wednesday, May 30, 2012 1:38 PM To: Morris, Alexander; Washington,...

  6. BPA-2015-01157-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Kraby, David Sent: Monday, April 13, 2015 10:02 AM To: Winn,Kim S (BPA) - CGC-131 Subject: RE: Your Freedom of Information Act Request Thanks Lets only...

  7. DOE Zero Energy Home Webinar: Comprehensive Building Science...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home Webinar: Comprehensive Building Science (Text Version) DOE Zero Energy Home Webinar: ... So let's say that Dan Brown is doing a book reading, so there are lots of people inside, ...

  8. Solar Decathlon Opening | Department of Energy

    Office of Environmental Management (EM)

    Solar Decathlon Opening Solar Decathlon Opening October 6, 2005 - 12:25pm Addthis Remarks Prepared for Energy Secretary Bodman Let me begin by welcoming all of you to this Solar...

  9. BPA-2015-01325-FOIA Request

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Batista de Campos, 285 - Pq. Industrial Bandeirantes II Maring, PR CEP: 87070-080 - Brazil Please let me know if you need anything else. Xi Heverton F. Alto Engenharia Rua...

  10. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a DoS (Denial of Service), and compromise a user's system. February 14, 2013 V-091: Adobe AcrobatReader Bug Lets Remote Users Execute Arbitrary Code Adobe has identified...

  11. JC3 Bulletin Archive | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A vulnerability was reported in McAfee VirusScan Enterprise. February 27, 2013 V-100: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code Several vulnerabilities were...

  12. V-139: Cisco Network Admission Control Input Validation Flaw...

    Broader source: Energy.gov (indexed) [DOE]

    PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A...

  13. Energy-Savings Initiative Event | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    I am glad to be here with you, with Kevin Measel of Lowe's, and with the men and women of this Lowe's store to stress the importance of energy efficiency and conservation. And let ...

  14. OpL^^f-B^ JPL D-1085 D O Technical Information Report SP-100...

    Office of Scientific and Technical Information (OSTI)

    ... Several smsdler DOD contracts are expected to be in place shortly. Early in fiscal year 1984 a contract will be let by JPL to study civiliancommercial missions. NASA has also set ...

  15. J.W. Morris, Jr.

    Office of Scientific and Technical Information (OSTI)

    and how it may be best controlled. 1. Introduction The influence of grain size on the ... Let an array of identical dislocations pile up against a grain boundary under the ...

  16. Energy Saver 101: Home Cooling Infographic | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    While home cooling only accounts for 6 percent of the average home's energy use, it can lead to high energy bills during the warm months. This summer, don't let your energy bills...

  17. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    26, 2013 V-227: VMware Workstation and Player vmware-mount Command Flaw Lets Local Users Gain Root Privileges VMware Workstation and Player contain a vulnerability in the handling...

  18. How the Membrane Protein AmtB Transports Ammonia

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the uncharged NH3 "gas." A Doorway for Letting Ammonia into Cells Like any factory, a biological cell takes in raw materials and energy and expels waste products. What goes in...

  19. QER- Comment of Pepco Holdings, Inc. 2

    Broader source: Energy.gov [DOE]

    Karen: Here are some of our initial thoughts on vulnerability questions for you to consider. Please let me know if you have other specific topics you want us to consider right now.

  20. It's Time to ACT | Department of Energy

    Energy Savers [EERE]

    Americans back to work in the process. There are plenty of actions we can take to reduce oil consumption. Let's start accepting and committing. What do you think? Is it time to...

  1. User-Friendly Model Puts Solar Energy in Your Backyard | OpenEI...

    Open Energy Info (EERE)

    a photovoltaic (PV) system for your home or property, check out the National Renewable Energy Laboratory's In My Backyard (IMBY) tool. It's quick, useful, and-let's just say...

  2. Federal Energy Management Program News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    energy projects. July 18, 2014 EPA Launches 2014 National Building Competition Let the battle begin The U.S. Environmental Protection Agency (EPA) in mid-July launched the 2014...

  3. V-198: Red Hat Enterprise MRG Messaging Qpid Python Certificate...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise MRG Messaging Qpid Python Certificate Validation Flaw Lets Remote Users Conduct Man-in-the-Middle Attacks V-198: Red Hat Enterprise MRG Messaging Qpid Python...

  4. Renewable Energy, Right in Your Back Yard | OpenEI Community

    Open Energy Info (EERE)

    select from "solar" or "wind" energy. Under solar, the application lets you draw your own solar panel square on the roof, input a few values (size, derating, tilt angle, Azimuth...

  5. DOE Tour of Zero: The Johns Island Custom by Amerisips Homes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    low-cost comfort. 15 of 26 Professionally installed high-performance windows let in light but keep out heat. 16 of 26 The air-to-water heat pump is integrated with a...

  6. BBAP ???for EH-53 v2.0

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    security personnel Do not let your truck idle for more than 3 min (unless it is a concrete truck and pumper) Properly maintain and inspect your truck(s) daily for safety issues...

  7. BPA-2012-00477-FOIA Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Zehntbauer,Nicole R - TERG-3 Subject: Troutdale Substation dgn on Sharepoint Site Hello Let me know if you have any problems viewing the data. Thanks, Anne Anne K. Hillyer,...

  8. Geocoded Data | OpenEI Community

    Open Energy Info (EERE)

    Geocoded Data Home > Groups > OpenEI Community Central Hello there open energy community Thank you for the openness in letting me join :) I was searching the open source data...

  9. 2015 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Craig, Ernst, Lisa OutagesDowntimes None Upcoming Downtimes February 11 all day maintenance Other Issues Would like to retire SL53, please let Lisa know who's still using it...

