National Library of Energy BETA

Sample records for information disclosure attacks

  1. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  2. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  3. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  4. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  5. U-181: IBM WebSphere Application Server Information Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execution Vulnerability U-272: IBM WebSphere Commerce User Information Disclosure Vulnerability T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site ...

  6. Environmental Information Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Disclosure Summary New Jersey's 1999 electric utility restructuring law requires electricity suppliers to disclose to customers details regarding the fuel mix and emissions of...

  7. U-181: IBM WebSphere Application Server Information Disclosure

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 81: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in

  8. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  9. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  10. Non-Disclosure Agreements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Non-Disclosure Agreements Non-Disclosure Agreements Facilitate initial interactions between Los Alamos National Laboratory and a potential industrial partner on specific technical areas Contact NDA Team Richard P. Feynman Center for Innovation (505) 667-9911 Email A Non-Disclosure Agreement (NDA) protects proprietary information provided by one party to another from further disclosure. This agreement is frequently used to cover initial interactions between Los Alamos National Laboratory and a

  11. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  12. Technical Proposal Disclosure Policy - ITER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposal Disclosure Policy - ITER Pursuant to this solicitation, UT-Battelle will treat confidential proposal information as such and will disclose such information on a need to ...

  13. Energy Disclosure and Leasing Standards: Best Practices

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on Energy Disclosure and Leasing Standards: Best Practices.

  14. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  15. U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability

    Broader source: Energy.gov [DOE]

    If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password.

  16. OMB Burden Disclosure Statement

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    71.1 OMB Control Number (09/2012) (Classification) OMB Burden Disclosure Statement 1910-1800 Public reporting burden for this collection of information is estimated to average 10 (minutes) per response, including the time for reviewing instructions, searching exist ing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comme nts regarding this estimate or any other aspect of this information, including suggestions for

  17. Disarmament and disclosure: How arms control verification can proceed without threatening confidential business information

    SciTech Connect (OSTI)

    Kellman, B.; Gualtieri, D.S.; Tanzman, E.A.

    1995-12-31

    International security requires reductions in the quantity and availability of catastrophic weaponry. Arms control negotiators are responding to this challenge by finalizing pivotal new initiatives. This progress should, however, be met with more than mere applause--the implications of arms control must be understood, potential problems must be identified, and solutions must be proposed. In this Article, the authors examine an issue raised by the strategic Arms Reduction Treaty (START) and the Chemical Weapons Convention (CWC): how to verify compliance while protecting confidential business information (CBI). The concern is that the verification of arms control treaties requires the ability to investigate private industrial activities, and that this requirement risks revelation of valuable information in an uncertain legal environment. Since cooperation from the private sector is essential to the implementation of these treaties, methods must be devised to assure industries of the sanctity of their commercial information. The Article consists of three additional parts. Part 2 describes in detail the modalities of arms control verification, focusing on two recently signed agreements: the Strategic Arms Reduction Treaty and the Chemical Weapons Convention. Parts 3 and 4 address the threat that verifying these treaties poses to the confidentiality of valuable information. Part 3 considers problems of CBI loss due to the activities of inspectors and officials gaining access to private information. Part 4 considers the possibility that CBI will be lost due to the operation of US law. Each part suggests strategies to protect CBI and provides examples of relevant federal legislation.

  18. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  19. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    end-use customers. This information must be provided to customers quarterly "in plain English." Electricity suppliers must also file a copy of their energy source disclosure...

  20. Advanced Topics for the Portfolio Manager Initiative: Energy Disclosure Policy Implementation

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Energy Disclosure Policy Implementation

  1. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  2. Privacy Act Disclosures | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Disclosures Disclosures of personal information maintained by an agency is limited and defined by the Act. Agencies shall not disclose any record contained in a system of records to any person, or to another agency, without the written consent of the individual to whom the record pertains unless disclosure of the record would be: to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties; required under the Freedom

  3. Energy Performance Benchmarking and Disclosure Policies for Public and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commercial Buildings | Department of Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings This presentation is part of the SEE Action Series and provides information on Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings Presentation (6.87 MB) Transcript (126.5 KB) More Documents & Publications

  4. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  5. Energy Benchmarking and Disclosure

    Broader source: Energy.gov [DOE]

    Energy benchmarking and disclosure is a market-based policy tool used to increase building energy performance awareness and transparency among key stakeholders and create demand for energy efficiency improvements.

  6. Environmental Disclosure Program

    Broader source: Energy.gov [DOE]

    The PSC created New York’s Environmental Disclosure Program via an order issued in December 1998. This program has been modified several times since it was established. A November 2008 PSC order...

  7. Golden Reading Room: FOIA Proactive Disclosures and Contracts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Proactive Disclosures and Contracts Golden Reading Room: FOIA Proactive Disclosures and Contracts Below are electronic versions of Golden Field Office Reading Room documents that were created after November 1, 1996, per the requirements of the Electronic Freedom of Information Act Amendment of 1996. Most documents are available in Adobe Acrobat Portable Document Format (PDF). 2013 Solar Decathlon Information Click on this link for updates: Solar Decathlon Information. Alliance for

  8. Commercial and Multifamily Building Benchmarking and Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Multifamily Building Benchmarking and Disclosure Commercial and Multifamily Building Benchmarking and Disclosure Better Buildings Residential Network Peer Exchange Call: ...

  9. Generation Disclosure | Open Energy Information

    Open Energy Info (EERE)

    StateProvincial Govt Systems Integrator Transportation Tribal Government Utility Natural Gas Yes Competitive Bidding Process for Electric Distribution Companies'...

  10. Disclosure of Lobbying Activities

    Broader source: Energy.gov [DOE]

    This disclosure form shall be completed by the reporting entity, whether subawardee or prime federal recipient, at the initiation or receipt of a covered federal action, or a material change to a previous filing, pursuant to title 31 U.S.C. section 1352.

  11. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Fuel Disclosure: Virginia’s 1999 electric industry restructuring law requires the state's electricity providers to disclose -- "to the extent feasible" -- fuel mix and emissions data regarding...

  12. Disclosure of Permitted Communication Concerning Regional Standards...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards ... More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel ...

  13. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  14. E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho ...

  15. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  16. invention disclosures | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    invention disclosures CMI Invention Disclosures Success for the Critical Materials Institute will be defined by how well it meets its mission to assure supply chains of materials critical to clean energy technologies. To enable innovation in U.S. manufacturing and to enhance U.S. energy security, CMI must develop, demonstrate, and deploy clean energy technology. To direct research in a way to minimize the time to discovery and the time between discovery and deployment, the CMI team includes both

  17. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-01

    This Notice addresses the Executive Branch confidential disclosure requirements. These requirements apply to career GS (GM) employees.

  18. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  19. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  20. Disclosures, Disclaimers and Policies | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclosures, Disclaimers and Policies Home > Disclosures, Disclaimers and Policies Financial Disclosures GE Global Research financial disclosures and conflicts related to PHS-funded research Equal Employment Opportunity Plans Persons wishing to review GE Global Reasearch's EEOP should contact the GEGR Recruiting Manager: Megan Magee, GRC Recruiting Leader, 518-387-6703, magee@ge.com. From GE Global Research https://twitter.com/GEResearch

  1. Commercial and Multifamily Building Benchmarking and Disclosure

    Broader source: Energy.gov [DOE]

    Better Buildings Residential Network Peer Exchange Call: Commercial and Multifamily Building Benchmarking and Disclosure, Call Slides, July 25, 2013.

  2. Confidential Financial Disclosure Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Confidential Financial Disclosure Report Confidential Financial Disclosure Report Confidential Financial Disclosure Report (263.01 KB) More Documents & Publications Restrictions on Federal Employees Acceptance of Gifts DATA REPORT ON SPOUSE/COHABITANT DOE Advisory Committee Members' Ethics and Conflict of Interest Guidance

  3. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  4. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure...

  5. Fuel Mix Disclosure

    Broader source: Energy.gov [DOE]

    In January 1999, the Colorado Public Utility Commission (PUC) adopted regulations requiring the state's utilities to disclose information regarding their fuel mix to retail customers. Utilities are...

  6. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  7. Carbon Disclosure Project | Open Energy Information

    Open Energy Info (EERE)

    management, it aims to encourage the development of a common emissions measurement methodology and to facilitate its integration into general investment analysis. References:...

  8. Fuel Mix Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Website http:www.commerce.wa.govProgramsEnergyOfficeUtilitiesPagesFuelMi... State Washington Program Type Generation Disclosure Summary Washington's retail electric...

  9. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Florida Program Type Generation Disclosure Summary In March 1999, the Florida Public Service Commission issued an order requiring the state's investor-owned electric utilities,...

  10. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    environmental disclosure requirements and consumer protection standards for green power marketing. The PSC's rules require all electric suppliers to disclose to the commission...

  11. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-01

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees. (Replaces DOE N 326.7).

  12. Annual Confidential Financial Disclosure Report (SF 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-10-13

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to persons employed at the GS-15 level and below, except for Schedule C appointees.

  13. Leveraging Portfolio Manager for Disclosure and Green Leasing...

    Energy Savers [EERE]

    Portfolio Manager for Disclosure and Green Leasing Practices Leveraging Portfolio Manager for Disclosure and Green Leasing Practices A talk about developing paths and implementing ...

  14. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Investor-Owned Utility Municipal Utilities Cooperative Utilities Program Info Sector Name ...

  15. Energy Performance Benchmarking and Disclosure Policies for Public...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings ...

  16. Benchmarking and Disclosure: State and Local Policy Design Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language State and local policy design guide. Benchmarking and Disclosure: State and Local Policy ...

  17. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  18. Confidential Business Information

    Broader source: Energy.gov (indexed) [DOE]

    Confidential Business Information Pursuant to 10 CFR 1004.11, any person submitting information that he or she believes to be confidential and exempt by law from public disclosure ...

  19. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection

  20. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  1. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  2. Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-09-20

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  3. Disclosure of Permitted Communication Concerning Fossil Fuel...

    Broader source: Energy.gov (indexed) [DOE]

    the rulemaking referenced above. The communications occurred at a meeting held on February 13, 2013. DOE 433 ex parte memo.pdf (16.1 KB) More Documents & Publications Disclosure of ...

  4. Confidential Financial Disclosure Reports (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-09

    The directive establishes requirements and responsibilities for Departmental elements and employees regarding filing Confidential Financial Disclosure Reports (OGE Form 450) in accordance with the Ethics in Government Act of 1978, as amended.

  5. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  6. E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory (251.63 KB) More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory Integrated Safety Management Workshop

  7. Building Energy Rating and Disclosure Policies | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Energy Rating and Disclosure Policies Building Energy Rating and Disclosure Policies Contains best practice documentation for establishing municipal funds for energy efficiency projects. Building Energy Rating and Disclosure Policies (2.39 MB) More Documents & Publications Overcoming Multifamily Sector Barriers in Austin, Texas Pecan Street Project Energy Audit and Retro-Commissioning Policies for Public and Commercial Buildings

  8. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    Unclassified Controlled Nuclear Information (UCNI) Software that is protected by law from disclosure to persons not having a need-to-know for the information without ...

  9. About EIA - Policies - U.S. Energy Information Administration...

    Gasoline and Diesel Fuel Update (EIA)

    This includes materials exempted from disclosure by other statutes as well as confidential, commercial, and financial information. What types of materials are available without ...

  10. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  11. HIPAA Authorization for Release of Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HIPAA AUTHORIZATION FOR RELEASE OF INFORMATION I. Information about the Use or Disclosure I hereby authorize the use and disclosure of protected health information as described below. Patient's full name: Date of Birth: Persons/organizations (or class of persons/organizations) authorized to use and disclose the information: Argonne National Laboratory Employee Benefits Department Persons/organizations (or class of persons/organizations) authorized to receive and use the information: Specific

  12. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Electricity suppliers and electricity companies must also provide a fuel mix report to customers twice annually, within the June and December billing cycles. Emissions information must be disclos...

  13. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  14. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  15. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  16. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  17. CMI Invention Disclosures | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CMI Invention Disclosures Success for the Critical Materials Institute will be defined by how well it meets its mission to assure supply chains of materials critical to clean energy technologies. To enable innovation in U.S. manufacturing and to enhance U.S. energy security, CMI must develop, demonstrate, and deploy clean energy technology. To direct research in a way to minimize the time to discovery and the time between discovery and deployment, the CMI team includes both research and

  18. Lobbyist Disclosure Form - John Thorne | Department of Energy

    Energy Savers [EERE]

    Lobbyist Disclosure Form - John Thorne John inquired whether there were any open solicitations for biofuels projects under 1703 and 1705. He was told there were no open ...

  19. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    restructuring legislation, Illinois established provisions for the disclosure of fuel mix and emissions data. All electric utilities and alternative retail electric...

  20. Energy Benchmarking, Rating, and Disclosure for Local Governments...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Local Governments Energy Benchmarking, Rating, and Disclosure for Local Governments Existing Commercial Buildings Working Group fact sheet about energy benchmarking. Energy ...

  1. Public Financial Disclosure Reports Filed by the Secretary and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public ...

  2. Registered_Lobbyist_Contact_Disclosure_Form.pdf | Department...

    Broader source: Energy.gov (indexed) [DOE]

    (32.32 KB) More Documents & Publications Lobbyist Disclosure Form - AltEn Interested Parties - Shipp Interested Parties - Smith Dawson & Andrews

  3. V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

  4. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  5. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  6. OSTI, US Dept of Energy Office of Scientific and Technical Information...

    Office of Scientific and Technical Information (OSTI)

    be properly marked with a restrictive legend identifying the agreed-to period of ... a Protected CRADA Information Restrictive Legend noted below to prevent disclosure of such ...

