National Library of Energy BETA

Sample records for information disclosure attacks

  1. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  2. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  3. T-578: Vulnerability in MHTML Could Allow Information Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 8: Vulnerability in MHTML Could Allow Information Disclosure T-578: Vulnerability in MHTML Could Allow Information Disclosure March 15, 2011 - 3:05pm Addthis PROBLEM: Microsoft Windows is prone to a vulnerability that may allow attackers to inject arbitrary script code into the current browser session. PLATFORM: Windows 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct

  4. U-200: Red Hat Directory Server Information Disclosure Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability June 27,...

  5. Environmental Information Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Disclosure Summary New Jersey's 1999 electric utility restructuring law requires electricity suppliers to disclose to customers details regarding the fuel mix and emissions of...

  6. U-181: IBM WebSphere Application Server Information Disclosure

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 81: IBM WebSphere Application Server Information Disclosure Vulnerability U-181: IBM WebSphere Application Server Information Disclosure Vulnerability June 1, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere Application Server 8.0.x ABSTRACT: The vulnerability is caused due to missing access controls in

  7. V-192: Symantec Security Information Manager Input Validation...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Flaws Permit Cross-Site Scripting, SQL Injection, and Information Disclosure Attacks V-192: Symantec Security Information Manager Input Validation Flaws Permit Cross-Site...

  8. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  9. Non-Disclosure Agreements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    on specific technical areas Contact NDA Team Richard P. Feynman Center for Innovation (505) 667-9911 Email A Non-Disclosure Agreement (NDA) protects proprietary information ...

  10. Energy Disclosure and Leasing Standards: Best Practices

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on Energy Disclosure and Leasing Standards: Best Practices.

  11. T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service

    Broader source: Energy.gov [DOE]

    This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

  12. U-200: Red Hat Directory Server Information Disclosure Security Issue and Vulnerability

    Broader source: Energy.gov [DOE]

    If an LDAP user had changed their password, and the directory server had not been restarted since that change, an attacker able to bind to the directory server could obtain the plain text version of that user's password.

  13. Commercial and Multifamily Building Benchmarking and Disclosure |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy and Multifamily Building Benchmarking and Disclosure Commercial and Multifamily Building Benchmarking and Disclosure Better Buildings Residential Network Peer Exchange Call: Commercial and Multifamily Building Benchmarking and Disclosure, Call Slides, July 25, 2013. PDF icon Call Slides and Discussion Summary More Documents & Publications Information Technology Tools for Multifamily Building Programs Working with Condominium Owners and Associations Moving Multifamily

  14. OMB Burden Disclosure Statement

    Energy Savers [EERE]

    71.1 OMB Control Number (09/2012) (Classification) OMB Burden Disclosure Statement 1910-1800 Public reporting burden for this collection of information is estimated to average 10 (minutes) per response, including the time for reviewing instructions, searching exist ing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comme nts regarding this estimate or any other aspect of this information, including suggestions for

  15. Privacy Act Disclosures | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Disclosures Disclosures of personal information maintained by an agency is limited and defined by the Act. Agencies shall not disclose any record contained in a system of records to any person, or to another agency, without the written consent of the individual to whom the record pertains unless disclosure of the record would be: to those officers and employees of the agency which maintains the record who have a need for the record in the performance of their duties; required under the Freedom

  16. Fuel Mix and Emissions Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Mix and Emissions Disclosure Fuel Mix and Emissions Disclosure < Back Eligibility Investor-Owned Utility Municipal Utilities Cooperative Utilities Program Info Sector Name State Website http://www.powertochoose.org State Texas Program Type Generation Disclosure Summary Disclosure Requirements As part of Texas's 1999 electric utility restructuring legislation, the state's retail electric providers (REPs) are required to disclose certain information in the form of a standardized

  17. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    end-use customers. This information must be provided to customers quarterly "in plain English." Electricity suppliers must also file a copy of their energy source disclosure...