  10. Social poster.pdf

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at the bar. Let's be social Wednesday, 7 October 2015 5:00 - 7:00 PM Users' Center Music Room Contributions of food are welcome, and we encourage you to share your recipe for...

  11. TABLE OF CONTENTS SECTION A: PREINTERVIEW OBSERVATION

    U.S. Energy Information Administration (EIA) Indexed Site

    USED" ON THE FOLDOUT PAGE. CIRCLE EACH "YES" OR "NO.") ELECTRICIT Y J-3. Now, let's talk about electricity. I have circled that electricity is used for (READ EACH USE CIRCLED...

  12. TRI-PARTY AGREEMENT HANFORD PUBLIC INVOLVEMENT PLAN

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    state law. So I think that the two agencies, other than the DOE, should stick to their guns in following their own rules and not letting this federal agency kick them down the...

  13. BPA-2012-00183-CRequest

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information is needed to fulfill this request, please let me know. Thank you, Richard van Dijk Another Way BRA P0 Box 820152 Vancouver, WA 98682 360.453.7260 richard@alderspur.com...

  14. Financial Times-World Energy Council Energy Leaders Summit |...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aggressive action to achieve, is indeed critically important. First, let's look at our heavy reliance on oil. The growth in world oil consumption has been averaging about 1.8...

  15. Segment of Smithsonian Video history interview - December 1987

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The interviewees were George M. Banic, Jr., John M. Googin, Chris P. Keim, Clarence Larson and Robert S. Livingston. Before looking at the specific interviews let's learn a bit...

  16. The Manhattan Project By Terrence R. Fehner and F.G. Gosling

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    At its peak, the project employed 130,000 workers and, by ... to President Roosevelt, informing him that recent research ... bombs, let alone the knowledge of the physics behind ...

  17. I Love Saving Money and Energy | Department of Energy

    Energy Savers [EERE]

    Valentine's Day is all about love-and I love all the quick and easy ways to save money and energy at home How much do I love saving energy and money? Let me count the ways... ...

  18. Look Up to See Your Bills Go Down: Making Your Attic More Efficient...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    from the steel cellar door that let cold air into our house. Photo by Elizabeth Spencer Insulation Troubles: A Story of a House That Never Stayed Warm, Part 2 Weatherization...

  19. V-167: GnuTLS TLS Record Decoding Denial of Service Vulnerability...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls U-226: Linux Kernel SFC Driver TCP MSS Option Handling Denial of Service Vulnerability...

  20. SUBSIDY ENERGY EMPLOYEES TRANSIT (SEET)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Split Benefits If you are receiving a split in benefits, you must email Lynn Proctor, HQ SEET Program Manager at (lynn.proctor@hq.doe.gov) to let her know how you want to receive ...

  1. Fermilab Today

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the MINOS building. Don't let yourself be too attracted by them, though: Coralberry is an invasive species. Photo: Prabhjot Singh, University of Delhi In the News GBN students test...

  2. Equipment-Resources-PHaSe-EFRC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the facility doors remain closed. Do not let unauthorized personnel inside. Do not prop the door open. Do not leave messes in the lab area or in the lab waste baskets. The PV...

  3. Microsoft Word - NNSA Public Scoping Meeting - 10_20_2011

    National Nuclear Security Administration (NNSA)

    ... NNSA 5 will place copies of the transcript from the public meeting 6 on the NNSA web page as soon as practicable. 7 By way of introduction, let me call on Brian 8 Paddock of the ...

  4. Tips to Save Energy During the Holidays | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Don't let your energy-saving efforts fall by the wayside amid all the festivities; the tips below will help you save energy and money even as you celebrate. Use LED Holiday Lights ...

  5. Microsoft PowerPoint - ACTIVE_NYC_2006_1.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ros bud sir bir 16 16.5 17 17.5 18 18.5 -65 -60 -55 -50 -45 -40 T ( C) TIME (hrs) Emerald-2 Anvil microphysics? * Recent theory lets us describe the freezing of soluble...

  6. http://bellview/TeamWorks/TRUTeamWorks.htm

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2003 rd waste shipment arrived at the WIPP site today (Thursday, September 11) from Hanford. It is highly fitting that the facility received its 2003 rd shipment in 2003. Let's...

  7. Enron Documents

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Don't let America's public lands become a corporate oil patch, gas field or coal mine. If we allow this, the American ... gas, may be hazardous to health, injurious to pipeline ...

  8. Energy-Efficient College Life | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let There Be Light Be sure to replace that incandescent bulb in your flexible desk lamp for a brand new LED this semester. Why, you ask? Well, 10% of energy costs in a home can be ...

  9. Department of Energy All-Hands Meeting | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... As the leader of this department, I believe it is my moral and ethical responsibility to take this seriously... and I do. I also take it personally. Let me give you an example. ...

  10. Preparing for a Fun and Energy Efficient Halloween | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Preparing for a Fun and Energy Efficient Halloween Preparing for a Fun and Energy Efficient Halloween October 14, 2014 - 2:51pm Addthis Don't let your energy bill scare you this...

  11. QER- Comment of America's Natural Gas Alliance 3

    Office of Energy Efficiency and Renewable Energy (EERE)

    Apologies – please use this version Karen & John – Please see attached ANGA comments on the QER for Pittsburgh & ND. I had attempted to send these on Friday but just got a bounceback. My sincere apologies as this may have been on our end. Please let me know if this is a problem. Thank you very much and please let me know if you have any questions.