  7. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  8. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  9. Modeling veterans healthcare administration disclosure processes : CY 2012 summary.

    SciTech Connect (OSTI)

    Beyeler, Walter Eugene; DeMenno, Mercy B.; Finley, Patrick D.

    2013-09-01

    As with other large healthcare organizations, medical adverse events at the Department of Veterans Affairs (VA) facilities can expose patients to unforeseen negative risks. VHA leadership recognizes that properly handled disclosure of adverse events can minimize potential harm to patients and negative consequences for the effective functioning of the organization. The work documented here seeks to help improve the disclosure process by situating it within the broader theoretical framework of issues management, and to identify opportunities for process improvement through modeling disclosure and reactions to disclosure. The computational model will allow a variety of disclosure actions to be tested across a range of incident scenarios. Our conceptual model will be refined in collaboration with domain experts, especially by continuing to draw on insights from VA Study of the Communication of Adverse Large-Scale Events (SCALE) project researchers.

  10. Confidential Business Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Confidential Business Information Pursuant to 10 CFR 1004.11, any person submitting information that he or she believes to be confidential and exempt by law from public disclosure should submit via email, postal mail, or hand delivery/courier two well-marked copies: One copy of the document marked ''confidential'' including all the information believed to be confidential, and one copy of the document marked ''non-confidential'' with the information believed to be confidential deleted. Submit

  11. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  12. Public Financial Disclosure Reports Filed by the Secretary and Deputy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secretary | Department of Energy Financial Disclosure Reports Filed by the Secretary and Deputy Secretary Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary The Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public Financial Disclosure Report (OGE 278) filed by the President, the Vice President, and any officer occupying a position at Levels I and II of the Executive Schedule as defined by 5 U.S.C. §§ 5312 and 5313. At the

  13. Leveraging Portfolio Manager for Disclosure and Green Leasing Practices

    Broader source: Energy.gov [DOE]

    A talk about developing paths and implementing rating and disclosure policies for the commercial building sector, giving a state, local and federal overview of these types of policies and where they’re in play.

  14. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  15. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  16. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  17. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  18. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  19. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  20. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  1. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  2. RCW - 90.52 - Pollution Disclosure Act of 1971 | Open Energy...

    Open Energy Info (EERE)

    2 - Pollution Disclosure Act of 1971 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: RCW - 90.52 - Pollution Disclosure Act...

  3. Benchmarking and Disclosure: State and Local Policy Design Guide and Sample

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy Language | Department of Energy and Disclosure: State and Local Policy Design Guide and Sample Policy Language Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language State and local policy design guide. Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language More Documents & Publications Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language Accessing DOE's Many Energy

  4. What is the Freedom of Information Act (FOIA)?

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EXTERNAL AFFAIRS What is the Freedom of Information Act (FOIA)? The Freedom of Information Act (FOIA) is a federal mandatory disclosure statute that affords individuals the right, enforceable in court, to obtain access to federal agency records, unless the records (or a part of the records) are protected from public disclosure by any of the nine exemptions contained in the law or by any one of three special law enforcement record exclusions. The FOIA contained in Title 5, United States Code,

  5. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  6. Lobbyist Disclosure Form - First Solar | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    First Solar Lobbyist Disclosure Form - First Solar Susan Richardson, Energy Department loan programs chief counsel; Douglas Schultz, Energy Department senior investment officer; Andrzej Potasinski, Energy Department senior investment officer; Nancy Donovan, Energy Department general counsel; and Jonathan Silver, Energy Department loans program executive director, discussed the status of the First Solar Topaz Project with Kathleen Weiss, First Solar government relations vice president. Lobbyist

  7. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. Cancels DOE N 326.13.

  8. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  9. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  10. Fuel Mix Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1998, the Pennsylvania Public Utility Commission (PUC) adopted rules requiring retail electricity suppliers to "respond to reasonable requests made by consumers for information...

  11. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    customers. Such information must be provided on customers' bills or as a bill insert once annually. The fuel mix is also published in annual reports. Source http:...

  12. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  13. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  14. RAPID/Roadmap/6-NV-c | Open Energy Information

    Open Energy Info (EERE)

    mud slide, snowstorm, drought, fire, explosion, electrical outage, attack, sabotage or toxic spill or other spill that could pose a health hazard information from the State...

  15. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  16. Carbon Disclosure Project Webinar: Climate Change: A Challenge for Bond Analysts

    Broader source: Energy.gov [DOE]

    Hosted by the Carbon Disclosure Project, this webinar will cover climate change and how its impacts can present significant risks for municipalities and municipal bond investors.

  17. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  18. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  19. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  20. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the

  1. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  2. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  3. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  4. Request from City of Alexandria for Public Disclosure of Documents Related

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Docket No. EO-05-01 | Department of Energy from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Docket No. EO-05-01: On behalf of the City of Alexandria, Virginia ("Alexandria"), we submit this request for public disclosure of documents and materials related to Order No. 202-05-3, dated December 20, 2005, in the above-referenced Department of

  5. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450-A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-09-29

    This Notice address the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designate EJ, EK, and EN.

  6. START Program for Renewable Energy Project Development Assistance Non-Disclosure Agreement

    Broader source: Energy.gov [DOE]

    Download the Non-Disclosure Agreement to submit along with your application for the DOE Office of Indian Energy Strategic Technical Assistance Response Team (START) Program for Renewable Energy...

  7. Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-16

    Provides sample policy language based on a synthesis of existing state and local policies, and discussion on key provisions, for the design of a commercial benchmarking and disclosure policy.

  8. Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    the Selection of Subcontractors for NEUP Research and Development Funds | Department of Energy Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds Conflict-of-Interest/Non-Disclosure Certificate For Reviewers Involved in the Selection of Subcontractors for NEUP Research and Development Funds The Department of Energy has a policy that individuals with a conflict of interest cannot participate in the

  9. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  10. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  11. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  12. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  13. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  14. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  15. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  16. Attacking a practical quantum-key-distribution system withwavelength...

    Office of Scientific and Technical Information (OSTI)

    Authors: Li, Hong-Wei 1 ; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004 2 ; Wang, Shuang ; Huang, Jing-Zheng ; Chen, Wei ; Yin, Zhen-Qiang ; Li, ...

  17. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-03

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  18. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-09-30

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. (Note: It replaces DOE N 326.11, which expired 9-29-05.)

  19. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  20. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  1. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    to disclose to residential and small commercial customers details regarding the fuel mix and emissions of electric generation. Such information is provided to customers four...

  2. Fuel Mix and Emissions Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    information must be provided in a standard format to residential customers at least once quarterly and to non-residential customers on or with bills. Electric companies and...

  3. Energy Benchmarking, Rating, and Disclosure for State Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how energy use data access can help state governments lead by example through benchmarking and disclosing results and implement benchmarking policies for the private sector.

  4. Energy Benchmarking, Rating, and Disclosure for Local Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how access to energy use data can help local governments create policies for benchmarking and disclosing building energy performance for public and private sector buildings.

  5. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    SciTech Connect (OSTI)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in future work.

  6. LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer (237.44 KB) More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA,

  7. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-02-25

    This Notice amends DOE N 326.14 to add exemptions for NNSA employees who are now in pay bands. DOE N 326.14 contains information on who must file, when and where to file.

  8. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  9. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  10. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  11. Chemical Biological Emergency Management Information System

    Energy Science and Technology Software Center (OSTI)

    2004-06-15

    CB-EMIS is designed to provide information and analysis to transit system operators and emergency responders in the event of a chemical attack on a subway system. The software inforporates detector data, video images, train data, meteorological data, and above- and below-ground plume dispersion models, hight of the liquid level.

  12. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  13. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  14. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  15. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  16. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  17. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  18. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  19. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  20. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  1. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  2. General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information General Information JLF Contacts Request a Tour

  3. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  4. Cybersecurity for Energy Delivery Systems (CEDS) Contact Information: For More Information:

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    for Energy Delivery Systems (CEDS) Contact Information: For More Information: CEDS projects are funded through the Department of Energy's (DOE) Office of Electricity Delivery and Energy Reliability (OE) research and development (R&D) program, which aims to enhance the reliability and resilience of the nation's energy infrastructure by reducing the risk of energy disruptions due to cyber-attacks. Carol Hawk Program Manager DOE OE R&D Adrian Chavez Principal Investigator Sandia National

  5. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  6. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  7. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  8. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick; Hauschild, Veronique; Hall, Dr. Linda; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  9. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  10. The original of this document contains information which is subject to withholdi

    Office of Environmental Management (EM)

    The original of this document contains information which is subject to withholding from disclosure under 5 U.S. C. § 552. Such material has been deleted from this copy and replaced with XXXXXX's. United States Department of Energy Office of Hearings and Appeals In the Matter of: Personnel Security Hearing ) ) Filing Date: March 10, 2014 ) ) Case No.: PSH-14-0023 ) __________________________________________) Issued: May 22, 2014 _______________ Administrative Judge's Decision _______________

  11. U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  12. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  13. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  14. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  15. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  16. Indecent disclosure - what to do with problems identified in an environment auditing report

    SciTech Connect (OSTI)

    Becker, J.C.

    1995-12-01

    During the past year, the U.S. Environmental Protection Agency (EPA) has solicited public comment on whether the federal government should be permitted to obtain the results of in-house environmental audits. This discussion was triggered, in part, by a trend in the states at the courts to treat audit reports as {open_quotes}privileged.{close_quotes} During EPA`s public meetings, industry environment managers argued that the federal government discourages environmental auditing by reserving the right to seek access to audit reports. This presentation and discussion will bring the audience up to date on proposed changes to the EPA`s policy on disclosure of environmental audit reports. It will describe the various state laws designed to protect the confidentiality of environmental audit reports and identify the criteria used by each state to qualify a report for the {open_quotes}self-audit privilege.{close_quotes} The panel will also discuss ways to establish and maintain other legal privilege claims for audit documents, and discuss what happens to privilege claims when portions of an audit report are shared with government, a potential buyer or another party. The panel will also cover the risks and benefits of documenting problems identified during a compliance review, and will explore how individual corporations decide what to do with their internal audit results.

  17. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  18. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  19. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  20. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  1. Cyber-Informed Engineering: The Need for a New Risk Informed and Design Methodology

    SciTech Connect (OSTI)

    Price, Joseph Daniel; Anderson, Robert Stephen

    2015-06-01

    Current engineering and risk management methodologies do not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Current methodologies focus on equipment failures or human error as initiating events for a hazard, while cyber attacks use the functionality of a trusted system to perform operations outside of the intended design and without the operator’s knowledge. These threats can by-pass or manipulate traditionally engineered safety barriers and present false information, invalidating the fundamental basis of a safety analysis. Cyber threats must be fundamentally analyzed from a completely new perspective where neither equipment nor human operation can be fully trusted. A new risk analysis and design methodology needs to be developed to address this rapidly evolving threatscape.

  2. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Contact Information

  3. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rockville Pike, Rockville, Maryland, 20852. The hotel is about 27 miles from Dulles Airport. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room...

  4. Rate Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    links Financial Information Financial Public Processes Asset Management Cost Verification Process Rate Cases Rate Information Current Power Rates Current Transmission Rates...

  5. Applicant Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Applicant Information General Information for Applicants Bringing together top, space science students with internationally recognized researchers at Los Alamos in an educational...

  6. Ordering Information

    Gasoline and Diesel Fuel Update (EIA)

    coal industry Natural gas trade (Table 4.3) Ordering Information This publication and other Energy Information Administration (EIA) publications may be purchased from the...

  7. Fire Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resources Emergency Communication Fire Information Fire Information Focusing on fire prevention and protection. Contact Fire Management Officer Manuel J. L'Esperance...

  8. Regioselectivity of radical attacks on substituted olefins. Application of the SCD model

    SciTech Connect (OSTI)

    Shaik, S.S. ); Canadell, E. )

    1990-02-14

    The SCD model is used to derive regiochemical trends in radical addition to olefins. Regiochemistry is discussed by appeal to two fundamental properties of the radical and the olefin. The first factor is the relative spin density in the {sup 3}{pi}{pi}* state of the olefin. Thus, radical attack is directed toward the olefinic carbon which possesses the highest spin density. The second factor is the relative bond strengths of the radical to the olefinic carbons. This factor directs the regiochemistry toward the olefinic terminus which forms the strongest bond with the radical. When the two effects join up, regioselectivity will be large, e.g., for CH{sub 2}=CHX (X = NR{sub 2}, CR, Cl, CN, Ph). When the two effects oppose one another, regioselectivity will be smaller, and regioselectivity crossovers are expected, e.g., for CF{sub 2}=CHF. The normal regiochemistry is shown to coincide with the spin density rule which makes identical predictions to the HOMO rule.

  9. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other

  10. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Repository Index Permit Renewal Application (Parts A and B) Submissions, September 2009, Department of Energy CBFO/Washington TRU Solutions Administrative Completeness Determination of the Amended Permit Renewal Application WIPP Hazardous Waste Facility Permit, JP Bearzi, NMED dated, November 25, 2009 Hazardous Waste Facility Permit effective August 2016 New Mexico Environment Department 2016 Information Repository Documents 2015 Information Repository Documents 2014 Information

  11. Energy Benchmarking, Rating, and Disclosure for Regulators of Ratepayer-Funded Programs

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how supporting access to building benchmarking data can help utilities increase efficiency and drive down energy demand.

  12. Intergranular attack of alloy 600: Simulation and remedial action tests: Final report

    SciTech Connect (OSTI)

    Daret, J.; Feron, D.