  18. Advanced Topics for the Portfolio Manager Initiative: Energy Disclosure Policy Implementation

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on the Energy Disclosure Policy Implementation

  19. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  20. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights into the basic biology of viral/host dynamics of infection. March 29, 2013 Bette Korber Bette Korber Contact Nancy Ambrosiano Communications Office (505) 667-0471 Email The viruses that make it through transmission barriers to infect a new person are particularly infectious and resilient," said Los Alamos National

  1. Lobbyist Disclosure Form - John Thorne | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    John Thorne Lobbyist Disclosure Form - John Thorne John inquired whether there were any open solicitations for biofuels projects under 1703 and 1705. He was told there were no open solicitations at this time, and it was unclear whether there would be any new solicitations in the future. He was also informed that 1705 expired. PDF icon Lobbyist_disclosure_John_Thorne_1182011.pdf More Documents & Publications Interested Parties - K&L Group Lobbyist Disclosure Form - AltEn

  2. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  3. Energy Benchmarking and Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benchmarking and Disclosure Energy Benchmarking and Disclosure Energy benchmarking and disclosure is a market-based policy tool used to increase building energy performance ...

  4. Environmental Disclosure Program

    Broader source: Energy.gov [DOE]

    The PSC created New York’s Environmental Disclosure Program via an order issued in December 1998. This program has been modified several times since it was established. A November 2008 PSC order...

  5. Commercial and Multifamily Building Benchmarking and Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Multifamily Building Benchmarking and Disclosure Commercial and Multifamily Building Benchmarking and Disclosure Better Buildings Residential Network Peer Exchange Call: ...

  6. Golden Reading Room: FOIA Proactive Disclosures and Contracts | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Proactive Disclosures and Contracts Golden Reading Room: FOIA Proactive Disclosures and Contracts Below are electronic versions of Golden Field Office Reading Room documents that were created after November 1, 1996, per the requirements of the Electronic Freedom of Information Act Amendment of 1996. Most documents are available in Adobe Acrobat Portable Document Format (PDF). 2013 Solar Decathlon Information Click on this link for updates: Solar Decathlon Information. Alliance for

  7. Generation Disclosure | Open Energy Information

    Open Energy Info (EERE)

    StateProvincial Govt Systems Integrator Transportation Tribal Government Utility Natural Gas Yes Competitive Bidding Process for Electric Distribution Companies'...

  8. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Fuel Disclosure: Virginia’s 1999 electric industry restructuring law requires the state's electricity providers to disclose -- "to the extent feasible" -- fuel mix and emissions data regarding...

  9. Disclosure of Permitted Communication Concerning Regional Standards...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EERE-2011-BT-CE-0077 Disclosure of Permitted Communication Concerning Regional Standards ... More Documents & Publications Disclosure of Permitted Communication Concerning Fossil Fuel ...

  10. Disclosure of Permitted Communication Concerning Fossil Fuel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning ... More Documents & Publications Disclosure of Permitted Communication Concerning Regional ...

  11. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  12. E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho ...

  13. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  14. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-01

    This Notice addresses the Executive Branch confidential disclosure requirements. These requirements apply to career GS (GM) employees.

  15. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  16. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-10-01

    This Notice addresses Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees.

  17. Confidential Financial Disclosure Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Confidential Financial Disclosure Report Confidential Financial Disclosure Report PDF icon Confidential Financial Disclosure Report More Documents & Publications Restrictions on Federal Employees Acceptance of Gifts DATA REPORT ON SPOUSE/COHABITANT DOE Advisory Committee Members' Ethics and Conflict of Interest Guidance

  18. Fuel Mix Disclosure

    Broader source: Energy.gov [DOE]

    In January 1999, the Colorado Public Utility Commission (PUC) adopted regulations requiring the state's utilities to disclose information regarding their fuel mix to retail customers. Utilities are...

  19. V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure...

  20. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  1. Are Vulnerability Disclosure Deadlines Justified?