  12. DOE 2014 Biomass Conference

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2014 Biomass Conference Jim Williams Senior Manager American Petroleum Institute July 29, 2014 DRAFT 7/28/14 Let's Agree with the Chicken Developing & Implementing Fuels & Vehicle Standards * Let Free Markets Work - Mandates and subsidies distort the free market - Must meet consumers' needs - Follow automobile company recommendations as found in owner's manuals - Changes must be compatible with transportation fuel infrastructure * Use Sound Science - Adopt a systems approach, addressing

  13. Forest County Potawatomi Community: Installation of Solar Photovoltaic Systems

    Office of Environmental Management (EM)

    Forest County Potawatomi Community Installation of Solar Photovoltaic Systems Presented by: Nathan Karman Legal Department Forest County Potawatomi Community March 27, 2014 "Let us share our natural resources for the good of our People. Let us work for clean air and water and pray for the courage to stand up to those who would abuse our Mother Earth. So be it." - Bemwetek (Elder James Thunder) Excerpt from 2007 Class I Air Redesignation Public Hearing Prayer Community's Commitment to

  14. WE-E-BRE-07: High-Throughput Mapping of Proton Biologic Effect

    SciTech Connect (OSTI)

    Bronk, L; Guan, F; Kerr, M; Dinh, J; Titt, U; Mirkovic, D; Lin, S; Mohan, R; Grosshans, D

    2014-06-15

    Purpose: To systematically relate the relative biological effectives (RBE) of proton therapy to beam linear energy transfer (LET) and dose. Methods: Using a custom irradiation apparatus previously characterized by our group, H460 NSCLCs were irradiated using a clinical 80MeV spot scanning proton beam. Utilizing this system allowed for high-throughput clonogenic assays performed in 96-well tissue culture plates as opposed to the traditional 6-well technique. Each column in the 96-well plate received a set LET-dose combination. By altering the total number of dose repaintings, numerous dose-LET configurations were examined to effectively generate surviving fraction (SF) data over the entire Bragg peak. The clonogenic assay was performed post-irradiation using an INCell Analyzer for colony quantification. SF data were fit to the linear-quadratic model for analysis. Results: Irradiation with increasing LETs resulted in decreased cell survival largely independent of dose. A significant correlation between LET and SF was identified by two-way ANOVA and the extra sum-of-squares F test. This trend was obscured at the lower LET values in the plateau region of the Bragg peak; however, it was clear for LET values at and beyond the Bragg peak. Data fits revealed the SF at a dose of 2Gy (SF2) to be 0.48 for the lowest tested LET (1.55keV/um), 0.47 at the end of the plateau region (4.74keV/um) and 0.33 for protons at the Bragg peak (10.35keV/um). Beyond the Bragg peak we measured SF2s of 0.16 for 15.01keV/um, 0.02 for 16.79keV/um, and 0.004 for 18.06keV/um. Conclusion: We have shown that our methodology enables high-content automated screening for proton irradiations over a range of LETs. The observed decrease in cellular SF in high LET regions confirms an increased RBE of the radiation and suggests further evaluation of proton RBE values is necessary to optimize clinical outcomes. Rosalie B. Hite Graduate Fellowship in Cancer Research, NIH Program Project Grant P01CA021239.

  15. Expansion capacity of an SX unit in uranium process pilot tests

    SciTech Connect (OSTI)

    Courtaud, B.; Auger, F.; Morel, P.

    2008-07-01

    The rising price of uranium has led uranium producers to increase their plant capacity. The new project proposed to increase capacity is based on processing low-grade uranium by heap leaching. It is necessary to modify the plant, particularly the solvent extraction unit, to handle the increased flow. The goal of our study is to determine the minimal changes necessary to process the whole flow. Several stages have been carried out (i) thermodynamic modelling of the solvent extraction process to determine the capacities of the SX plant and the impact of the modification and (ii) pilot tests at the plant of the different configurations proposed by modelling. This paper presents results of the pilot tests performed at the plant. (authors)

  16. Use of solvent extraction technique in Brazilian uranium mills - an overview

    SciTech Connect (OSTI)

    Gomiero, Luiz A.

    2008-07-01

    Solvent extraction has been applied to uranium-concentrate production in Brazil. At the first plant, uranium minerals associated with Zr and Mo were acid leached. Extraction was carried out by a mixture of Alamine 336 and Alamine 304, followed by selective Zr, U, and Mo stripping. At the currently operating facilities, a single U mineral is processed by acid heap leaching. Uranium is extracted with Alamine 336 and stripped with NaCl solution. As all water is recycled, chloride contents in the liquor have increased, causing detrimental effects to the extraction process. The current plant operating conditions and the improvements arisen from the research developed to solve these problems are presented. (authors)

  17. Vessel network detection using contour evolution and color components

    SciTech Connect (OSTI)

    Ushizima, Daniela; Medeiros, Fatima; Cuadros, Jorge; Martins, Charles

    2011-06-22

    Automated retinal screening relies on vasculature segmentation before the identification of other anatomical structures of the retina. Vasculature extraction can also be input to image quality ranking, neovascularization detection and image registration, among other applications. There is an extensive literature related to this problem, often excluding the inherent heterogeneity of ophthalmic clinical images. The contribution of this paper relies on an algorithm using front propagation to segment the vessel network. The algorithm includes a penalty in the wait queue on the fast marching heap to minimize leakage of the evolving interface. The method requires no manual labeling, a minimum number of parameters and it is capable of segmenting color ocular fundus images in real scenarios, where multi-ethnicity and brightness variations are parts of the problem.

  18. Rhizosphere effect of colonizer plant species on the development of soil microbial community during primary succession on postmining sites

    SciTech Connect (OSTI)

    Elhottova, D.; Kristufek, V.; Maly, S.; Frouz, J.