    1989-02-01

    The intergranular attack (IGA) that affects alloy 600 tubes in the tube sheet crevices of PWR steam generators is hard to simulate in laboratory studies. For this study, a special apparatus was designed with a range of representative materials, mechanical conditions and geometry. The design also took account of sludge piles, thermal fluxes and water chemistry. During a first series of seven model boiler tests, chemical parameters and test procedures were adjusted to finally obtain a field prototypical degradation of tubing over a significant length within the tube sheet crevice for the case of caustic pollution. IGA was not produced for the river water in-leakage case. A second series of model boiler tests also showed the possibility of producing a representative IGA by initially filling the tube sheet crevices with concentrated caustic solutions. A third series of five model boiler tests aimed at studying in the effectiveness of remedial actions on either virgin of IGA affected tubing. Tube sheet crevice flushing operations using the natural circulation procedure showed a poor efficiency for moving concentrated contaminants, but they succeeded in forcing chemicals additives (acetic acid or boric acid) within the non-occluded portions of crevices. This off-line treatment resulted in a reduction in the progression rate of the pre-existing IGA by a factor of 2 to 3. Simulation of this treatment on virgin material showed that this result was obtained because acetate or borate shifted the cation-to-anion equivalent ratio to well under one. However this off-line treatment could not prevent the occurrence of intergranular stress corrosion cracking (IGSCC) near the top of crevices, since caustic continued to hideout under full power operation. The best remedial action consisted of a combination of off-line and on-line boric acid treatment. IGSCC was prevented both on virgin and IGA affected tubes. 3 figs., 3 tabs.

  13. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  14. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  15. General Information

    National Nuclear Security Administration (NNSA)

    Site Waste Profile Sheet - Revision 0 - February 27, 2012 (Log No. 2012-048) A. Generator Information 1. Company name: ...

  16. A Geographic Information Science (GISc) Approach to Characterizing Spatiotemporal Patterns of Terrorist Incidents in Iraq, 2004-2009

    SciTech Connect (OSTI)

    Medina, Richard M; Siebeneck, Laura K.; Hepner, George F.

    2011-01-01

    As terrorism on all scales continues, it is necessary to improve understanding of terrorist and insurgent activities. This article takes a Geographic Information Systems (GIS) approach to advance the understanding of spatial, social, political, and cultural triggers that influence terrorism incidents. Spatial, temporal, and spatiotemporal patterns of terrorist attacks are examined to improve knowledge about terrorist systems of training, planning, and actions. The results of this study aim to provide a foundation for understanding attack patterns and tactics in emerging havens as well as inform the creation and implementation of various counterterrorism measures.

  17. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  18. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Local Information Local Information Bringing together top space science students with internationally recognized researchers at Los Alamos in an educational and collaborative atmosphere. Contacts Director Misa Cowee Email Administrative Assistant Lynea Koshar Email Request more information Email Housing, transportation Every year several hundred students come to Los Alamos to work and live here. Housing can get quite scarce, and options will be more expensive and less attractive than you expect

  19. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Visitor Information The Museum is open to the public every day except Thanksgiving, Christmas, and New Year's. Contact Us thumbnail of 1350 Central Avenue Bradbury Science Museum 1350 Central Avenue 505 667-4444 Email Museum Hours Open every day except Thanksgiving, Christmas, and New Year's. Tuesday-Saturday: 10 am-5 pm Sunday & Monday: 1-5 pm FREE ADMISSION Download our brochure for more information (pdf) Weather conditions Call ahead during snow storms: (505) 667-6622 or (877)

  20. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Logistics Hotel Information Location The workshop was held at the Hilton Washington DC/Rockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. The hotel is about 27 miles from Dulles Airport. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room Block A block of rooms at the federal per diem rate of $226++ per night (single or double) has been reserved for the nights of September 10 & 11, 2012. As a courtesy, this rate will

  1. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Logistics Hotel Information Location The review was held at the Hilton Washington DC/Rockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room Block A block of rooms at $183 + 15% tax per night (single or double) has been reserved for the nights of November 26 & 27, 2012. Making Your Reservation To reserve your room, please call 1-800-HILTONS (445-8667) and refer to the

  2. HC-NIDS: signatures and simulations for detecting cyber-attacks aiming to cause damage against cyber-physical energy systems

    Energy Science and Technology Software Center (OSTI)

    2014-12-01

    Physical device safety is typically implemented locally using embedded controllers, while operations safety is primarily performed in control centers. Safe operations can be enhanced by correct design of device-level control algorithms, and protocols, procedures and operator training at the control-room level, but all can fail. Moreover, these elements exchange data and issue commands via vulnerable communication layers. In order to secure these gaps and enhance operational safety, we believe monitoring of command sequences must bemore » combined with an awareness of physical device limitations and automata models that capture safety mechanisms. One way of doing this is by leveraging specification-based intrusion detection to monitor for physical constraint violations. The method can also verify that physical infrastructure state is consistent with monitoring information and control commands exchanged between field devices and control centers. This additional security layer enhances protection from both outsider attacks and insider mistakes. We implemented specification-based SCADA command analyzers using physical constraint algorithms directly in the Bro framework and Broccoli APIs for three separate scenarios: a water heater, an automated distribution system, and an over-current protection scheme. To accomplish this, we added low-level analyzers capable of examining control system-specific protocol packets for both Modbus TCP and DNP3, and also higher-level analyzers able to interpret device command and data streams within the context of each device’s physical capabilities and present operational state. Thus the software that we are making available includes the Bro/Broccoli scripts for these three scenarios, as well as simulators, written in C, of those scenarios that generate sample traffic that is monitored by the Bro/Broccoli scripts. In addition, we have also implemented systems to directly pull cyber-physical information from the OSIsoft PI historian

  3. Information Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science and Technology (ASIS&T) American Society for Indexing (ASI) Digital Library Federation (DLF) National Archives and Records Administration (NARA) Special...

  4. Technical information

    Gasoline and Diesel Fuel Update (EIA)

    Home> Commercial Buildings Home> Technical Information > Estimation of Standard Errors Estimation of Standard Errors Sampling error is the difference between the survey estimate...

  5. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Hilton Washington DCRockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. Hotel Information Home Page Maps and Transportation Area...

  6. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information

  7. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  8. Document Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SECTION 5 of 5 Document Information Document # FOIA2011-01376 Revision Title FREEDOM OF INFORMATION ACT REQUEST (FOI 2011-01 376) [SEC. 5 OF 5] Date 07/26/2011 Originator RIEHLE DC Originator Co. DOE-RL Recipient O'BRIEN L Recipient Co. HOA References 4, WRPI -SV-1 706, 0031161, WRPI -SV-1 603, 2404-WB, 2404-WC, 5, SW-040-043, W-040-0439 6, EM-RL- PHMC-SOLIDWASTE-2008-0007, EM-RL-PHMC- SOLI DWASTE-2010-0003, WRAP-RP-1 1-03 Keywords OCE, FOIA, SENSITIVE Projects Other Information Attachment V

  9. Historical Information

    Office of Legacy Management (LM)

    ... motion hazard to the occupants. 2. Medical and Veterinarian Support Arrangements ... This e s t i m a t e i s based on f i s s i o n yield and isotope decay information c u r ...

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  11. Information Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel

  12. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Info Visitor Information NERSC is located in Shyh Wang Hall-also known as the computational research and theory (CRT) building (Bldg. 59)-on the campus of Lawrence Berkeley National Laboratory in Berkeley, California. You can find information about visiting the lab, including an interactive campus map, transportation and lodging suggestions at http://www.lbl.gov/visit/. Your host must arrange site access prior to your visit. Last edited: 2016-01-06 16:48:46

  13. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Info Visitor Information NERSC is located in Shyh Wang Hall-also known as the computational research and theory (CRT) building (Bldg. 59)-on the campus of Lawrence Berkeley National Laboratory in Berkeley, California. You can find information about visiting the lab, including an interactive campus map, transportation and lodging suggestions at http://www.lbl.gov/visit/. Your host must arrange site access prior to your visit. Last edited: 2016-01-06 16:48:46

  14. Information Sciences

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Information Sciences Uncovering actionable knowledge and generating insight into exascale datasets from heterogeneous sources in real time Leadership Group Leader Amy Larson (Acting) Email Deputy Group Leader Gowri Srinivasan (Acting) Email Contact Us Administrator Yvonne McKelvey Email Conceptual illustration of futuristic data stream processing. Developing methods and tools for understanding complex interactions and extracting actionable information from massive data streams. Basic and

  15. Project Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Information Slider award map The REE Program funds projects focused on developing economically feasible and environmentally benign technologies for recovering REEs from coal and/or coal by-products. Project Information The listed projects represent the current REE program portfolio. Agreement Number Project Title Performer Name FWP-RIC REE FY2016-2020 Rare Earth Elements (REE) from Coal and Coal By-Products National Energy Technology Laboratory FE0027167 High Yield and Economical

  16. Regional Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Regional Information There is plenty to do and see in the cities of Golden and Denver, Colorado. Here you'll find links to general information about these areas, plus hospitals, local universities and colleges, entertainment, sports, amusement parks, and more. Golden City of Golden Golden's 2-Hour Vacation Denver www.denver.com www.denver.org Denver Public Library Colorado State of Colorado Colorado tourism Transportation (Bus and Light Rail) RTD Hospitals Largest Hospitals in Metro Denver

  17. Computing Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information From here you can find information relating to: Obtaining the right computer accounts. Using NIC terminals. Using BooNE's Computing Resources, including: Choosing your desktop. Kerberos. AFS. Printing. Recommended applications for various common tasks. Running CPU- or IO-intensive programs (batch jobs) Commonly encountered problems Computing support within BooNE Bringing a computer to FNAL, or purchasing a new one. Laptops. The Computer Security Program Plan for MiniBooNE The

  18. Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.

    SciTech Connect (OSTI)

    Clem, John; Urias, Vincent; Atkins, William Dee; Symonds, Christopher J.

    2015-12-08

    Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  20. Document Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 Document Information Document # FOIA-2009-0054 7 Revision Title FREEDOM OF INFORMATION ACT REQUEST (FOI 2009-0054) Date 09/02/2009 Originator RIEHLE DC Originator Co. [LOE-RL Recipient JARVIS R Recipient Co. HEART OF __________AMERICA NW References Keywords OCE, FOIA, SENSITIVE, PRIVATE CITIZEN Projects Other Inf ormation___________________________ WHC-SD-W025-AP-001, Rev. 2 1 1.0 INTRODUCTION 2 3 4 This response action plan (RAP) has been prepared for the Low-Level 5 Burial Grounds, Trenches

  1. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hotel Information Hotel Information Los Alamos National Laboratory is situated on a mesatop on the eastern side of the Jemez Mountains, an impressive series of ancient volcanoes with extensive views of the Sangre de Cristo Mountains in the east, where sunsets turn the western slopes a vibrant red. We hope you enjoy your stay in the Land of Enchantment. Contacts Mike Rogers (505) 665-2513 Email Chandra Savage Marsden (505) 664-0183 Email Lodging A block of rooms has been reserved under the name

  2. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WIPP Stakeholder Information Index 2016 WIPP Stakeholder Information Documents 2015 WIPP Stakeholder Information Documents 2014 WIPP Stakeholder Information Documents 2013 WIPP Stakeholder Information Documents 2012 WIPP Stakeholder Information Documents 2011 WIPP Stakeholder Information Documents 2010 WIPP Stakeholder Information Documents 2009 WIPP Stakeholder Information Documents 2008 WIPP Stakeholder Information Documents 2007 WIPP Stakeholder Information Documents 2006 WIPP Stakeholder

  3. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  4. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  6. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 19, 2012 Class 1 Permit Modifications and NMED Responses Administrative Completeness and Final Determination, Class 1 Permit Modification Request, Contingency Plan Update, JE Kieling NMED dated December 17, 2012 Class 1 Permit Modification Request, Contingency Plan Update, Jose R. Franco, CBFO and M. F. Sharif, NWP, dated

  7. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 14, 2013 Class 1 Permit Modifications and NMED Responses Class 1 Modification, August 29, 2013 WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088. (1. revise a course outline; 2. revise table and panel figures to include Panel 7; 3. update description related to Type B Packages; and 4. update TRUPACT-II and

  8. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Project 2014 Waste Minimization Report, Permit Number NM4890139088-TSDF Jose R. Franco/CBFO and Robert L. McQuinn/NWP dated November 17, 2014 Class 1 Permit Modifications and NMED Responses Notification of Class 1 Permit Modification to the Waste Isolation Pilot Plant Hazardous Waste Facility Permit Number: NM4890139088-TSDF Jose R. Franco/CBFO and Robert L. McQuinn/NWP dated

  9. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Information Visiting the Transportation Research and Analysis Computing Center For guests who wish to visit and meet with the technical staff, please contact the TRACC service desk or the Technical Point of Contact assigned to you for registration, scheduling, and confirmation, including Foreign Visits and Assignments. Registration with your host is required for entry into the TRACC facilities. A photo I.D., such as a driver's license or passport, is also required for facility access. If

  10. Header Information

    National Nuclear Security Administration (NNSA)

    NRC 741 Crosswalk to SAMS 741 Field Number 741 Field Name SAMS 8.0 Field Header Information 1 Shipper's RIS ShipperRIS 2 Receiver's RIS ReceiverRIS 3 Transaction No. TransferNumber 4 Correction No. CorrectionNumber 5a Processing Code - Shipper * not entered 5b Processing Code - Receiver * not entered 6a Action Code - Shipper ActionCode 6b Action Code - Receiver ActionCode 8a Name and Address of Shipper * not entered 9a Name and Address of Receiver * not entered 10 No. of Data Lines NumberofLines

  11. Historical. Information.

    Office of Legacy Management (LM)

    Historical. Information. ~ H.. 1 . General Project Rulison Manager' s Report, April. 1973 DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available original document. PROJECT RULISON MANAGER'S R E P O R T APRIL 197.3 UNITED STATES ATOMIC ENERGY COMMISSION NEVADA OPERATIONS OFFICE Las Vegas, Nevada PREFACE , The R u l i s o n ' p r o j e c t , d e t o n a t e d September 1 0 , 1969, 'was t h e second n u c l e a r . d e t o n a

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Geneial Information

    Office of Legacy Management (LM)

    --- _____ ii3 ' 6 f Geneial Information su-u+./ I The Commission maintains a residue storage area known as the Airport Site at Robertson, l Missouri. This site is located immediately north of the St. Louis Municipal Airport and east of the McIknnell Aircraft Corporation Plant on Rr~wn Road in St. Louis County. Consent to use and occupy the 21.7 acre tract was obtalned by the Manhattan Dlstrlot on Marsh 2, 19&6. T!ltle uas auqubed to the property on Janwry 3, 1947 by condemnation proceeding8

  15. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    SciTech Connect (OSTI)

    Langton, C

    2008-08-19

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM{reg_sign} code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM{reg_sign} code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is

  16. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  17. Photovoltaic Geographical Information System | Open Energy Information

    Open Energy Info (EERE)

    Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Photovoltaic Geographical Information System Focus Area: Renewable Energy Topics: Opportunity...