    SciTech Connect (OSTI)

    Miles McQueen; Jason L. Wright; Lawrence Wellman

    2011-09-01

    Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

  2. Disclosures | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Disclosures No. Title Inventors M-909 The Production & Generation of Radionuclides from Deuterium-Deuterium (D-D) & Deuterium-Tritium (D-T) Moderated and Non-Moderated Fusion Reactions for Medical, Industry, and Research Purposes Charles A Gentile M-908 Automated Testing Instrument for Verification of Complex Computational Systems Gretchen N Zimmer M-907 A Neutral Beam Pole Shield with Copper Plates and Serviceable Molybdenum Inserts Andrei Khodak M-906 Transition-Edge Sensor X-Ray

  3. Fuel Mix Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Website http:www.commerce.wa.govProgramsEnergyOfficeUtilitiesPagesFuelMi... State Washington Program Type Generation Disclosure Summary Washington's retail electric...

  4. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Florida Program Type Generation Disclosure Summary In March 1999, the Florida Public Service Commission issued an order requiring the state's investor-owned electric utilities,...

  5. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    environmental disclosure requirements and consumer protection standards for green power marketing. The PSC's rules require all electric suppliers to disclose to the commission...

  6. Annual Confidential Financial Disclosure Report (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-10-01

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to career GS (GM) employees. (Replaces DOE N 326.7).

  7. Annual Confidential Financial Disclosure Report (SF 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-10-13

    This Notice addresses the Executive Branch confidential financial disclosure requirements. These requirements apply to persons employed at the GS-15 level and below, except for Schedule C appointees.

  8. Carbon Disclosure Project | Open Energy Information

    Open Energy Info (EERE)

    management, it aims to encourage the development of a common emissions measurement methodology and to facilitate its integration into general investment analysis. References:...

  9. Energy Performance Benchmarking and Disclosure Policies for Public...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings Energy Performance Benchmarking and Disclosure Policies for Public and Commercial Buildings ...

  10. Benchmarking and Disclosure: State and Local Policy Design Guide...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language State and local policy design guide. Benchmarking and Disclosure: State and Local Policy ...

  11. Energy Benchmarking, Rating, and Disclosure for State Governments |

    Broader source: Energy.gov (indexed) [DOE]

    Department of Energy benchmarking for state governments. Energy Benchmarking, Rating, and Disclosure for State Governments More Documents & Publications Energy Benchmarking, Rating, and Disclosure for Local

  12. Lobbyist Disclosure Form - AltEn | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AltEn Lobbyist Disclosure Form - AltEn Jonathan Silver, Energy Department executive director loans program, and Eric Bursch, OFW Law legislative assistant representing AltEn, discussed an AltEn biofuels project. PDF icon Lobbyist Disclosure Form - AltEn.pdf More Documents & Publications Registered_Lobbyist_Contact_Disclosure_Form.pdf Lobbyist Disclosure Form - Silicon Valley Lobbyist Disclosure Form - First Solar

  13. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  14. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  15. Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-09-20

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  16. Confidential Financial Disclosure Reports (OGE 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-09

    The directive establishes requirements and responsibilities for Departmental elements and employees regarding filing Confidential Financial Disclosure Reports (OGE Form 450) in accordance with the Ethics in Government Act of 1978, as amended.

  17. Lobbyist Disclosure Form - Silicon Valley | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Silicon Valley Lobbyist Disclosure Form - Silicon Valley Jonathan Silver, Energy Department executive director loans program, gave Colleen Quinn, Silicon Valley Leadership Group vice president of government relations and public policy, a broad overview of the work done by the LPO, and discussed the possible future of clean energy investment. PDF icon Lobbyist Disclosure Form - Silicon Valley.pdf More Documents & Publications Lobbyist Disclosure Form - AltEn Lobbyist Disclosure Form - First

  18. E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory PDF icon E-IDR (Inventory Disclosure Record) PIA, Idaho National Laboratory More Documents & Publications PIA - INL Education Programs Business Enclave Manchester Software 1099 Reporting PIA, Idaho National Laboratory Integrated Safety Management Workshop Registration,

  19. About EIA - Policies - U.S. Energy Information Administration...

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    This includes materials exempted from disclosure by other statutes as well as confidential, commercial, and financial information. What types of materials are available without ...