    2009-07-01

    The impact of pioneer plant species Tussilago farfara on structural, functional, and growth characterization of microbial community colonizing the spoil colliery substrate was studied in a laboratory microcosm experiment. Microcosms consisting of spoil substrate (0.7 dm{sup 3} of tertiary alkaline clay sediment from Sokolov brown-coal mine area) from a pioneer site (without vegetation, 5 years after heaping) were cultivated in a greenhouse with one plant of this species. Plant roots substantially increased microbial diversity and biomass after one season (7 months) of cultivation. Roots influenced the microbial community and had nearly twice the size, higher growth, and metabolic potential in comparison to the control. The development of microbial specialists improves the plant nutrient status. Bacterial nitrogen (N{sub 2}) fixators (Bradyrhizobium japonicum, Rhizobium radiobacter) and arbuscular mycorrhizal fungi were confirmed in the rhizosphere of Tussilago farfara.

  19. Engineering assessment of inactive uranium mill tailings: Maybell Site, Maybell, Colorado

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Maybell site in order to revise the October 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Maybell, Colorado. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.6 million dry tons of tailings at the Maybell site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The two alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material (Option I), to disposal of the tailings in a nearby open pit mine and decontamination of the tailings site (Option II). Cost estimates for the two options are about $11,700,000 for stabilization in-place and about $22,700,000 for disposal within a distance of 2 mi. Three principal alternatives for the reprocessing of the Maybell tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and (c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $125 and $165/lb of U/sub 3/O/sub 8/ by heap leach and conventional plant processes, respectively. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery is not economically attractive at present.

  20. Engineering assessment of inactive uranium mill tailings: Maybell Site, Maybell, Colorado. Summary

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Maybell site in order to revise the October 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Maybell, Colorado. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.6 million dry tons of tailings at the Maybell site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The two alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material (Option I), to disposal of the tailings in a nearby open pit mine and decontamination of the tailings site (Option II). Cost estimates for the two options are about $11,700,000 for stabilization in-place and about $22,700,000 for disposal within a distance of 2 mi. Three principal alternatives for the reprocessing of the Maybell tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and (c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $125 and $165/lb of U/sub 3/O/sub 8/ by heap leach and conventional plant processes, respectively. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery is not economically attractive at present.

  1. Engineering assessment of inactive uranium mill tailings: Mexican Hat Site, Mexican Hat, Utah

    SciTech Connect (OSTI)

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Mexican Hat site in order to revise the March 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Mexican Hat, Utah. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 2.2 million tons of tailings at the Mexican Hat site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The four alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of stabilization cover material to removal of the tailings to remote disposal sites and decontamination of the tailings site. Cost estimates for the four options range from about $15,200,000 for stabilization in place, to about $45,500,000 for disposal at a distance of about 16 mi. Three principal alternatives for the reprocessing of the Mexican Hat tailings were examined: heap leaching; treatment at an existing mill; and reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $115/lb of U/sub 3/O/sub 8/ whether by heap leach or conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Reprocessing the Mexican Hat tailings for uranium recovery is not economically attractive under present conditions.

  2. Engineering assessment of inactive uranium mill tailings

    SciTech Connect (OSTI)

    Not Available

    1981-07-01

    The Grand Junction site has been reevaluated in order to revise the October 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Grand Junction, Colorado. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 1.9 million tons of tailings at the Grand Junction site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation are also factors. The eight alternative actions presented herein range from millsite and off-site decontamination with the addition of 3 m of stabilization cover material (Option I), to removal of the tailings to remote disposal sites and decontamination of the tailings site (Options II through VIII). Cost estimates for the eight options range from about $10,200,000 for stabilization in-place to about $39,500,000 for disposal in the DeBeque area, at a distance of about 35 mi, using transportation by rail. If transportation to DeBeque were by truck, the cost estimated to be about $41,900,000. Three principal alternatives for the reprocessing of the Grand Junction tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and (c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $200/lb by heap leach and $150/lb by conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery appears not to be economically attractive.

  3. Summary of the engineering assessment of inactive uranium mill tailings, Shiprock Site, Shiprock, New Mexico

    SciTech Connect (OSTI)

    1981-07-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Shiprock site in order to revise the March 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Shiprock, New Mexico. This engineering assessment has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the investigations of site hydrology and meteorology, and the evaluation and costing of alternative corrective actions. Radon gas released from the 1.5 million dry tons of tailings at the Shiprock site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The eight alternative actions presented in this engineering assessment range from millsite decontamination with the addition of 3 m of the stabilization cover material (Option I), to removal of the tailings to remote disposal sites and decontamination of the tailings site (Options II through VIII). Cost estimates for the eight options range from about $13,400,000 for stabilization in place to about $37,900,000 for disposal at a distance of about 16 miles. Three principal alternatives for the reprocessing of the Shiprock tailings were examined: (a) heap leaching; (b) treatment at an existing mill; and(c) reprocessing at a new conventional mill constructed for tailings reprocessing. The cost of the uranium recovered would be about $230/lb by heap leach and $250/lb by conventional plant processes. The spot market price for uranium was $25/lb early in 1981. Therefore, reprocessing the tailings for uranium recovery is not economically attractive.