  18. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  19. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  20. Information Technology - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Technology

  1. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  2. ARM - People Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARM People Database Reports Email List Owner Information (password required) Email List Membership Information (password required) CategoryProgram List Membership Information ...

  3. Notices SUPPLEMENTARY INFORMATION: Section

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Director, Information Collection Clearance Division, Privacy, Information and Records ... Dated: September 14, 2012. Darrin A. King, Director, Information Collection Clearance ...

  4. Fuel Mix Disclosure

    Broader source: Energy.gov [DOE]

    California's retail electricity suppliers must disclose to all customers the fuel mix used in the generation of electricity. Utilities must use a standard label created by the California Energy...

  5. US Equities Disclosures

    U.S. Energy Information Administration (EIA) Indexed Site

    Outline: EIA oil data on Wall Street, the UBS case Part A - Why we care - What we use the data for - Fundamentals more than anything else push oil prices around - What's even ...

  6. WIPP Recovery Information

    Broader source: Energy.gov [DOE]

    At the March 26, 2014 Board meeting J. R. Stroble CBFO, Provided Information on Locations to Access WIPP Recovery Information.

  7. Special Undergraduate Informations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Special Undergraduate Information Special Undergraduate Information for SAGE A National Science Foundation Research Experiences for Undergraduates program Contacts Institute...

  8. ARM - Public Information Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govPublicationsPublic Information Materials Publications Journal Articles Conference Documents Program Documents Technical Reports Publications Database Public Information...

  9. Contractor Past Performance Information

    Broader source: Energy.gov (indexed) [DOE]

    management controls and the compliance assessments of contractor performance information. Section IV has best practices to address contractor performance information....

  10. Montana Geographic Information Library | Open Energy Information

    Open Energy Info (EERE)

    Montana Geographic Information Library Jump to: navigation, search OpenEI Reference LibraryAdd to library Map: Montana Geographic Information LibraryInfo GraphicMapChart Abstract...

  11. LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA,...

  12. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  13. Information Technology | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Technology The Information Technology Division uses cutting-edge technology to provide high-quality services and capabilities that enable the lab to pursue its research mission in support of the nation's scientific agenda. Leading the division is the chief information officer. The CIO is responsible for providing information from the labs information technology systems to Jefferson Lab management, the overall IT vision, the information architecture for computing and IT, and oversight

  14. Energy information sheets

    SciTech Connect (OSTI)

    1995-07-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  15. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  16. Biofuels Information Center

    Broader source: Energy.gov (indexed) [DOE]

    Biofuels Information Center BETO 2015 Peer Review Kristi Moriarty March 24, 2015 2 Goal Statement * The purpose of the Biofuels Information Center (BIC) task is to increase ...

  17. Utilities | Open Energy Information

    Open Energy Info (EERE)

    historic, in human and machine readable formats. See also the NREL System Advisor Model (SAM) and NREL's BEOpt. Utility Outage Information dataset - Information and resources...

  18. Information Technology Specialist

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Operations...

  19. Takigami | Open Energy Information

    Open Energy Info (EERE)

    ENERGYGeothermal Home Takigami General Information Name Takigami Sector Geothermal energy Location Information Address 2862-12 Kokonoe, Kusu District, Oita Prefecture 879-4802...

  20. Background Information on CBECS

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Information on CBECS The following topics provide detailed information on survey methodology, the kinds of errors associated with sample surveys, estimation of standard errors,...

  1. Nevada Transmission Siting Information | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Nevada Transmission Siting InformationPermittingRegulatory GuidanceGuide...

  2. Alaska - CPCN General Information | Open Energy Information

    Open Energy Info (EERE)

    CPCN General Information Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: Alaska - CPCN General...

  3. Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Exploration, Tracers Data Analysis, And Enhanced Data Distribution, Visualization, And Management Geographic Information System At Brady Hot Springs Area (Laney, 2005) Brady Hot...

  4. AUDIT REPORT The Energy Information Administration's Information...

    Broader source: Energy.gov (indexed) [DOE]

    range of data collection, analysis, forecasting, and dissemination of energy information. ... of EIA's IT costs had not been reported to the Office of Management and Budget (OMB). ...

  5. Microsoft PowerPoint - EIA Presentation 04.26.11.ppt [Read-Only...

    Gasoline and Diesel Fuel Update (EIA)

    DISCLOSURE APPENDIX CONTAINS IMPORTANT DISCLOSURES, ANALYST CERTIFICATIONS, INFORMATION ON TRADE ALERTS, ANALYST MODEL PORTFOLIOS AND THE STATUS OF NON- U.S ANALYSTS. FOR OTHER ...

  6. Aquaculture information package

    SciTech Connect (OSTI)

    Boyd, T.; Rafferty, K.

    1998-08-01

    This package of information is intended to provide background information to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements. A bibliography containing 68 references is also included.

  7. WIPP - Joint Information Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Joint Information Center is located at 4021 National Parks Highway in Carlsbad, N.M. Joint Information Center In the unlikely event of an emergency, the WIPP Joint Information Center (JIC) serves as a central control point to coordinate multi-agency efforts to issue timely and accurate information to the public, news media and project employees. Emergency contact information: The public If the JIC is activated, members of the general public, including family members, may call (575) 234-7380

  8. Management Alert: DOE/IG-0939

    Office of Energy Efficiency and Renewable Energy (EERE)

    Review of Allegations of Improper Disclosure of Confidential, Nonpublic Federal Energy Regulatory Commission Information

  9. Category:Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Geographic Information System Jump to: navigation, search Geothermalpower.jpg Looking for the Geographic Information System page? For detailed information on Geographic Information...

  10. T-637: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI, Client update resolve multiple

    Broader source: Energy.gov [DOE]

    This patch provides a fix for the following three security issues in the VMware Host Guest File System (HGFS). None of these issues affect Windows based Guest Operating Systems. CVE-2011-2146 Mount.vmhgfs Information Disclosure, information disclosure via a vulnerability that allows an attacker with access to the Guest to determine if a path exists in the Host filesystem and whether it is a file or directory regardless of permissions. CVE-2011-1787 Mount.vmhgfs Race Condition, privilege escalation via a race condition that allows an attacker with access to the guest to mount on arbitrary directories in the Guest filesystem and achieve privilege escalation if they can control the contents of the mounted directory. CVE-2011-2145 Mount.vmhgfs Privilege Escalation, privilege escalation via a procedural error that allows an attacker with access to the guest operating system to gain write access to an arbitrary file in the Guest filesystem. This issue only affects Solaris and FreeBSD Guest Operating Systems. For more information on the following associated CVE details please use the provided links below. This patch provides a fix for the following three security issues in the VMware Host Guest File System (HGFS). None of these issues affect Windows based Guest Operating Systems. CVE-2011-2146 Mount.vmhgfs Information Disclosure, information disclosure via a vulnerability that allows an attacker with access to the Guest to determine if a path exists in the Host filesystem and whether it is a file or directory regardless of permissions. CVE-2011-1787 Mount.vmhgfs Race Condition, privilege escalation via a race condition that allows an attacker with access to the guest to mount on arbitrary directories in the Guest filesystem and achieve privilege escalation if they can control the contents of the mounted directory. CVE-2011-2145 Mount.vmhgfs Privilege Escalation, privilege escalation via a procedural error that allows an attacker with access to the guest operating system

  11. Energy information sheets

    SciTech Connect (OSTI)

    Not Available

    1993-12-02

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. Written for the general public, the EIA publication Energy Information Sheets was developed to provide information on various aspects of fuel production, prices, consumption and capability. The information contained herein pertains to energy data as of December 1991. Additional information on related subject matter can be found in other EIA publications as referenced at the end of each sheet.

  12. Supervisory Information Technology Specialist (Information Security)

    Broader source: Energy.gov [DOE]

    The Office of the Chief Information Officer is seeking a motivated and highly-qualified candidate to serve as the Director of the Cybersecurity Operations Office and oversee development and...

  13. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  14. SOURCE SELECTION INFORMATION -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 ... SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 ...

  15. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Freedom of Information and Privacy Act Database Bureau: DOE-ID Project Unique ID: Date: May 8,2008 A. CONTACT INFORMATION 1. Who is the person completing this document? Nicole ...

  16. SOURCE SELECTION INFORMATION -

    Broader source: Energy.gov (indexed) [DOE]

    an action described in Section 311 of P.L. 112-74 in excess of 1,000,000. This information is source selection information related to the conduct of a Federal agency...

  17. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  18. Physics Informed Machine Learning

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Physics Informed Machine Learning Physics Informed Machine Learning WHEN: Jan 19, 2016 8:00 AM - Jan 22, 2016 4:00 PM WHERE: Inn at Loretto, Santa Fe CATEGORY: Science TYPE:...

  19. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  20. Contractor Past Performance Information

    Broader source: Energy.gov (indexed) [DOE]

    2013) 3 the use of contractor performance information, outlines associated management responsibilities that agency Chief Acquisition Officers (CAOs) and Senior...

  1. Departmental information architecture

    SciTech Connect (OSTI)

    Tiemann, M.

    1997-11-01

    This report contains viewgraphs on the models, principles, publications, future directions, and DOE IA guidance highlights of information architecture software.

  2. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-02-01

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)] or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Cancels DOE O 475.2 and DOE M 475.1-1B.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-03

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)]or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination.

  6. Energy information directory 1995

    SciTech Connect (OSTI)

    1995-10-01

    The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.

  7. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-03

    To establish the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)] or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Supersedes DOE O 475.2A.

  8. Biofuels Information Center

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Biofuels Information Center BETO 2015 Peer Review Kristi Moriarty March 24, 2015 2 Goal Statement * The purpose of the Biofuels Information Center (BIC) task is to increase deployment of biofuels production facilities and infrastructure by providing essential biofuels data, tools, and information to all stakeholders * The Bioenergy Atlas tools provide interactive maps and analysis of all relevant biomass data with the purpose of growing the domestic bioenergy market for biofuels and biopower

  9. Contractor Past Performance Information

    Energy Savers [EERE]

    5 (February 2015) 1 Contractor Performance Information This chapter is updated to incorporate OFPP Memorandum dated July 10, 2014, "Making Better Use of Contractor Performance Information" which provides instruction to Contracting Officers and other members of the acquisition workforce in the pre-award phase of acquisition actions by making better use of contractor performance information. This chapter also incorporates the Office of Federal Procurement Policy (OFPP) policy that became

  10. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-02-26

    This Manual provides requirements for managing the Department of Energy (DOE) classification and declassification program, including details for classifying and declassifying information, documents, and material. This Manual also supplements DOE O 200.1, INFORMATION MANAGEMENT PROGRAM, which combines broad information management topics under a single Order. Specific requirements for each topic are issued in separate Manuals. Cancels DOE M 475.1-1. Canceled by DOE M 475.1-1B

  11. Developing information-space Confidence Building Measures (CBMs) between India and Pakistan

    SciTech Connect (OSTI)

    Yamin, Tughral

    2014-06-01

    The Internet has changed the world in ways hitherto unknown. The international financial system, air, land and maritime transport systems are all digitally linked. Similarly most militaries are fully or partially networked. This has not only sped up the decision making processes at all levels, it has also rendered these systems vulnerable to cyber-attacks. Cyber-warfare is now recognized as the most potent form of non-kinetic war fighting. In order to prevent large scale network-attacks, cyber-powers are simultaneously spending a lot of time, money and effort to erect redundant cyber-defenses and enhancing their offensive cyber capabilities. Difficulties in creating a stable environment in information-space stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. This paper discusses a range of Confidence Building Measures that can be created between India and Pakistan in information-space to control malicious cyber behavior and avert an inadvertent war.

  12. Information Sciences and Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    file systems Bioinformatics Infectious disease surveillance Climate change and energy security Smart grids Learn more about our Information Science and Technology capabilities

  13. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Stephanie Battles Director, Energy Consumption Division, Office of Energy Markets and End Use Energy Information ... Energy suppliers (natural gas, LPG, electricity, fuel ...

  14. Supervisory Information Technology Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will be responsible for providing Information Technology (IT) infrastructure, capabilities and technical support to the Department of Energy (DOE),...

  15. Personally Identifiable Information

    Broader source: Energy.gov [DOE]

    Websites and applications that collect data on individuals are gathering personally identifiable information (PII). PII is also often collected for customer surveys or user experience (UX) research.

  16. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  17. Service | Open Energy Information

    Open Energy Info (EERE)

    Building Types 1 References EIA CBECS Building Types U.S. Energy Information Administration (Oct 2008) Retrieved from "http:en.openei.orgwindex.php?titleService&oldid27...