  20. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Electricity suppliers and electricity companies must also provide a fuel mix report to customers twice annually, within the June and December billing cycles. Emissions information must be disclos...

  1. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  2. HIPAA Authorization for Release of Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HIPAA AUTHORIZATION FOR RELEASE OF INFORMATION I. Information about the Use or Disclosure I hereby authorize the use and disclosure of protected health information as described below. Patient's full name: Date of Birth: Persons/organizations (or class of persons/organizations) authorized to use and disclose the information: Argonne National Laboratory Employee Benefits Department Persons/organizations (or class of persons/organizations) authorized to receive and use the information: Specific

  3. Technical Proposal Disclosure Policy - ITER

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technical Options for Processing Additional Light Tight Oil Volumes within the United States April 2015 Independent Statistics & Analysis www.eia.gov U.S. Department of Energy Washington, DC 20585 U.S. Energy Information Administration | Technical Options for Processing Additional Light Tight Oil Volumes within the United States i This report was prepared by the U.S. Energy Information Administration (EIA), the statistical and analytical agency within the U.S. Department of Energy. By law,

  4. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  5. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  6. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  7. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system ...

  8. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    restructuring legislation, Illinois established provisions for the disclosure of fuel mix and emissions data. All electric utilities and alternative retail electric...

  9. State and Local Energy Benchmarking and Disclosure Policy | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Other Resources: Analysis of Job Creation and Energy Cost Savings from Building Energy Rating and Disclosure Policy: This study analyzes the potential of a national building energy ...

  10. V-206: Apache HTTP Server mod_rewrite and "httpOnly" Cookie Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities V-206: Apache HTTP Server modrewrite and "httpOnly" Cookie Disclosure Vulnerabilities July 30,...

  11. Modeling veterans healthcare administration disclosure processes : CY 2012 summary.

    SciTech Connect (OSTI)

    Beyeler, Walter Eugene; DeMenno, Mercy B.; Finley, Patrick D.

    2013-09-01

    As with other large healthcare organizations, medical adverse events at the Department of Veterans Affairs (VA) facilities can expose patients to unforeseen negative risks. VHA leadership recognizes that properly handled disclosure of adverse events can minimize potential harm to patients and negative consequences for the effective functioning of the organization. The work documented here seeks to help improve the disclosure process by situating it within the broader theoretical framework of issues management, and to identify opportunities for process improvement through modeling disclosure and reactions to disclosure. The computational model will allow a variety of disclosure actions to be tested across a range of incident scenarios. Our conceptual model will be refined in collaboration with domain experts, especially by continuing to draw on insights from VA Study of the Communication of Adverse Large-Scale Events (SCALE) project researchers.

  12. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  13. When Utility Bills Attack! | Department of Energy

    Energy Savers [EERE]

    When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook

  14. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  15. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  16. Leveraging Portfolio Manager for Disclosure and Green Leasing Practices

    Broader source: Energy.gov [DOE]

    A talk about developing paths and implementing rating and disclosure policies for the commercial building sector, giving a state, local and federal overview of these types of policies and where they’re in play.

  17. U-181: IBM WebSphere Application Server Information Disclosure...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A vulnerability has been reported in IBM WebSphere Application Server. PLATFORM: IBM WebSphere Application Server 6.1.x IBM WebSphere Application Server 7.0.x IBM WebSphere ...

  18. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  19. RCW - 90.52 - Pollution Disclosure Act of 1971 | Open Energy...

    Open Energy Info (EERE)

    2 - Pollution Disclosure Act of 1971 Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- RegulationRegulation: RCW - 90.52 - Pollution Disclosure Act...

  20. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  1. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  2. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  3. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  4. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation PDF icon Trust Anchor Lifecycle Attack ...