  4. Engineering assessment of inactive uranium mill tailings, Gunnison Site, Gunnison, Colorado: summary

    SciTech Connect (OSTI)

    none,

    1981-09-01

    Ford, Bacon and Davis Utah Inc. has reevaluated the Gunnison site in order to revise the November 1977 engineering assessment of the problems resulting from the existence of radioactive uranium mill tailings at Gunnison, Colorado. This evaluation has included the preparation of topographic maps, the performance of core drillings and radiometric measurements sufficient to determine areas and volumes of tailings and radiation exposures of individuals and nearby populations, the ivnvestigations of site hydrology and meteorology, and the evaluation and costing of alternative remedial actions. Radon gas released from the combined 540,000 dry tons of tailings and the 435,400 tons of contaminated waste at the Gunnison site constitutes the most significant environmental impact, although windblown tailings and external gamma radiation also are factors. The 10 alternative actions presented in this engineering assessment range from stabilization of the site in its present location with the addition of 3 m of stabilization cover material (Option I), to removal of the tailings to disposal sites along with decontamination of the Gunnison site (Options II through X). Cost estimates for the 10 options range from about $8,900,000 for stabilization in-place, to about $14,000,000 for disposal in the North Alkali Creek area at a distance of about 18 mi. Truck haulage would be used to transport the tailings and contaminated materials from the Gunnison site to the selected disposal site. Three principal alternatives for the reprocessing of the Gunnison tailings were examined: heap leaching; treatment at an existing mill; and reprocessing at a new conventional mill constructed for tailings reprocesssing. The cost of the uranium recovered would be about $250 and $230/lb of U/sub 3/O/sub 8/ by heap leach and conventional plant processes, respectively. The spot market price for uranium was $25/lb early in 1981.

  5. Alternative methods for degradation studies by alpha radiolysis: tributyl phosphate and CMPO

    SciTech Connect (OSTI)

    Pearson, J.; Nilsson, M.; Miller, G.E.

    2013-07-01

    Solvent extraction separation processes used in the recycling of used nuclear fuel are susceptible to radiolytic damage from radioactive isotopes present in used fuel. Studying the respective effects on matter of both low linear energy transfer (LET) radiation such as gamma radiation and high LET such as alpha radiation will allow for accurate prediction and modeling of process performance losses with respect to dose. The effects of gamma radiation on solvent extraction ligands have been more extensively studied than the effects of alpha radiation due to the inherent difficulty in producing a sufficient and confluent dose of alpha particles within a sample without leaving the sample contaminated with long lived radioactive isotopes. We have developed a method for studying the effects of high LET radiation in situ via {sup 10}B activation and the high LET particles that result from the {sup 10}B(n,a){sup 7}Li reaction which follows. In this study we applied this method to organic solutions of tributyl phosphate (TBP) and CMPO (compound octylphenyl-N, N-diisobutyl-carbamoyl methyl phosphine oxide) representing the PUREX and TRUEX processes respectively. Rates of degradation of TBP and CMPO and their respective degradation products in the presence of both high and low LET radiation are presented and compared to values reported in the literature. Preliminary data appears to show decreased degradation of CMPO in the presence of an aqueous acidic phase, which agrees with other studies performed on TBP solutions. (authors)

  6. 216-B-3 expansion ponds closure plan

    SciTech Connect (OSTI)

    Not Available

    1994-10-01

    This document describes the activities for clean closure under the Resource Conservation and Recovery Act of 1976 (RCRA) of the 216-B-3 Expansion Ponds. The 216-B-3 Expansion Ponds are operated by the US Department of Energy, Richland Operations Office (DOE-RL) and co-operated by Westinghouse Hanford Company (Westinghouse Hanford). The 216-B-3 Expansion Ponds consists of a series of three earthen, unlined, interconnected ponds that receive waste water from various 200 East Area operating facilities. The 3A, 3B, and 3C ponds are referred to as Expansion Ponds because they expanded the capability of the B Pond System. Waste water (primarily cooling water, steam condensate, and sanitary water) from various 200 East Area facilities is discharged to the Bypass pipe (Project X-009). Water discharged to the Bypass pipe flows directly into the 216-B-3C Pond. The ponds were operated in a cascade mode, where the Main Pond overflowed into the 3A Pond and the 3A Pond overflowed into the 3C Pond. The 3B Pond has not received waste water since May 1985; however, when in operation, the 3B Pond received overflow from the 3A Pond. In the past, waste water discharges to the Expansion Ponds had the potential to have contained mixed waste (radioactive waste and dangerous waste). The radioactive portion of mixed waste has been interpreted by the US Department of Energy (DOE) to be regulated under the Atomic Energy Act of 1954; the dangerous waste portion of mixed waste is regulated under RCRA.

  7. Clostridium thermocellum DSM 1313 transcriptional responses to redox perturbation

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sander, Kyle B.; Wilson, Charlotte M.; M. Rodriquez, Jr.; Klingeman, Dawn Marie; Davison, Brian H.; Brown, Steven D.; Rydzak, T.

    2015-12-12

    Clostridium thermocellum is a promising consolidated bioprocessing candidate organism capable of directly converting lignocellulosic biomass to ethanol. Current ethanol yields, productivities, and growth inhibitions are industrial deployment impediments for commodity fuel production by this bacterium. Redox imbalance under certain conditions and in engineered strains may contribute to incomplete substrate utilization and may direct fermentation products to undesirable overflow metabolites. As a result, towards a better understanding of redox metabolism in C. thermocellum, we established continuous growth conditions and analyzed global gene expression during addition of two stress chemicals (methyl viologen and hydrogen peroxide) which changed the fermentation redox potential.

  8. Dynamic pulse difference circuit

    DOE Patents [OSTI]

    Erickson, Gerald L.

    1978-01-01

    A digital electronic circuit of especial use for subtracting background activity pulses in gamma spectrometry comprises an up-down counter connected to count up with signal-channel pulses and to count down with background-channel pulses. A detector responsive to the count position of the up-down counter provides a signal when the up-down counter has completed one scaling sequence cycle of counts in the up direction. In an alternate embodiment, a detector responsive to the count position of the up-down counter provides a signal upon overflow of the counter.