  18. Unclassified Controlled Nuclear Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-25

    To prevent unauthorized dissemination of Unclassified Controlled Nuclear Information (UCNI). Cancels DOE 5635.4 and DOE 5650.3A

  19. Information Science & Technology Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ISTI Information Science & Technology Institute Providing connection to program management for capability needs, as well as IS&T integration and support for mission-critical...

  20. WVCP | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  1. Coolerado | Open Energy Information

    Open Energy Info (EERE)

    Coolerado Jump to: navigation, search Name: Coolerado Place: Denver, CO Website: www.coolerado.com References: Coolerado1 Information About Partnership with NREL Partnership with...

  2. Information Exchange development forums

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    GitHub repositories for creating and managing information exchanges (content models) for use in the NGDS and larger USGIN systems.

  3. Emergency Public Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume defines elements of providing information to the public during and following emergencies. Canceled by DOE G 151.1-4.

  4. SOURCE SELECTION INFORMATION -

    Broader source: Energy.gov (indexed) [DOE]

    SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 Department of Energy Washington, DC 20585 (enter date here, centered revised template...

  5. PBS-30 Supplemental Information

    Broader source: Energy.gov [DOE]

    At the April 8, 2015 Committee meeting David Rhodes DOE, Provided Supplemental Information on Project Categories for LANL Clean-up Budget Year 2017.

  6. Technical Information Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Technical Information Specialist coordinating and executing data curation and quality activities, including software quality assurance, for...

  7. For Further Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    For Further Information 1. Media Inquiries Bartlett W. Jackson Assistant Press Secretary, Office of Public Affairs, Department of Energy Email: bartlett.jackson@hq.doe.gov 2. ...

  8. Information Technology Specialist

    Broader source: Energy.gov [DOE]

    The Information Technology Services Office (ITSO) is an office within the Office of Business Operations (BO) that provides administrative support to the Office of Energy Efficiency and Renewable...

  9. Ford | Open Energy Information

    Open Energy Info (EERE)

    search Name: Ford Place: Dearborn, MI Website: www.ford.com References: FORD-NREL CRADA1 Information About Partnership with NREL Partnership with NREL Yes Partnership...

  10. Information Exchange management site

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    Django site used to manage the approved information exchanges (content models) after creation and public comment at https://github.com/usgin-models.

  11. Trane | Open Energy Information

    Open Energy Info (EERE)

    NJ Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  12. NIST | Open Energy Information

    Open Energy Info (EERE)

    CO Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  13. SUPERVALU | Open Energy Information

    Open Energy Info (EERE)

    MN Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  14. Transformations | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  15. Synergy | Open Energy Information

    Open Energy Info (EERE)

    MA Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  16. Roxul | Open Energy Information

    Open Energy Info (EERE)

    ON Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  17. NYSERDA | Open Energy Information

    Open Energy Info (EERE)

    NY Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  18. Enterprise | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  19. Pulte | Open Energy Information

    Open Energy Info (EERE)

    MI Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  20. Samsung | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL National Wind Technology Center...

  1. SEMCO | Open Energy Information

    Open Energy Info (EERE)

    OH Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  2. Panasonic | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  3. UNCLASSIFIED Information Science and ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... data analysis, including machine learning, statistical learning theory and information theory. Application areas of his research include image analysis, medical imaging, acoustic ...

  4. Caterpillar | Open Energy Information

    Open Energy Info (EERE)

    Caterpillar Jump to: navigation, search Name: Caterpillar Place: Peoria, IL Website: www.cat.com References: NREL News Release: Reduce Truck Idling1 Information About Partnership...

  5. Icynene | Open Energy Information

    Open Energy Info (EERE)

    Name: Icynene Place: Mississauga, Canada Website: www.icynene.com References: New American Home 20061 Information About Partnership with NREL Partnership with NREL Yes...

  6. Transmission - Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact-Information-Transmission Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  7. Transmission Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact-Information Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives Finance &...

  8. Wattstopper | Open Energy Information

    Open Energy Info (EERE)

    Wattstopper Jump to: navigation, search Name: Wattstopper Place: Santa Clara, CA Website: www.wattstopper.com References: Wattstopper1 Information About Partnership with NREL...

  9. Envinity | Open Energy Information

    Open Energy Info (EERE)

    Envinity Jump to: navigation, search Name: Envinity Place: State College, PA Website: www.envinity.com References: Envinity Website1 Information About Partnership with NREL...

  10. IBACOS | Open Energy Information

    Open Energy Info (EERE)

    IBACOS Jump to: navigation, search Name: IBACOS Place: Pittsburgh, PA Website: www.ibacos.com References: IBACOS1 Information About Partnership with NREL Partnership with NREL...

  11. Masco | Open Energy Information

    Open Energy Info (EERE)

    Masco Jump to: navigation, search Name: Masco Place: Taylor, MI Website: www.masco.com References: Masco1 Information About Partnership with NREL Partnership with NREL Yes...

  12. CAES Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    View all events >> x CAES Home Home About Us Contact Information Our CAES Building FAQs Affiliated Centers Research Core Capabilities Laboratories and Equipment Technology Transfer...

  13. Value of Information spreadsheet

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Trainor-Guitton, Whitney

    2014-05-12

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Jlusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  14. SOURCE SELECTION INFORMATION -

    Energy Savers [EERE]

    disseminating this predecisional information, we respectfully request that you consult with the Department prior to making such a decision. The action, in support of the...

  15. SOURCE SELECTION INFORMATION -

    Office of Environmental Management (EM)

    disseminating this predecisional information, we respectfully request that you consult with the Department prior to making such a decision. This (if it is a multi-year...

  16. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  17. Value of Information spreadsheet

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Trainor-Guitton, Whitney

    2014-05-12

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Júlíusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  18. Nxegen | Open Energy Information

    Open Energy Info (EERE)

    Zip: 6457 Sector: Services Product: Intelligent energy management company. Provides real-time energy information and load management services to municipal, commercial, and...

  19. Data Mining for Security Information: A Survey

    SciTech Connect (OSTI)

    Brugger, S T; Kelley, M; Sumikawa, K; Wakumoto, S

    2001-04-19

    This paper will present a survey of the current published work and products available to do off-line data mining for computer network security information. Hundreds of megabytes of data are collected every second that are of interest to computer security professionals. This data can answer questions ranging from the proactive, ''Which machines are the attackers going to try to compromise?'' to the reactive, ''When did the intruder break into my system and how?'' Unfortunately, there's so much data that computer security professionals don't have time to sort through it all. What we need are systems that perform data mining at various levels on this corpus of data in order to ease the burden of the human analyst. Such systems typically operate on log data produced by hosts, firewalls and intrusion detection systems as such data is typically in a standard, machine readable format and usually provides information that is most relevant to the security of the system. Systems that do this type of data mining for security information fall under the classification of intrusion detection systems. It is important to point out that we are not surveying real-time intrusion detection systems. Instead, we examined what is possible when the analysis is done off-line. Doing the analysis off-line allows for a larger amount of data correlation between distant sites who transfer relevant log files periodically and may be able to take greater advantage of an archive of past logs. Such a system is not a replacement for a real-time intrusion detection system but should be used in conjunction with one. In fact, as noted previously, the logs of the real-time IDS may be one of the inputs to the data mining system. We will concentrate on the application of data mining to network connection data, as opposed to system logs or the output of real-time intrusion detection systems. We do this primarily because this data is readily obtained from firewalls or real-time intrusion detectors and it

  20. Environmental geographic information system.

    SciTech Connect (OSTI)

    Peek, Dennis; Helfrich, Donald Alan; Gorman, Susan

    2010-08-01

    This document describes how the Environmental Geographic Information System (EGIS) was used, along with externally received data, to create maps for the Site-Wide Environmental Impact Statement (SWEIS) Source Document project. Data quality among the various classes of geographic information system (GIS) data is addressed. A complete listing of map layers used is provided.

  1. Information extraction system

    SciTech Connect (OSTI)

    Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James

    2014-05-13

    An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.

  2. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  3. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-08-28

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD) and Formerly Restricted Data (FRD)] or Executive Order 12958, as amended [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Canceled by DOE O 475.2

  4. Classified Session Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Classification Policy, Guidance & Reports Classification Policy, Guidance & Reports Statutes, Regulations, Executive Orders, DOE Directives and Bulletins Atomic Energy Act of 1954 - Establishes Government-wide policies for classifying, safeguarding, and declassifying Restricted Data information. 10 CFR Part 1045 - establishes responsiblities and requirements for classifying and declassifying RD and FRD. Executive Order 13526, Classified National Security Information - Prescribes the

  5. Information Pods Inform Public on Savannah River Site Missions...

    Energy Savers [EERE]

    Information Pods Inform Public on Savannah River Site Missions Information Pods Inform Public on Savannah River Site Missions December 29, 2015 - 12:20pm Addthis SRNS Solid Waste ...

  6. Energy information directory 1994

    SciTech Connect (OSTI)

    Not Available

    1994-03-28

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.

  7. Employee Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee Information Employee Information Access Plus Benefits ISU Policy Library Leave Information Logging into Deltek Time & Expense (video) Entering Hours and Absence Requests (video Professional & Scientific Information Drug Free Workplace Training

  8. ENERGY INFORMATION CLEARINGHOUSE

    SciTech Connect (OSTI)

    Ron Johnson

    2003-10-01

    Alaska has spent billions of dollars on various energy-related activities over the past several decades, with projects ranging from smaller utilities used to produce heat and power in rural Alaska to huge endeavors relating to exported resources. To help provide information for end users, utilities, decision makers, and the general public, the Institute of Northern Engineering at UAF established an Energy Information Clearinghouse accessible through the worldwide web in 2002. This clearinghouse contains information on energy resources, end use technologies, policies, related environmental issues, emerging technologies, efficiency, storage, demand side management, and developments in Alaska.

  9. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  10. Golden - Local Information | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Golden-Local Information This page provides travel information for visitors to the Golden offices and laboratories of the National Renewable Energy Laboratory. Transportation NREL is accessible via bus on the RTD route 20 from Aurora and Denver. Route 20 travels along 20th Avenue and ends at the NREL Education Center. Visit the RTD Web site or call 303-299-6000 to plan your trip or for more information. Visit the Denver International Airport site to find: Car rental agencies Shuttle services,

  11. WIPP Information Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WIPP milestones are noted on banners at the WIPP Experience Exhibit at the Skeen-Whitlock Building in Carlsbad. The WIPP Experience Exhibit at 4021 National Parks Highway in Carlsbad, N.M. WIPP Information Center Address: 4021 National Parks Highway Carlsbad, NM 88220 Toll-free telephone number: 1-800-336-WIPP (9477) E-mail inquiries are welcomed For emergency contact information, please refer to the Joint Information Center page. Media Contacts Tim Runyon U.S. Department of Energy WIPP Recovery

  12. Sauerlach GEPP | Open Energy Information

    Open Energy Info (EERE)

    Home Sauerlach GEPP General Information Name Sauerlach GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 47.972400325481,...

  13. Unterhaching GEPP | Open Energy Information

    Open Energy Info (EERE)

    Home Unterhaching GEPP General Information Name Unterhaching GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 48.055885240766,...

  14. Caliper Log | Open Energy Information

    Open Energy Info (EERE)

    Information Exploration Group: Downhole Techniques Exploration Sub Group: Well Log Techniques Parent Exploration Technique: Well Log Techniques Information Provided by...

  15. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  16. Energy Information Administration

    U.S. Energy Information Administration (EIA) Indexed Site

    Annual Report of the Origin of Natural Gas Liquids Production 1 U.S. DEPARTMENT OF ENERGY Energy Information Administration Washington, DC 20585 Form Approved OMB Number: 1905-0057 ...

  17. Energy Information Administration

    U.S. Energy Information Administration (EIA) Indexed Site

    X EIA-64A Annual Report of the Origin of Natural Gas Liquids Production 1 U.S. DEPARTMENT OF ENERGY Energy Information Administration Washington, DC 20585 Form Approved OMB Number: ...

  18. Conectiv | Open Energy Information

    Open Energy Info (EERE)

    navigation, search Name: Conectiv Place: Delaware References: Energy Information Administration.1 EIA Form 861 Data Utility Id 5027 This article is a stub. You can help OpenEI...

  19. PEMP General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OF CONTENTS Num ber PEMP General Information A Introduction 2 B Roles and Responsibilities 3 C Process and Schedule 5 D Contractor Self-Assessment 5 E PEMP Numbering System and ...

  20. STEM Career Information Seminar

    Broader source: Energy.gov [DOE]

    This event will expose high school students to STEM professionals and STEM careers at the Department of Energy. We'll also cover the federal hiring process, internships, and information on getting involved in Department of Energy STEM programs.

  1. Building the Information Superhighway

    Office of Scientific and Technical Information (OSTI)

    impromptu video conference--a harbinger of the ease with which we will be able to talk, visit together, and share information in the near future--was broadcast in 11...

  2. Newbie | Open Energy Information

    Open Energy Info (EERE)

    about OpenEI? FaceBook 32x32.png Twitter 32x32.png Youtube 32x32.png The OpenEI energy blogs Ready for more? Check out the Content Developer section for more detailed information...

  3. Value of Information References

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Morency, Christina

    This file contains a list of relevant references on value of information (VOI) in RIS format. VOI provides a quantitative analysis to evaluate the outcome of the combined technologies (seismology, hydrology, geodesy) used to monitor Brady's Geothermal Field.

  4. Identification of Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-12-31

    To specify responsibilities, authorities, policy, and procedures for the management of the Department of Energy (DOE) program to identify classified information, documents, or material. Cancels DOE O 5650.2A, dated 5-8-85.

  5. Freedom of Information Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    S (BPA) - NN-1 Cc: Shay, Don Subject: Request for Corona and Field Effects Program Hi Kim, Pursuant to the Freedom of Information Act, I would like to request a copy of...