  5. Notices FOR FURTHER INFORMATION CONTACT: Michael Li, Policy Advisor...

    Office of Environmental Management (EM)

    of Energy Efficiency and Renewable Energy, U.S. Department of Energy, 1000 Independence Ave. ... If you submit information that you believe to be exempt by law from public disclosure, ...

  6. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-20

    The Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. Cancels DOE N 326.13.

  7. Lobbyist Disclosure Form - First Solar | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    First Solar Lobbyist Disclosure Form - First Solar Susan Richardson, Energy Department loan programs chief counsel; Douglas Schultz, Energy Department senior investment officer; Andrzej Potasinski, Energy Department senior investment officer; Nancy Donovan, Energy Department general counsel; and Jonathan Silver, Energy Department loans program executive director, discussed the status of the First Solar Topaz Project with Kathleen Weiss, First Solar government relations vice president. PDF icon

  8. Fuel Mix Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1998, the Pennsylvania Public Utility Commission (PUC) adopted rules requiring retail electricity suppliers to "respond to reasonable requests made by consumers for information...

  9. Fuel Mix Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    customers. Such information must be provided on customers' bills or as a bill insert once annually. The fuel mix is also published in annual reports. Source http:...

  10. CMI Invention Disclosures | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    link to licensing information Selective Composite Membranes for Lithium Extraction from ... of Permanent Magnets Additive Manufacturing of Bonded Permanent Magnets using a ...

  11. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  12. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  13. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  14. Disclosure of Permitted Communication Concerning Fossil Fuel Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 | Department of Energy Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No. EERE-2010-BT-STD-0031; RIN 1904-AB96 Disclosure of Permitted Communication Concerning Fossil Fuel Energy Consumption Reduction for New Construction and Major Renovations of Federal Buildings -- Docket No.

  15. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  16. Carbon Disclosure Project Webinar: Climate Change: A Challenge for Bond Analysts

    Broader source: Energy.gov [DOE]

    Hosted by the Carbon Disclosure Project, this webinar will cover climate change and how its impacts can present significant risks for municipalities and municipal bond investors.

  17. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  18. Modeling Human Behavior to Anticipate Insider Attacks

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Hohimer, Ryan E.

    2011-06-09

    The insider threat ranks among the most pressing cybersecurity challenges that threaten government and industry information infrastructures. To date, no systematic methods have been developed that provide a complete and effective approach to prevent data leakage, espionage and sabotage. Current practice is forensic in nature, relegating to the analyst the bulk of the responsibility to monitor, analyze, and correlate an overwhelming amount of data. We describe a predictive modeling framework that integrates a diverse set of data sources from the cyber domain as well as inferred psychological/motivational factors that may underlie malicious insider exploits. This comprehensive threat assessment approach provides automated support for the detection of high-risk behavioral triggers to help focus the analysts attention and inform the analysis. Designed to be domain independent, the system may be applied to many different threat and warning analysis/sensemaking problems.

  19. RAPID/Roadmap/6-NV-c | Open Energy Information

    Open Energy Info (EERE)

    mud slide, snowstorm, drought, fire, explosion, electrical outage, attack, sabotage or toxic spill or other spill that could pose a health hazard information from the State...

  20. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  1. Request from City of Alexandria for Public Disclosure of Documents Related

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Docket No. EO-05-01 | Department of Energy from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Request from City of Alexandria for Public Disclosure of Documents Related to Docket No. EO-05-01 Docket No. EO-05-01: On behalf of the City of Alexandria, Virginia ("Alexandria"), we submit this request for public disclosure of documents and materials related to Order No. 202-05-3, dated December 20, 2005, in the above-referenced Department of

  2. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  3. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  4. T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks.

  5. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  6. Public Financial Disclosure Reports Filed by the Secretary and Deputy Secretary

    Broader source: Energy.gov [DOE]

    The  Stop Trading on Congressional Knowledge (STOCK) Act requires online posting of the Public Financial Disclosure Report (OGE 278) filed by  the President, the Vice President, and any officer...