  9. 2001 - 01 | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    January 2001 Wed, 01/24/2001 - 1:00am Accord Could Bring Better Golf Clubs: Tech Breakthroughs Passed to Industry (Times Dispatch) Wed, 01/24/2001 - 1:00am Jefferson Lab, NASA Langley Join Forces (Virginian-Pilot) Thu, 01/04/2001 - 1:00am Economy: Send Northern Virginia's High-Tech Overflow Here (Daily Press) Mon, 01/01/2001 - 1:00am Catherine Westfall Comments on Name Change (Release) Mon, 01/01/2001 - 1:00am DOE's Jefferson Lab: What's in a Name? (Release) Mon, 01/01/2001 - 1:00am High-Tech a

  10. V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: IBM iNotes Multiple Vulnerabilities V-211: IBM iNotes Multiple Vulnerabilities August 5, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in IBM Lotus iNotes PLATFORM: IBM iNotes 9.x ABSTRACT: IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability REFERENCE LINKS: Secunia Advisory SA54436 IBM Security Bulletin 1645503 CVE-2013-3027 CVE-2013-3032 CVE-2013-3990 IMPACT ASSESSMENT: High DISCUSSION: 1) Certain input related

  11. Pyrolysis with cyclone burner

    DOE Patents [OSTI]

    Green, Norman W.; Duraiswamy, Kandaswamy; Lumpkin, Robert E.

    1978-07-25

    In a continuous process for recovery of values contained in a solid carbonaceous material, the carbonaceous material is comminuted and then subjected to flash pyrolysis in the presence of a particulate heat source over an overflow weir to form a pyrolysis product stream containing a carbon containing solid residue and volatilized hydrocarbons. After the carbon containing solid residue is separated from the pyrolysis product stream, values are obtained by condensing volatilized hydrocarbons. The particulate source of heat is formed by oxidizing carbon in the solid residue and separating out the fines.

  12. T-639: Debian update for libxml2 | Department of Energy

    Energy Savers [EERE]

    9: Debian update for libxml2 T-639: Debian update for libxml2 June 7, 2011 - 3:35pm Addthis PROBLEM: libxml2 is vulnerable to buffer overflows, which allowed a crafted XML input file to potentially execute arbitrary code. PLATFORM: Package: libxml2 version 2.7.8. Other versions may also be affected ABSTRACT: Libxml2 XPath Nodeset Processing Vulnerability reference LINKS: Secunia Advisory: SA44817 Secunia Advisory: SA44711 DSA 2255-1 Vulnerability Report: Debian GNU/Linux 6.0 Download Package

  13. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NX to Accelerate X 1 Yushu Yao Thursday, February 14, 13 Using X-Windows * X-Windows let you run graphical user programs (e.g. Emacs, Matlab) on NERSC Machines * We suggest you to use NX for much better X-Windows experience 2 Thursday, February 14, 13 3 Reasons for NX Desktop: * The Pain: I'm used to start my workflow on my windows machine and let it run for a week, where is my desktop now? * Solution: NX gives you a desktop, so you can connect to NERSC resources (such as genepool) and start

  14. On linear groups of degree 2 over a finite commutative ring

    SciTech Connect (OSTI)

    Bashkirov, Evgenii L.; Eser, Hasan

    2014-08-20

    Let p > 3 be a prime number and F{sub p} be a field of p elements. Let K be a commutative and associative ring obtained by adjoining to F{sub p} an element ? such that ? satisfies a polynomial over F{sub p} and a polynomial of the least degree whose root is ? can be written as a product of distinct polynomials irreducible over F{sub p}. We prove that the special linear group SL{sub 2}(K) is generated by two elementary transvections ( (table) ), ( (table) )

  15. Inquiring Minds - Questions About Physics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resonances Dear J. Oldendick, Your questions were forwarded to me. I hope you find these answers helpful. You were right that the answers to the questions about resonances and atomic levels are related, and that the uncertainty principle is involved. Let me get back to them. First you ask, "Why is the cross section for compound nucleus formation not zero between resonances?" In case you are asking this because you've seen a plot of nuclear cross sections, let me point out that the

  16. This Month on Energy Savers: March 2011 | Department of Energy

    Energy Savers [EERE]

    March 2011 This Month on Energy Savers: March 2011 March 30, 2011 - 7:30am Addthis Allison Casey Senior Communicator, NREL Spring is finally here, and soon, so is Earth Month! April 22 is Earth Day, and we at Energy Savers like to celebrate all month. You'll be hearing a lot about Earth Day throughout April, but before we get started, let's take a look back at what happened in March. New or Noteworthy on Energy Savers We want your feedback! Please take the Energy Savers survey and let us know

  17. Purchasing Energy-Efficient Windows | Department of Energy

    Energy Savers [EERE]

    Purchasing Energy-Efficient Windows Purchasing Energy-Efficient Windows October 13, 2008 - 11:29am Addthis John Lippert Windows connect us with the "great outdoors." They let in the light and the rays of the sun and can make even the smallest room seem bright and spacious. Operable windows let fresh air in and stale air out. Windows that are properly selected, well designed and constructed, and properly installed can make a world of difference to a home, helping it to be warm and cozy

  18. Energy Department Launches Apps for Energy | Department of Energy

    Office of Environmental Management (EM)

    Launches Apps for Energy Energy Department Launches Apps for Energy March 22, 2012 - 1:46pm Q&A Have a question about Apps for Energy? Let us know! Ask Us Addthis Design by Hantz Leger Design by Hantz Leger Matthew Loveless Matthew Loveless Data Integration Specialist, Office of Public Affairs How can I participate? For competition news and updates, sign up for our email list using the box on the right. Have a great idea for an app? Let us know at apps@hq.doe.gov. Get ready to change the way

  19. Energy Policy: National Assessments and Tribal Actions

    Office of Environmental Management (EM)