  6. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  7. The Power of Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    Our electric transmission system is not reliable as it should be and far too costly -- and doesn't provide the information it can and should to consumers. Find out how you can join the conversation.

  8. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-08

    This Manual provides requirements for managing the Departments classification and declassification program, including details for classifying and declassifying information, documents, and material. Cancels DOE O 5650.2B.

  9. NETL Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NETL Contact Information Contact U.S. Department of Energy National Energy Technology Laboratory PITTSBURGH, PA 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940...

  10. Energy Information Directory 1996

    SciTech Connect (OSTI)

    1997-01-01

    This directory lists most government offices and trade associations that are involved in energy matters. It does not include DOE offices which do not deal with the public or public information.

  11. Energy information directory 1998

    SciTech Connect (OSTI)

    1998-11-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists most Government offices and trade associations that are involved in energy matters.

  12. Freedom of Information Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    02, 2014 1:45 PM Submitted by Anonymous User This message was created by a Microsoft InfoPath form. The form data may be included as an attachment. Freedom of Information Act...

  13. Information Meeting- Education

    ScienceCinema (OSTI)

    None

    2011-04-25

    Suite à un circulaire, Messieurs Goldschmidt et Ullmann donnent plus d'information et attendent des questions/réponses concernant les problèmes d'éducation d'enfants

  14. Value of Information References

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Morency, Christina

    2014-12-12

    This file contains a list of relevant references on value of information (VOI) in RIS format. VOI provides a quantitative analysis to evaluate the outcome of the combined technologies (seismology, hydrology, geodesy) used to monitor Brady's Geothermal Field.

  15. Information applications: Rapporteur summary

    SciTech Connect (OSTI)

    Siegel, S.

    1990-12-31

    An increased level of mathematical sophistication will be needed in the future to be able to handle the spectrum of information as it comes from a broad array of biological systems and other sources. Classification will be an increasingly complex and difficult issue. Several projects that are discussed are being developed by the US Department of Health and Human Services (DHHS), including a directory of risk assessment projects and a directory of exposure information resources.

  16. ARM - Methane Background Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WarmingMethane Background Information Outreach Home Room News Publications Traditional Knowledge Kiosks Barrow, Alaska Tropical Western Pacific Site Tours Contacts Students Study Hall About ARM Global Warming FAQ Just for Fun Meet our Friends Cool Sites Teachers Teachers' Toolbox Lesson Plans Methane Background Information What is Methane? Why Do We Use Methane? How is Methane Made? Where Do We Find Methane? Can Methane Be Dangerous? Does Methane Contribute to Climate Change? What is Methane?

  17. Physics Informed Machine Learning

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Physics Informed Machine Learning Physics Informed Machine Learning WHEN: Jan 19, 2016 8:00 AM - Jan 22, 2016 4:00 PM WHERE: Inn at Loretto, Santa Fe CATEGORY: Science TYPE: Conference INTERNAL: Calendar Login Event Description A revolution in statistics and machine learning (ML) is underway. Modern algorithms can now learn high level abstractions via hierarchical models, leading to breakthrough accuracies in benchmarks for computer vision, language, etc. Underlying these advances is a strong

  18. Information Sciences and Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences and Technology Information Sciences and Technology National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Executive Steve Stringer Business Development Executive Richard P. Feynman Center for Innovation (505) 660-2177 Email Los Alamos leverages advances in theory, algorithms,

  19. Open Energy Information Systems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    OpenEIS (energy information systems) Jessica Granderson Lawrence Berkeley National Laboratory JGranderson@lbl.gov, 510.486.6792 April 3, 2013 2 | Building Technologies Office eere.energy.gov Purpose & Objectives Problem Statement: Advanced algorithms and analyses can enable 5-40% savings, yet are rarely adopted; 3 relevant barriers include: 1. Lack of awareness that simple analytics can be used to generate valuable insights and actionable information, without further training 2. Risk

  20. Sandia Proprietary Information PII

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    BRU (09-2014) Sandia Proprietary Information PII 1 Sandia Proprietary Information NEW MEXICO BACKGROUND REVIEW UPDATE You are receiving this notice on behalf of the Personnel Security Background Review Office. If you have any questions regarding the Background Review process, or the attached form. Contact the Personnel Security Background Review Office at 1-800-417-2634, ext. 844-8902 or (505) 844-8902. In compliance with 48 CFR 904.401 prior to selecting any individual for any position

  1. Contractor Past Performance Information

    Energy Savers [EERE]

    Contractor Human Resources Management Contractor Human Resources Management Value Study Desk Manual & Cost Study Manual Memo from Robert Myers regarding DOE Benefit Value Desk Manual (56.76 KB) Value Study Desk Manual (1005.83 KB) Cost study manual 06 29 2012.pdf (334.92 KB) More Documents & Publications Value Study Desk Manual VALUE STUDY VALUE STUDY

    6 (August 2013) 1 Reporting Other Contractor Information into Federal Awardee Performance and Integrity Information System (FAPIIS)

  2. Protecting your personal information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting your personal information Community Connections: Your link to news and opportunities from Los Alamos National Laboratory Latest Issue: September 1, 2016 all issues All Issues » submit Protecting your personal information Quantum cryptography keeps data secure from cyber thieves October 1, 2014 Mass-producible quantum smart card and fiber optics cable. Mass-producible quantum smart card and fiber optics cable. Contact Community Programs Director Kurt Steinhaus Email Editor Ute Haker

  3. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  4. Special Undergraduate Informations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Special Undergraduate Information Special Undergraduate Information for SAGE A National Science Foundation Research Experiences for Undergraduates program Contacts Institute Director Reinhard Friedel-Los Alamos SAGE Co-Director W. Scott Baldridge-Los Alamos SAGE Co-Director Larry Braile-Purdue University Professional Staff Assistant Georgia Sanchez (505) 665-0855 Support to SAGE provides waiver of fees and a small stipend for attendance at SAGE for U.S. undergraduate students who are citizens or

  5. Information technology resources assessment

    SciTech Connect (OSTI)

    Loken, S.C.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.

  6. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and provide new insights into the basic biology of viralhost dynamics of infection. ... "Through this study we now better understand the biology that defines that resilience." ...

  7. Energy information directory 1997

    SciTech Connect (OSTI)

    1997-09-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, state, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists some of the Government offices and trade associations that are involved in energy matters. It includes those DOE offices which deal with the public or public information. For the purposes of this publication, each entry has been given a numeric identification symbol. The index found in the back of this publication uses these identification numbers to refer the reader to relevant entries.

  8. Sandia Proprietary Information PII

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CBR (09/2014) Supersedes (07-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information CALIFORNIA CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are receiving this notice on behalf of the Personnel Security Background Review Office. If you have any questions regarding the Background Review process, or the attached form. Contact the Personnel Security Background Review Office at 1-800-417-2634, ext. 844-8902 or (505) 844-8902 or email: pebr@sandia.gov. In compliance with 48

  9. Sandia Proprietary Information PII

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRO (09-2014) Supersedes (09-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information NM CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are receiving this notice on behalf of the Personnel Security Background Review Office. If you have any questions regarding the Background Review process, or the attached form. Contact the Personnel Security Background Review Office at 1-800-417-2634, ext. 844-8902 or (505) 844-8902. In compliance with 48 CFR 904.401 prior to selecting

  10. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources Information Resources Photo of NREL employee Michael Deru using a desktop computer. The Geothermal Technologies Office is a source of current, relevant information about enhanced geothermal systems (EGS) technologies and other geothermal technologies and applications. On these pages you'll find helpful publications, software, and websites for the geothermal community and stakeholders. Geothermal information resources Publications Technical Roadmaps for

  11. US Energy Information Administration EIA | Open Energy Information

    Open Energy Info (EERE)

    Administration EIA Jump to: navigation, search Name: US Energy Information Administration (EIA) Place: Washington DC, Washington, DC Zip: 20585 Product: The Energy Information...

  12. Utah Water Right Information Webpage | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Utah Water Right Information Webpage Abstract Provides information about obtaining a water rights...

  13. NMSLO Information Packet for Business Lease | Open Energy Information

    Open Energy Info (EERE)

    Information Packet for Business Lease Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: NMSLO Information Packet for Business...

  14. Smart Grid Information Clearinghouse (SGIC) | Open Energy Information

    Open Energy Info (EERE)

    TOOL Name: Smart Grid Information Clearinghouse (SGIC) AgencyCompany Organization: Smart Grid Information Clearinghouse Sector: Energy Focus Area: People and Policy Phase:...

  15. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  16. info disclosure-rocky mts

    Energy Savers [EERE]

    Monday, February 29, 2016 JUSTICE NEWS Department of Justice Office of Public Affairs Lockheed Martin Agrees to Pay $5 Million to Settle Alleged Violations of the False Claims Act and the Resource Conservation and Recovery Act Lockheed Martin Corporation and subsidiaries Lockheed Martin Energy Systems and Lockheed Martin Utility Services (collectively, Lockheed Martin) have agreed to pay the United States $5 million to resolve allegations that they violated the Resource Conservation and Recovery

  17. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Massachusetts's 1997 electric utility restructuring legislation authorized the Massachusetts Department of Telecommunications and Energy (DTE)* to require certain electricity providers to disclose...

  18. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    The Ohio Public Utilities Commission (PUCO) adopted rules in 2000 to implement this policy; the rules have been amended subsequently. There are separate rules for electric utilities providing a...

  19. Critical Materials Institute - invention disclosures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a>

  20. High Command Fidelity Electromagnetically Driven Calorimeter (High-CoFi EleDriCal)
    Patent...

  21. Disclosures | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Andrei Khodak M-894 Electrtostatic Beam-Plasma Thruster Yevgeny Raitses M-893 ... M-890 Adjustable Portable Tensile Testing Machine Michael E Viola M-889 Multi-Stage Plasma ...

  1. Condition Assessment Information System

    Energy Science and Technology Software Center (OSTI)

    2002-09-16

    CAIS2000 records, tracks and cost maintenance deficiencies associated with condition assessments of real property assets. Cost information is available for 39,000 items in the currenht RS Means, Facilities Construction Manual. These costs can, in turn, be rolled by by asset to produce the summary condition of an asset or site.

  2. Information Technology Project Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-12

    This Guide provides Department of Energy recommended guidelines to ensure that the acquisition of information technology capital assets is performed in compliance with DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE N 251.105.

  3. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  4. Small Wind Information (Postcard)

    SciTech Connect (OSTI)

    Not Available

    2011-08-01

    The U.S. Department of Energy's Wind Powering America initiative maintains a website section devoted to information about small wind turbines for homeowners, ranchers, and small businesses. This postcard is a marketing piece that stakeholders can provide to interested parties; it will guide them to this online resource.

  5. Information Services Directory

    SciTech Connect (OSTI)

    1991-03-01

    Congress passed the Nuclear Waste Policy Act of 1982 (NWPA) and its amendments establishing the national policy for safely storing, transporting and disposing of spent nuclear fuel and high-level radioactive waste in a geologic repository. This legislation created the Office of Civilian Radioactive Waste Management (OCRWM) within the US Department of Energy (DOE) to develop an integrated system for the safe and efficient disposal of high-level radioactive waste. The NWPA, as amended, directs DOE to study in detail the Yucca Mountain site in Nevada as the only candidate site for the Nation`s geologic repository. This Information Services Directory is intended to facilitate dissemination of information. The Directory is produced by the Education and Information Division of OCRWM`s Office of External Relations and will be updated periodically. This is the third such update since its issuance in August 1986. It is a reference document that lists the sources of program information available to states, Indian tribes, and the public.

  6. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  7. Energy information sheets, July 1998

    SciTech Connect (OSTI)

    1998-07-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  8. Energy information sheets, September 1996

    SciTech Connect (OSTI)

    1996-09-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  9. Freedom of Information Act Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for information that you made to the Bonneville Power Administration (BPA) under the Freedom of Information Act (FOIA), 5 USC 552. You requested the following: Copies of all...

  10. Vehicle Technologies Office: Information Resources

    Broader source: Energy.gov [DOE]

    From here you can access additional information on advanced transportation technologies; view programmatic publications and technical information; learn the basics of hybrid vehicle technology;...

  11. Information Science, Computing, Applied Math

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science, Computing, Applied Math Information Science, Computing, Applied Math National security depends on science and technology. The United States relies on Los ...

  12. Information Technology Specialist (Info Security)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Cyber...

  13. Las Pailas | Open Energy Information

    Open Energy Info (EERE)

    General Information Name Las Pailas Facility Geothermal Power Plant Sector Geothermal energy Location Information Location Guanacaste, Costa Rice Coordinates 10.7869295,...

  14. Malitbog GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Malitbog GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 11.151315086646, 124.64890480042 Loading map......

  15. Bruchsal GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Bruchsal GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 49.125177630171, 8.5671043395996 Loading map......

  16. Lahendong GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Lahendong GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 1.3235343193864, 124.83073711395 Loading map......

  17. Landau GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Landau GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 49.186587726033, 8.1233596801758 Loading map......

  18. Miravalles IV | Open Energy Information

    Open Energy Info (EERE)

    Information Name Miravalles IV Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 10.5251574, -85.254136 Loading map......

  19. Mindanao GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Mindanao GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 7.0161091018815, 125.22165298462 Loading map......

  20. Blumau GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Blumau GEPP Facility Power Plant Sector Geothermal energy Location Information Address Blumau, Austria Coordinates 47.124360162625,...

  1. Mambucal GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Mambucal GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 10.483002547448, 123.10599088669 Loading map......

  2. Green Machine | Open Energy Information

    Open Energy Info (EERE)

    Information Name Green Machine Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 45.943161, 24.96676 Loading map......