  7. Benchmarking and Disclosure: State and Local Policy Design Guide and Sample Policy Language

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-16

    Provides sample policy language based on a synthesis of existing state and local policies, and discussion on key provisions, for the design of a commercial benchmarking and disclosure policy.

  8. START Program for Renewable Energy Project Development Assistance Non-Disclosure Agreement

    Broader source: Energy.gov [DOE]

    Download the Non-Disclosure Agreement to submit along with your application for the DOE Office of Indian Energy Strategic Technical Assistance Response Team (START) Program for Renewable Energy...

  9. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450-A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-09-29

    This Notice address the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM employees as well as employees serving in excepted service positions designate EJ, EK, and EN.

  10. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  11. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  12. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  13. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems,

  14. Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for...

  15. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  16. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site...

    Broader source: Energy.gov (indexed) [DOE]

    WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks PLATFORM: Version(s): prior to 3.4.1 ABSTRACT: Several vulnerabilities...

  17. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-09-30

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN. (Note: It replaces DOE N 326.11, which expired 9-29-05.)

  18. Annual Confidential Financial Disclosure Report (OGE Form 450 or 450A)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-03

    This Notice addresses the Executive Branch confidential financial disclosure reporting requirements. These requirements apply to career GS/GM and prevailing rate system and administratively determined employees as well as employees serving in excepted service positions designated EJ, EK, and EN.

  19. The Whistleblower Protection Enhancement Act of 2012 and How It Affects Federal Employee Non-Disclosure Policies, Forms, Certificates, Agreements and Acknowledgments

    Broader source: Energy.gov [DOE]

    Acquisition Letter (AL) 2013-08 and Financial Assistance Letter (FAL) 2013-05 provide Contracting Officers with notice of the recently passed, Whistleblower Protection Enhancement Act of 2012 (WPEA), Pub.L. 112-199, and the DOECAST issued in response on April 24, 2013. This AL/FAL informs DOE/NNSA Contracting Officers to update any Non-Disclosure Policies, Forms, Certificates, Agreements, and Acknowledgements (collectively "NDAs") to be used with Federal employees participating in proposal or application evaluations, source selection situations as well as in merit review situations, to conform to the new requirements of this law. It also informs DOE/NNSA Contracting Officers on how to document the notification to Federal employees of the new protections stated in the WPEA if they have signed NDAs without the new statement as required by the WPEA.

  20. Fuel Mix and Emissions Disclosure | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    to disclose to residential and small commercial customers details regarding the fuel mix and emissions of electric generation. Such information is provided to customers four...

  1. Fuel Mix and Emissions Disclosure | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    information must be provided in a standard format to residential customers at least once quarterly and to non-residential customers on or with bills. Electric companies and...

  2. Energy Benchmarking, Rating, and Disclosure for State Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how energy use data access can help state governments lead by example through benchmarking and disclosing results and implement benchmarking policies for the private sector.

  3. Energy Benchmarking, Rating, and Disclosure for Local Governments

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how access to energy use data can help local governments create policies for benchmarking and disclosing building energy performance for public and private sector buildings.

  4. Fact Sheet: Cyber Security Audit and Attack Detection Toolkit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SEM, and transform this information into meta events that the enterprise SEM can detect. ... security events from data and develop meta events that will be detected as cyber ...

  5. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  6. Statement on the Eighth Anniversary of the 9/11 Attacks | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they

  7. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  8. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks

    Broader source: Energy.gov [DOE]

    RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

  9. Annual Confidential Financial Disclosure Report (OGE Form 450)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-02-25

    This Notice amends DOE N 326.14 to add exemptions for NNSA employees who are now in pay bands. DOE N 326.14 contains information on who must file, when and where to file.

  10. Quantifying Cyber-Resilience Against Resource-Exhaustion Attacks

    SciTech Connect (OSTI)

    Fink, Glenn A.; Griswold, Richard L.; Beech, Zachary W.