    Thursday, September 24, 2015 Tribal Energy Summit: A Path to Economic Sovereignty "Let us share our natural resources for the good of our People. Let us work for clean air and water and pray for the courage to stand up to those who would abuse our Mother Earth. So be it." - Bemwetek (Elder James Thunder) Excerpt from 2007 Class I Air Redesignation Public Hearing Prayer 2 The People * Potawatomi are part of a confederacy with the Ojibwa (Chippewa) and Odawa (Ottawa), other Algonquins,

  20. Keeping Cool Without Air Conditioning | Department of Energy

    Office of Environmental Management (EM)

    Keeping Cool Without Air Conditioning Keeping Cool Without Air Conditioning August 2, 2013 - 9:50am Addthis Trees can save you energy by blocking sunlight in the summer and letting it through in the winter. | Photo courtesy of ©iStockphoto/blackie Trees can save you energy by blocking sunlight in the summer and letting it through in the winter. | Photo courtesy of ©iStockphoto/blackie Elizabeth Spencer Communicator, National Renewable Energy Laboratory How can I participate? Check out these

  1. Get Ready for Autumn! | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Get Ready for Autumn! Get Ready for Autumn! September 22, 2015 - 6:08pm Addthis Don’t let those bright autumn leaves and clear fall sky fool you—cold weather is just around the corner. Get your home ready for the chill ahead of schedule. <em>Photo by David Parsons, NREL 6317419</em> Don't let those bright autumn leaves and clear fall sky fool you-cold weather is just around the corner. Get your home ready for the chill ahead of schedule. Photo by David Parsons, NREL 6317419

  2. Insulation Troubles: A Story of a House That Never Stayed Warm, Part 2 |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 2 Insulation Troubles: A Story of a House That Never Stayed Warm, Part 2 November 10, 2015 - 4:37pm Addthis An insulated door was an easy upgrade from the steel cellar door that let cold air into our house. Photo by Elizabeth Spencer An insulated door was an easy upgrade from the steel cellar door that let cold air into our house. Photo by Elizabeth Spencer Our contractors layered radiant barriers with dense-pack insulation and sealed air vents. Photo by Elizabeth

  3. William J. Clinton, 2000

    Broader source: Energy.gov (indexed) [DOE]

    1 Administration of William J. Clinton, 2000 / Apr. 22 have the vehicles they want with the effi- ciency they deserve. More than 100 years ago, the great Amer- ican poet Henry Wadsworth Longfellow re- minded us that ''nature is a revelation of God.'' This Earth Day, let us remember that we are only stewards, in our time, of the Earth God gave us for all time. And let us strengthen our resolve to preserve the beauty and the natural bounty that sustains us and must sustain generations yet to come.

  4. POC-SCALE TESTING OF OIL AGGLOMERATION TECHNIQUES AND EQUIPMENT FOR FINE COAL PROCESSING

    SciTech Connect (OSTI)

    1998-01-01

    This report covers the technical progress achieved from October 1, 1997 to December 31, 1997 on the POC-Scale Testing of Oil Agglomeration Techniques and Equipment for Fine Coal Processing project. Experimental test procedures and the results related to the processing of coal fines originating from process streams generated at the Shoal Creek Mine preparation plant, owned and operated by the Drummond Company Inc. of Alabama, are described. Two samples of coal fines, namely Cyclone Overflow and Pond Fines were investigated. The batch test results showed that by applying the Aglofloat technology a significant ash removal might be achieved at a very high combustible matter recovery: · for the Cyclone Overflow sample the ash reduction was in the range 50 to 55% at combustible matter recovery about 98% · for the Pond Fines sample the ash reduction was up to 48% at combustible matter recovery up to 85%. Additional tests were carried out with the Alberta origin Luscar Mine coal, which will be used for the parametric studies of agglomeration equipment at the 250 kg/h pilot plant. The Luscar coal is very similar to the Mary Lee Coal Group (processed at Shoal Creek Mine preparation plant) in terms of rank and chemical composition.

  5. Heat exchanger-accumulator

    DOE Patents [OSTI]

    Ecker, Amir L.

    1980-01-01

    What is disclosed is a heat exchanger-accumulator for vaporizing a refrigerant or the like, characterized by an upright pressure vessel having a top, bottom and side walls; an inlet conduit eccentrically and sealingly penetrating through the top; a tubular overflow chamber disposed within the vessel and sealingly connected with the bottom so as to define an annular outer volumetric chamber for receiving refrigerant; a heat transfer coil disposed in the outer volumetric chamber for vaporizing the liquid refrigerant that accumulates there; the heat transfer coil defining a passageway for circulating an externally supplied heat exchange fluid; transferring heat efficiently from the fluid; and freely allowing vaporized refrigerant to escape upwardly from the liquid refrigerant; and a refrigerant discharge conduit penetrating sealingly through the top and traversing substantially the length of the pressurized vessel downwardly and upwardly such that its inlet is near the top of the pressurized vessel so as to provide a means for transporting refrigerant vapor from the vessel. The refrigerant discharge conduit has metering orifices, or passageways, penetrating laterally through its walls near the bottom, communicating respectively interiorly and exteriorly of the overflow chamber for controllably carrying small amounts of liquid refrigerant and oil to the effluent stream of refrigerant gas.

  6. QER- Comment of Portland General Electric

    Broader source: Energy.gov [DOE]

    Thanks, Karen. As per our email exchange earlier this week, we're attaching prepared comments from PGE to support the statement Jim Piro offered at the QER public meeting in Portland this past summer. We appreciate your flexibility on the submission deadline! Please let me know if you need anything else from us.