  3. TR1 | Open Energy Information

    Open Energy Info (EERE)

    TR1 General Information Name TR1 Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 38.342452711329, 28.556900024414 Loading map......

  4. Synthesis and subsequent rearrangement of chloro(pentafluorophenyl)-1,5-cyclooctadienepalladium(II), an illustrative example of endo attack to a coordinated double bond

    SciTech Connect (OSTI)

    Albeniz, A.C.; Espinet, P. ); Jeannin, Y.; Philoche-Levisalles, M. ); Mann, B.E. )

    1990-08-29

    Pd(C{sub 6}F{sub 5})Cl(1,5-cyclooctadiene) has been prepared in high yield and characterized crystallographically: monoclinic space group P2{sub 1}/c, a = 8.313 (1) {angstrom}, b = 7.7800 (6) {angstrom}, c = 22.292 (4) {angstrom}, {beta} = 95.77 (1){degree} (Z = 4), final R of 0.024 for 2,080 independent reflections. The x-ray structure reveals a high trans influence of the C{sub 6}F{sub 5} groups that weakens the opposite palladium-olefin bond. This complex rearranges slowly in solution by intramolecular double bond insertion into the Pd-C{sub 6}F{sub 5} bond to give an allyl complex Pd{sub 2}({mu}-Cl){sub 2}(6-C{sub 6}F{sub 5}-1-3-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2} and {sigma},{pi}-complex Pd{sub 2}({mu}-Cl){sub 2}(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12}){sub 2}. A derivative of the latter, Pd(8-C{sub 6}F{sub 5}-1:4-5-{eta}{sup 3}-C{sub 8}H{sub 12})(F6-acac), has been characterized crystallographically: triclinic space group P{anti 1}, a = 10.360 (3) {angstrom}, b = 11.051 (2) {angstrom}, c = 11.084 (4) {angstrom}, {alpha} = 73.70 (2){degree}, {beta} = 61.41 (2){degree}, {gamma} = 66.08 (2){degree}, final R of 0.036 for 3,341 independent reflections. The rearrangement of Pd(C{sub 6}F{sub 5})Cl(1,5-COD) is catalyzed by its products and slowed down in coordinating solvents. Both products are the result of an endo attack of C{sub 6}F{sub 5} to COD and are formed competitively from a common intermediate.

  5. Mercury Information Clearinghouse

    SciTech Connect (OSTI)

    Chad A. Wocken; Michael J. Holmes; Dennis L. Laudal; Debra F. Pflughoeft-Hassett; Greg F. Weber; Nicholas V. C. Ralston; Stanley J. Miller; Grant E. Dunham; Edwin S. Olson; Laura J. Raymond; John H. Pavlish; Everett A. Sondreal; Steven A. Benson

    2006-03-31

    The Canadian Electricity Association (CEA) identified a need and contracted the Energy & Environmental Research Center (EERC) to create and maintain an information clearinghouse on global research and development activities related to mercury emissions from coal-fired electric utilities. With the support of CEA, the Center for Air Toxic Metals{reg_sign} (CATM{reg_sign}) Affiliates, and the U.S. Department of Energy (DOE), the EERC developed comprehensive quarterly information updates that provide a detailed assessment of developments in the various areas of mercury monitoring, control, policy, and research. A total of eight topical reports were completed and are summarized and updated in this final CEA quarterly report. The original quarterly reports can be viewed at the CEA Web site (www.ceamercuryprogram.ca). In addition to a comprehensive update of previous mercury-related topics, a review of results from the CEA Mercury Program is provided. Members of Canada's coal-fired electricity generation sector (ATCO Power, EPCOR, Manitoba Hydro, New Brunswick Power, Nova Scotia Power Inc., Ontario Power Generation, SaskPower, and TransAlta) and CEA, have compiled an extensive database of information from stack-, coal-, and ash-sampling activities. Data from this effort are also available at the CEA Web site and have provided critical information for establishing and reviewing a mercury standard for Canada that is protective of environment and public health and is cost-effective. Specific goals outlined for the CEA mercury program included the following: (1) Improve emission inventories and develop management options through an intensive 2-year coal-, ash-, and stack-sampling program; (2) Promote effective stack testing through the development of guidance material and the support of on-site training on the Ontario Hydro method for employees, government representatives, and contractors on an as-needed basis; (3) Strengthen laboratory analytical capabilities through

  6. WINDExchange: Information Resources

    Wind Powering America (EERE)

    Information Resources A range of WINDExchange resources are available, including links to relevant publications, podcasts, and webinars about wind energy topics. Annual Reports Screenshot of the 2015 Wind Technologies Market Report 2015 Wind Technologies Market Report The report provides a comprehensive overview of 2015 trends in the U.S. wind industry and wind power market. Lawrence Berkeley National Laboratory draws from a variety of data sources and covers a broad range of topics. Screenshot

  7. SOURCE SELECTION INFORMATION -

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 Department of Energy Washington, DC 20585 (enter date here, centered revised template April 26, 2013) The Honorable Harold Rogers The Honorable Barbara A. Mikulski Chairman, Committee on Appropriations Chairwoman, Committee on Appropriations U.S. House of Representatives U.S. Senate Washington, DC 20515 Washington, DC 20510 The Honorable Rodney P. Frelinghuysen The Honorable Dianne Feinstein Chairman,

  8. 2016 Information Repository Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 Information Repository Documents WIPP Annual Waste Minimization Report Class 1* Permit Modifications and NMED Responses Class 1 and Class 1* Modifications WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088-TSDF John E. Kieling/Hazardous Waste Bureau dated January 27, 2016 Class 1* Modification, requiring prior agency approval, seeking to Revise Closure Schedule Dates in Attachment G Class 1 Permit Modifications and NMED Responses Class 1 Modifications WIPP Hazardous Waste

  9. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Audit Report A-07-16 for INL/CCP RH Waste Characterization Activities dated November 22, 2006 Transmittal of the Certification Audit Report for SRS A-07-01 dated November 21, 2006 Annual Proposed Acceptable Knowledge Sufficiency Determination List Annual Report Submittals Submittal of Acceptable Knowledge Sufficiency Determination Notice of Submittal of a Dispute

  10. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Certification Audit Report for the Advanced Mixed Waste Treatment Program, A-08-19 dated November 25, 2008 Transmittal of the Certification Audit Report for the Hanford TRU Program dated October 15, 2008 Transmittal of the Certification Audit Report for the Argonne National Laboratory-Central Characterization Project, Audit A-08-24 dated September 17,

  11. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Recertification Audit Report for the Advanced Mixed Waste Treatment Project, Audit A-10-24, dated December 14, 2010 Transmittal of Carlsbad Field Office Final Audit Report A-10-23, Argonne National Laboratory Central Characterization Project for Remote Handled Waste Characterization dated October 14, 2010 Transmittal of Recertification Audit Report

  12. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Notification of Last Waste Emplacement and Intent to Commence Closure of the Waste Isolation Pilot Plant Hazardous Waste Disposal Unit Panel 5 dated March 30, 2011 Submittal of Final Audit Reports Transmittal of the Final Audit Report A-11-20, Argonne National Laboratory Central Characterization Project for Remote-Handled Waste Characterization dated October 26, 2011 Transmittal of the Recertification

  13. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Final Audit Report for the Argonne National Laboratory Central Characterization Project Recertification Audit A-12-16 dated December 19, 2012 Transmittal of the Final Audit Report for Recertification Audit A-12-14, INL Analytical Laboratories Utilizing the Central Characterization Project dated December 12, 2012 Transmittal of the Final Audit Report for Los Alamos

  14. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Notification of Panel 6 Closure and Final Waste Emplacement dated November 5, 2013 Submittal of Final Audit Reports Transmittal of the Final Audit Report for Recertification Audit A-14-01 of the Advanced Mixed Waste Treatment Project dated December 9, 2013 Final Audit Report for the Argonne National Laboratory Central Characterization Program Recertification Audit A-13-24 dated November 22, 2013

  15. Emergency Information | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Emergency Information Jefferson Lab's service departments and divisional offices operate Monday through Friday, 8 a.m. to 5 p.m. EST. Respond to all building and facility alarms. Follow all posted warning signs. At each location, familiarize yourself with emergency exits and procedures that may be unique or specific to that facility, including the muster point if you must evacuate a building. To contact Jefferson Lab Security, call 757-269-5822. If you see a medical or other emergency,

  16. Medical Information | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Medical Information JLab's Occupational Medicine group provides a variety of occupational health services for employees and lab users. We assist visitors and subcontractors with medical emergencies, provide first-aid treatment and coordinate referrals to qualified off-site providers for more serious cases. We also have available to employees a wide range of medical monitoring and wellness-related services. All of these are provided at no cost to employees and with strict medical confidentiality.

  17. Information Resources - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quick Search Search By: Keyword Author Title Year GO Main Menu Home My Papers Submit Status Signatures Search Admin Log Out Contract Acknowledgment Notice In June 2014, the Department of Energy's Office of Science issued new guidance for manuscripts produced by DOE-funded laboratories. Each submitted manuscript must now contain a Notice to the Publisher and an Acknowledgment. Notice to Publisher As per the JSA contract with DOE, it is necessary to inform the publisher of the U.S. Government

  18. Network Information System

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following aremore » the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an

  19. Network Information System

    SciTech Connect (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following are the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment

  20. Information technology resources assessment

    SciTech Connect (OSTI)

    Stevens, D.F.

    1992-01-01

    This year`s Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  1. Information technology resources assessment

    SciTech Connect (OSTI)

    Stevens, D.F.

    1992-01-01

    This year's Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  2. Only critical information was scanned

    Office of Legacy Management (LM)

    Only critical information was scanned. Entire document is available upon request - Click here to email a

  3. Information Collection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Collection Information Collection The Office of Environment, Health, Safety and Security (EHSS) continues to seek for ways to minimize the burden of information collection on DOE and its contractors. DOE collects information concerning the health, safety and security of DOE employees including its contractors and facilities. The information collected will be used by DOE to exercise management oversight over Management and Operating (M&O) contractors of DOE's Government-Owned

  4. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager This e-mail address is being protected from spambots. You need JavaScript enabled to view it 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  5. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager This e-mail address is being protected from spambots. You need JavaScript enabled to view it 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  6. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Subpart D--Maintenance and Establishment of Systems of Records 1008.20 Content of systems of records. 1008.21 Collection of information by DOE about an individual for a system of records. 1008.22 Use and collection of social security numbers. 1008.23 Public notice of systems of records. 1008.24 Criminal penalties-failure t o pub- lish a system notice. AUTHORITY: Dept. of Energy Organization Act, Pub. L. 95-91, Executive Order 12091, 42 FR 46267, Privacy Act of 1974, Pub. L. 9>579 (5 U.S.C.

  7. Wind energy information guide

    SciTech Connect (OSTI)

    1996-04-01

    This book is divided into nine chapters. Chapters 1--8 provide background and annotated references on wind energy research, development, and commercialization. Chapter 9 lists additional sources of printed information and relevant organizations. Four indices provide alphabetical access to authors, organizations, computer models and design tools, and subjects. A list of abbreviations and acronyms is also included. Chapter topics include: introduction; economics of using wind energy; wind energy resources; wind turbine design, development, and testing; applications; environmental issues of wind power; institutional issues; and wind energy systems development.

  8. ARM - People Address Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govAboutPerson Information About Become a User Recovery Act Mission FAQ Outreach Displays History Organization Participants Facility Statistics Forms Contacts Facility Documents ARM Management Plan (PDF, 1.3MB) Field Campaign Guidelines (PDF, 574KB) ARM Climate Research Facility Expansion Workshop (PDF, 1.46MB) Facility Activities ARM and the Recovery Act Contributions to International Polar Year Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send

  9. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2007 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Certification Audit Report A-07-14 of the AMWTP dated September 27, 2007 Transmittal of the Certification Audit Report A-07-03 of the ANL-CCP dated September 18, 2007 Final Audit Report A-07-24 of the SRS-CCP Battelle Columbus RH Waste dated September 6, 2007 Transmittal of the Certification Audit Report for the Hanford Site, Audit A-07-10 dated

  10. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager This e-mail address is being protected from spambots. You need JavaScript enabled to view it 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  11. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager This e-mail address is being protected from spambots. You need JavaScript enabled to view it 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  12. WIPP News & Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Carlsbad Field Office Information WIPP Overview Click on the Play button for an overview of the Waste Isolation Pilot Plant. (2.5 minutes, FLASH required) If you are not able to view the WIPP Overview, try clicking the graphic above to download the free Flash Player. News Releases Current and archived news releases TRU TeamWorks Read WIPP's online newsletter Fact Sheets Learn about WIPP basics with these educational summaries of popular topics Photo Gallery See photos of the work done at WIPP

  13. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  14. FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) | Department...

    Energy Savers [EERE]

    FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) FEDERAL ASSISTANCE BUDGET INFORMATION (CONSTRUCTION) Form provides information on the federal assistance budget for ...

  15. New Request for Information to Inform Department of Energy Critical

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Materials Strategy | Department of Energy New Request for Information to Inform Department of Energy Critical Materials Strategy New Request for Information to Inform Department of Energy Critical Materials Strategy February 10, 2016 - 12:00pm Addthis Diana Bauer Office Director for Energy Systems Analysis and Integration In today's energy economy, many advanced technologies rely on high performing materials with unique chemical and physical properties. In some cases, these materials are at

  16. SmartGrid Information | Department of Energy

    Office of Environmental Management (EM)

    SmartGrid Information SmartGrid Information Smart Grid Information This web page provides information and resources on several policy issues critical to the continued development ...