    2014-07-11

    Resilience in the information sciences is notoriously difficult to define much less to measure. But in mechanical engi- neering, the resilience of a substance is mathematically defined as the area under the stress vs. strain curve. We took inspiration from mechanics in an attempt to define resilience precisely for information systems. We first examine the meaning of resilience in language and engineering terms and then translate these definitions to information sciences. Then we tested our definitions of resilience for a very simple problem in networked queuing systems. We discuss lessons learned and make recommendations for using this approach in future work.

  11. LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer PDF icon LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer More Documents & Publications Integrated Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA, Idaho

  12. The original of this document contains information which is subject to withholdi

    Energy Savers [EERE]

    **This document contains information which is subject to withholding from disclosure under 5 U.S.C. § 552.** United States Department of Energy Office of Hearings and Appeals In the Matter of: Personnel Security Hearing ) ) Filing Date: December 16, 2015 ) Case No.: PSH-15-0100 ) __________________________________________) Issued: February 22, 2016 __________________________ Administrative Judge Decision __________________________ William M. Schwartz, Administrative Judge: This Decision

  13. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  14. Certification and Accreditation Process for Information Systems Including National Security Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice ensures the effectiveness of security controls on DOE Federal information systems including national security systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. No cancellations. DOE N 205.15, dated 3-18-05, extends this directive until 3-18-06.

  15. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Chemical Biological Emergency Management Information System

    Energy Science and Technology Software Center (OSTI)

    2004-06-15

    CB-EMIS is designed to provide information and analysis to transit system operators and emergency responders in the event of a chemical attack on a subway system. The software inforporates detector data, video images, train data, meteorological data, and above- and below-ground plume dispersion models, hight of the liquid level.

  17. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  18. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  19. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  20. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  1. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  2. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  3. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  4. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  5. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  6. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  7. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  8. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  9. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick; Hauschild, Veronique; Hall, Dr. Linda; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  10. U-274: HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows, Remote Disclosure of Information

    Broader source: Energy.gov [DOE]

    Vulnerabilities can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  11. General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    General Information JLF Contacts Request a Tour

  12. The original of this document contains information which is subject to withholdi

    Energy Savers [EERE]

    *The original of this document contains information which is subject to withholding from disclosure under 5 U.S. C. § 552. Such material has been deleted from this copy and replaced with XXXXXX's. United States Department of Energy Office of Hearings and Appeals In the Matter of: Personnel Security Hearing ) ) Filing Date: January 20, 2015 ) ) Case No.: PSH-14-0109 __________________________________________) Issued : May 11, 2015 __________________________ Administrative Judge Decision

  13. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  14. Indecent disclosure - what to do with problems identified in an environment auditing report

    SciTech Connect (OSTI)

    Becker, J.C.

    1995-12-01

    During the past year, the U.S. Environmental Protection Agency (EPA) has solicited public comment on whether the federal government should be permitted to obtain the results of in-house environmental audits. This discussion was triggered, in part, by a trend in the states at the courts to treat audit reports as {open_quotes}privileged.{close_quotes} During EPA`s public meetings, industry environment managers argued that the federal government discourages environmental auditing by reserving the right to seek access to audit reports. This presentation and discussion will bring the audience up to date on proposed changes to the EPA`s policy on disclosure of environmental audit reports. It will describe the various state laws designed to protect the confidentiality of environmental audit reports and identify the criteria used by each state to qualify a report for the {open_quotes}self-audit privilege.{close_quotes} The panel will also discuss ways to establish and maintain other legal privilege claims for audit documents, and discuss what happens to privilege claims when portions of an audit report are shared with government, a potential buyer or another party. The panel will also cover the risks and benefits of documenting problems identified during a compliance review, and will explore how individual corporations decide what to do with their internal audit results.

  15. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  16. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  17. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  18. Evaporation a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Observatoire Midi-Pyrnes, Laboratoire Gosciences Environnement Toulouse, 14, avenue Edouard Belin, 31400 TOULOUSE ; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup ?1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup ?1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wettingdrying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.