  7. QER- Comment of Bay Area Biosolids to Energy Coalition (BAB2E)

    Broader source: Energy.gov [DOE]

    Please Accept the attached written comments as submitted to the: Quadrennial Energy Review: Comment on Public Meeting "Water-Energy Nexus, June 19, 2014, Washington DC Please let me know that you received the comments and that they will be put on the record for this comment period Thank You Paul

  8. QER- Comment of Clean Line Energy Partners LLC

    Broader source: Energy.gov [DOE]

    Hello, Clean Line Energy Partners would like to submit the attached written comments to the QER task force, in conjunction with the verbal comments Jimmy Glotfelty provided today in Newark. Thank you for your consideration, and please let us know if you would like any additional information. Sincerely, Diana Rivera

  9. The effect of low dose ionizing radiation on homeostasis and functional integrity in an organotypic human skin model

    SciTech Connect (OSTI)

    von Neubeck, Claere; Geniza, Matthew; Kauer, Paula M.; Robinson, Joseph E.; Chrisler, William B.; Sowa, Marianne B.

    2015-05-01

    Outside the protection of earths atmosphere, astronauts are exposed to low doses of high linear energy transfer (LET) radiation. Future NASA plans for deep space missions or a permanent settlement on the moon are limited by the health risks associated with space radiation exposures. There is a paucity of direct epidemiological data for low dose exposures to space radiation-relevant high LET ions. Health risk models are used to estimate the risk for such exposures, though these models are based on high dose experiments. There is increasing evidence, however, that low and high dose exposures result in different signaling events at the molecular level, and may involve different response mechanisms. Further, despite their low abundance, high LET particles have been identified as the major contributor to health risk during manned space flight. The human skin is exposed in every external radiation scenario, making it an ideal epithelial tissue model in which to study radiation induced effects. Here, we exposed an in vitro three dimensional (3-D) human organotypic skin tissue model to low doses of high LET oxygen (O), silicon (Si) and iron (Fe) ions. We measured proliferation and differentiation profiles in the skin tissue and examined the integrity of the skins barrier function. We discuss the role of secondary particles in changing the proportion of cells receiving a radiation dose, emphasizing the possible impact on radiation-induced health issues in astronauts.

  10. PDSF Selected Announcements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    October 2011 New nodes going into service October 12, 2011 We are in the process of putting 10 new nodes, pc2629-pc2638 into production today. These nodes each have 12 cores and 48GB of memory. While they have been tested if you see any problems let us know

  11. QER- Comment of Carnegie Mellon University

    Broader source: Energy.gov [DOE]

    Hi John, I hope your other QER review sessions all went well. We very much enjoyed a chance to be a part of the tour. Attached please find the final version of Dr. Gellman’s presentation from July 21 panel discussion. Please let me know if we can provide any additional information or assist again with your efforts. Tim

  12. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nif ica ntl y Re du ce s Lo ng -Te rm Mo rtg ag e Co sts At Co mp let ion , Sh ifts ... ifi ca nt ly Re du ce s Lo ng -T er m Mo rtg ag e Co st s At Co m pl et io n, Sh ift ...

  13. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    up to 75 Sq ua re Mi les (58 6 to 75 ) Sig nif ica ntl y Re du ce s Lo ng -Te rm Mo rtg ag e Co sts At Co mp let ion , Sh ifts Em ph as is an d Re so urc es to Fu ll Sc ale ...

  14. SLAC All Access: X-ray Microscope

    ScienceCinema (OSTI)

    Nelson, Johanna; Liu, Yijin

    2014-06-13

    SLAC physicists Johanna Nelson and Yijin Liu give a brief overview of the X-ray microscope at the Stanford Synchrotron Radiation Lightsource (SSRL) that is helping improve rechargeable-battery technology by letting researchers peek into the inner workings of batteries as they operate.

  15. QER- Comment of Process Gas Consumer Group

    Broader source: Energy.gov [DOE]

    Hello, Attached are comments offered by the Process Gas Consumers Group in response to the August 25, 2014 Federal Register Notice soliciting comments on issues related to the Quadrennial Energy Review. Please let us know if you have any questions or would like any additional information.

  16. QER- Comment of American Gas Association 1

    Broader source: Energy.gov [DOE]

    Attached please find AGA's comments on methane emissions issues in the first phase of the DOE Quadrennial Energy Review (QER), consisting of a cover letter and attachments. Dr. Kathryn Clay will be submitting AGA's comments on other aspects of the QER. Please let me know if you have any questions.

  17. T-597: WordPress Multiple Security Vulnerabilities

    Broader source: Energy.gov [DOE]

    Attackers can exploit these issues to perform unauthorized actions in the context of the logged-in user, crash the affected application and therefore deny service to legitimate users, or execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials or launch other attacks.

  18. Slide 1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    95 Wa ste Sit es Re me dia ted 9 23 ,00 0 To ns of So il Re mo ved Fin al Re me dia tio n of 61 8-1 0 & 618 -11 Bu ria l Gr ou nd s Co mp let e 40 0 A re a Fa st Flu...

  19. 2007: make or break for emissions trading

    SciTech Connect (OSTI)

    Vitelli, A.

    2006-11-15

    With the Kyoto Protocol's first compliance period beginning in 2008, much of 2007 will be focussed on implementing the institutions needed to ensure the Protocol's effectiveness. The big unknown is whether governments and international bodies can make tough decisions in time to let the emissions market function effectively to reduce greenhouse gases.

  20. Multiphysics Object-Oriented Simulation Environment (MOOSE)

    ScienceCinema (OSTI)

    None

    2013-05-28

    Nuclear reactor operators can expand safety margins with more precise information about how materials behave inside operating reactors. INL's new simulation platform makes such studies easier & more informative by letting researchers "plug-n-play" their mathematical models, skipping years of computer code development.