  17. Contractor Past Performance Information

    Office of Environmental Management (EM)

    Contractor Legal Management Requirements Contractor Legal Management Requirements The purpose of this flash is to inform you of the issuance of two new Acquisition Guide Chapters, Chapters 70-31 C and 31.3, both titled "Contractor Legal Management Requirements." (Chapter 31.3 simply refers you to Chapter 70-31 C.) PF2010-81 Contractor Legal Management Requirements (58.82 KB) PF2010-81a.pdf (50.14 KB) PF2010-81b.pdf (100.89 KB) PF2010-81c.pdf (50.14 KB) PF2010-81d.pdf (100.89 KB) More

  18. Dynamic Information Architecture System

    Energy Science and Technology Software Center (OSTI)

    1997-02-12

    The Dynamic Information System (DIAS) is a flexible object-based software framework for concurrent, multidiscplinary modeling of arbitrary (but related) processes. These processes are modeled as interrelated actions caused by and affecting the collection of diverse real-world objects represented in a simulation. The DIAS architecture allows independent process models to work together harmoniously in the same frame of reference and provides a wide range of data ingestion and output capabilities, including Geographic Information System (GIS) typemore » map-based displays and photorealistic visualization of simulations in progress. In the DIAS implementation of the object-based approach, software objects carry within them not only the data which describe their static characteristics, but also the methods, or functions, which describe their dynamic behaviors. There are two categories of objects: (1) Entity objects which have real-world counterparts and are the actors in a simulation, and (2) Software infrastructure objects which make it possible to carry out the simulations. The Entity objects contain lists of Aspect objects, each of which addresses a single aspect of the Entity''s behavior. For example, a DIAS Stream Entity representing a section of a river can have many aspects correspondimg to its behavior in terms of hydrology (as a drainage system component), navigation (as a link in a waterborne transportation system), meteorology (in terms of moisture, heat, and momentum exchange with the atmospheric boundary layer), and visualization (for photorealistic visualization or map type displays), etc. This makes it possible for each real-world object to exhibit any or all of its unique behaviors within the context of a single simulation.« less

  19. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Contact Information Debra Covey covey@ameslab.gov 515-294-1048 Stacy Joiner joiner@ameslab.gov 515-294-5932 Tessa Lemons tlemons@ameslab.gov 515-294-2618...

  20. SRI2007 Conference - Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information For further information about the conference, please click on the following link. E-mail Ms. Lee Ann Murphey or contact Ms. Lee Ann Murphey CAMDLSU 6980...

  1. Deactivation & Decommissioning Knowledge Management Information...

    Energy Savers [EERE]

    The D&D Knowledge Management Information Tool (KM-IT) is a web-based information tool to ... The D&D KM-IT has been developed through the application of state-of-the-art web ...

  2. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The NERSC Information Management (NIM) system is a web portal used to view and modify user ... The NERSC Information Management (NIM) system is a web portal used to view and modify user ...

  3. Forward Electronics | Open Energy Information

    Open Energy Info (EERE)

    focussed on optoelectronics, information appliances, consumer electronics and communication. Coordinates: 25.080441, 121.564194 Show Map Loading map......

  4. BIO DZL | Open Energy Information

    Open Energy Info (EERE)

    DZL Place: Bangalore, Karnataka, India Product: Bangalore-based company involved in biodiesel production, jatropha development and biodiesel information dissemination....

  5. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Management About Us Hanford Cultural Resources LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets / Briefings LTS In The News LTS Related Links LTS Contact Us Email Email Page | Print Print Page | Text Increase Font Size Decrease Font Size Information Management HNF-50340 Rev.1, Hanford Site Long-Term Stewardship Information Management Program Plan describes the planning, responsibilities and

  6. Defining a new information exchange

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    This wiki page provides the public with all specifications needed to create a new information exchange (content model package).

  7. Liquid Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  8. Gas Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  9. Isotope Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  10. Sandia National Laboratories: Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electromagnetics Bioscience Computing and Information Science Electromagnetics Facilities Programs & Capabilities Partnership Opportunities EM News & Reports Contact Information Engineering Science Geoscience Materials Science Nanodevices and Microsystems Radiation Effects and High Energy Density Science Research Contact Information Steve Glover 505-845-9620 sfglove@sandia.gov

  11. Wind Energy Information Guide 2004

    SciTech Connect (OSTI)

    anon.

    2004-01-01

    The guide provides a list of contact information and Web site addresses for resources that provide a range of general and technical information about wind energy, including general information, wind and renewable energy, university programs and research institutes, international wind energy associations and others.

  12. Energy Information Administration (EIA)- About the Commercial Buildings

    Gasoline and Diesel Fuel Update (EIA)

    Adam Sieminski (202) 662-1624 April 2010 Energy and the Economy US EIA & JHU SAIS 2010 Energy Conference April 6, 2010 All prices are those current at the end of the previous trading session unless otherwise indicated. Prices are sourced from local exchanges via Reuters, Bloomberg and other vendors. Data is sourced from Deutsche Bank and subject companies. DISCLOSURES AND ANALYST CERTIFICATIONS ARE LOCATED IN APPENDIX 1. Adam Sieminski, CFA Chief Energy Economist adam.sieminski@db.com +1 202

  13. System for Information Discovery

    Energy Science and Technology Software Center (OSTI)

    1998-09-25

    SID characterizes natural language based documents so that they may be related and retrieved based on content similarity. This technology processes textual documents, autonoumsly identifies the major topics of the document set, and constructs an interpretable, high dimensional representation of each document. SID also provides the ability to interactively reweight representations based on user need, so users may analyze the dataset from multiple points of view. The particular advantages SID offers are speed, data compression,more » flexibility in representation, and incremental processing. SPIRE consists of software for visual analysis of text-based information sources. This technology enables users to make discoveries about the content of very large sets of textual documents without requiring the user to read or presort the documents. It employs algorithms for text and word proximity analysis to identify the key themes within the documents. The results of this analysis are projected onto a visual spatial proximity display (Galaxies or Themescape) where document proximity represents the degree of relatedness of theme.« less

  14. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  15. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  16. The Financial Reporting System Public Data

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    several physicalfinancial relationships. Description These files contain disclosure-free aggregate data from the Energy Information Administration's Financial Reporting System...

  17. Ground Electromagnetic Techniques | Open Energy Information

    Open Energy Info (EERE)

    Information Exploration Group: Geophysical Techniques Exploration Sub Group: Electrical Techniques Parent Exploration Technique: Electromagnetic Techniques Information...

  18. COP 18 Side Event General Information | Open Energy Information

    Open Energy Info (EERE)

    Side Event General Information Jump to: navigation, search Low Emission Development Strategies Global Partnership Advancing climate-resilient, low-emission development around the...

  19. REEGLE - Clean Energy Information Gateway | Open Energy Information

    Open Energy Info (EERE)

    search Tool Summary LAUNCH TOOL Name: reegle.info - clean energy information portal AgencyCompany Organization: Renewable Energy and Energy Efficiency Partnership...

  20. SWERA/Solar Resource Information | Open Energy Information

    Open Energy Info (EERE)

    SWERASolar Resource Information < SWERA Jump to: navigation, search SWERA logo.png Solar and Wind Energy Resource Assessment (SWERA) Interactive Web PortalPowered by OpenEI...

  1. Montana Information for 310 Applicant | Open Energy Information

    Open Energy Info (EERE)

    for 310 Applicant Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana Information for 310 Applicant Abstract Provides overview of joint...

  2. Tribal Energy and Environmental Information | Open Energy Information

    Open Energy Info (EERE)

    Tribal Energy and Environmental Information Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Secondary Legal SourceSecondary Legal Source: Tribal...

  3. Central Information and Business Agency CIBA | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Name: Central Information and Business Agency (CIBA) Place: Lewis, Delaware Sector: Solar Product: Developer of solar farms in Europe via its...

  4. Integrated risk information system (IRIS)

    SciTech Connect (OSTI)

    Tuxen, L.

    1990-12-31

    The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

  5. Information architecture. Volume 3: Guidance

    SciTech Connect (OSTI)

    1997-04-01

    The purpose of this document, as presented in Volume 1, The Foundations, is to assist the Department of Energy (DOE) in developing and promulgating information architecture guidance. This guidance is aimed at increasing the development of information architecture as a Departmentwide management best practice. This document describes departmental information architecture principles and minimum design characteristics for systems and infrastructures within the DOE Information Architecture Conceptual Model, and establishes a Departmentwide standards-based architecture program. The publication of this document fulfills the commitment to address guiding principles, promote standard architectural practices, and provide technical guidance. This document guides the transition from the baseline or defacto Departmental architecture through approved information management program plans and budgets to the future vision architecture. This document also represents another major step toward establishing a well-organized, logical foundation for the DOE information architecture.

  6. Information Center | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Center Information Center The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) provides expert evaluations of management performance in safety, security and other areas by seasoned experts who are independent of line management. Information related to enforcement, safety, security, emergency management and cyber performance management is made available to the public in the EA Information Center. Enforcement Info Center The Department's Enforcement Office conducts

  7. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Home » Information Resources Information Resources The Solid-State Lighting (SSL) program has a large collection of resources designed to deliver current, relevant information about the status of SSL technology and applications. On this page you'll find links to DOE conferences (past and present), presentations, publications, and webcasts. Conferences and Meetings Learn about current and past DOE SSL conferences, roundtables, meetings, and other events. Presentations Download PDF files of

  8. Computerized international geothermal information systems

    SciTech Connect (OSTI)

    Phillips, S.L.; Lawrence, J.D.; Lepman, S.R.

    1980-03-01

    The computerized international geothermal energy information system is reviewed. The review covers establishment of the Italy - United States linked data centers by the NATO Committee on Challenges of Modern Society, through a bilateral agreement, and up to the present time. The result of the information exchange project is given as the bibliographic and numerical data available from the data centers. Recommendations for the exchange of computerized geothermal information at the international level are discussed.

  9. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources We've organized links and information on solar energy technologies and the SunShot Initiative to make it easier for you to find what you're looking for. Solar Energy Technologies Office Newsletters Solar-focused newsletters highlight the key activities, events, funding opportunities, and publications that the SunShot Initiative supports. Homeowner's Guide to Going Solar Learn about starting the process of adding solar energy to your home. Resources for

  10. Whistleblower Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Whistleblower Information Whistleblower Information OVERVIEW Whistleblowers play a critical role in keeping our government honest, efficient and accountable. In recognition of this role, Federal laws outline the duty of Federal employees to disclose wrongdoing, and they are to do so in an environment free from the threat of retaliation. This page, and the linked information accessible from this page, is designed to help educate DOE employees, contractors and grantees about whistleblower

  11. LA-5097-MS INFORMAL REPORT

    Office of Legacy Management (LM)

    5097-MS INFORMAL REPORT lamos lamos scientific laboratory scientific laboratory of the University of California of the University of California LOS ALAMOS. NEW MEXICO 87544 LOS ALAMOS. NEW MEXICO 87544 Los AIamos Land Areas Environmental Radiation Survey 1972 . In the interest of prompt distribution, this LAMS re port was not edited by the Technical Information staff. Printed in the United States of America. Available from National Technical Information Service U. S. Department of Commerce 5285

  12. Director, Information Technologies Services Office

    Broader source: Energy.gov [DOE]

    The mission of the Information Technologies Services Office (ITSO) is to provide effective corporate leadership to proactively identify and manage business system efficiency improvements and to...

  13. General Motors | Open Energy Information

    Open Energy Info (EERE)

    Motors Jump to: navigation, search Name: General Motors Place: Detroit, MI Website: www.generalmotors.com References: General Motors1 Information About Partnership with NREL...

  14. Information Bridge MARC Records FAQ

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... You can receive weekly automated notices of new records by registering for the Information Bridge Alerts . In the Search Terms box, enter ...

  15. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Laboratory (NREL). It integrates resource data and geographic information systems (GIS) - for integrated resource assessment. The Geospatial Toolkit (GsT) is a map-based...

  16. Schneider National | Open Energy Information

    Open Energy Info (EERE)

    National Jump to: navigation, search Name: Schneider National Place: Denver, CO Website: www.schneidernational.com References: Schneider National1 Information About Partnership...

  17. Tommy Williams | Open Energy Information

    Open Energy Info (EERE)

    Tommy Williams Jump to: navigation, search Name: Tommy Williams Place: Gainesville, FL Website: www.tommywilliams.com References: Tommy Williams1 Information About Partnership...

  18. The challenge of information access

    SciTech Connect (OSTI)

    Travers, L.A.

    1990-12-31

    Traditional methods of risk communication may not work for large quantities of information. Federal databases are being created to meet the public`s right-to-know.

  19. Evolution of toxicology information systems

    SciTech Connect (OSTI)

    Wassom, J.S.; Lu, P.Y.

    1990-12-31

    Society today is faced with new health risk situations that have been brought about by recent scientific and technical advances. Federal and state governments are required to assess the many potential health risks to exposed populations from the products (chemicals) and by-products (pollutants) of these advances. Because a sound analysis of any potential health risk should be based on the use of relevant information, it behooves those individuals responsible for making the risk assessments to know where to obtain needed information. This paper reviews the origins of toxicology information systems and explores the specialized information center concept that was proposed in 1963 as a means of providing ready access to scientific and technical information. As a means of illustrating this concept, the operation of one specialized information center (the Environmental Mutagen Information Center at Oak Ridge National Laboratory) will be discussed. Insights into how toxicological information resources came into being, their design and makeup, will be of value to those seeking to acquire information for risk assessment purposes. 7 refs., 1 fig., 4 tabs.

  20. Food Service | Open Energy Information

    Open Energy Info (EERE)

    Building Types 1 References EIA CBECS Building Types U.S. Energy Information Administration (Oct 2008) Retrieved from "http:en.openei.orgwindex.php?titleFoodService&old...