  19. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under

    Office of Scientific and Technical Information (OSTI)

    geologic sequestration conditions (Journal Article) | SciTech Connect Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Authors: Zhang, Liwei ; Dzombak, David A ; Nakles, David V ; Hawthorne, Steven B ; Miller, David J ; Kutchko, Barbara G ; Lopano, Christina L ; Strazisar, Brian R

  20. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  1. First Name Last Name EMPLOYEE INFORMATION FORM

    Office of Environmental Management (EM)

    ... U.S. Department of Energy APPLICANT DISABILITY, RACENATIONAL ORIGIN AND SEX ... Position Title, Series, Grade Social Security Number Sex Male Female OMB Burden Disclosure ...

  2. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  3. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  4. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  5. Energy Benchmarking, Rating, and Disclosure for Regulators of Ratepayer-Funded Programs

    SciTech Connect (OSTI)

    Existing Commercial Buildings Working Group

    2012-05-23

    Provides information on how supporting access to building benchmarking data can help utilities increase efficiency and drive down energy demand.

  6. Cyber-Informed Engineering: The Need for a New Risk Informed and Design Methodology

    SciTech Connect (OSTI)

    Price, Joseph Daniel; Anderson, Robert Stephen

    2015-06-01

    Current engineering and risk management methodologies do not contain the foundational assumptions required to address the intelligent adversary’s capabilities in malevolent cyber attacks. Current methodologies focus on equipment failures or human error as initiating events for a hazard, while cyber attacks use the functionality of a trusted system to perform operations outside of the intended design and without the operator’s knowledge. These threats can by-pass or manipulate traditionally engineered safety barriers and present false information, invalidating the fundamental basis of a safety analysis. Cyber threats must be fundamentally analyzed from a completely new perspective where neither equipment nor human operation can be fully trusted. A new risk analysis and design methodology needs to be developed to address this rapidly evolving threatscape.

  7. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Contact Information

  8. Rate Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    links Financial Information Financial Public Processes Asset Management Cost Verification Process Rate Cases Rate Information Current Power Rates Current Transmission Rates...

  9. Ordering Information

    Gasoline and Diesel Fuel Update (EIA)

    coal industry Natural gas trade (Table 4.3) Ordering Information This publication and other Energy Information Administration (EIA) publications may be purchased from the...

  10. Applicant Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Applicant Information General Information for Applicants Bringing together top, space science students with internationally recognized researchers at Los Alamos in an educational...

  11. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rockville Pike, Rockville, Maryland, 20852. The hotel is about 27 miles from Dulles Airport. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room...

  12. Fire Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resources Emergency Communication Fire Information Fire Information Focusing on fire prevention and protection. Contact Fire Management Officer Manuel J. L'Esperance...

  13. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  14. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  15. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  16. General Information

    National Nuclear Security Administration (NNSA)

    Site Waste Profile Sheet - Revision 0 - February 27, 2012 (Log No. 2012-048) A. Generator Information 1. Company name: ...

  17. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: Snail1 protects breast cancer cells from hypoxia. Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. Snail/?-catenin signaling is negatively controlled by the energy sensor AMPK. The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  18. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Logistics Hotel Information Location The workshop was held at the Hilton Washington DC/Rockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. The hotel is about 27 miles from Dulles Airport. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room Block A block of rooms at the federal per diem rate of $226++ per night (single or double) has been reserved for the nights of September 10 & 11, 2012. As a courtesy, this rate will

  19. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Logistics Hotel Information Location The review was held at the Hilton Washington DC/Rockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. Hotel Information Home Page Maps and Transportation Area Information Sleeping Room Block A block of rooms at $183 + 15% tax per night (single or double) has been reserved for the nights of November 26 & 27, 2012. Making Your Reservation To reserve your room, please call 1-800-HILTONS (445-8667) and refer to the

  20. Local Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Local Information Local Information Bringing together top space science students with internationally recognized researchers at Los Alamos in an educational and collaborative atmosphere. Contacts Director Misa Cowee Email Administrative Assistant Mary Wubbena Email Request more information Email Housing, transportation Every year several hundred students come to Los Alamos to work and live here. Housing can get quite scarce, and options will be more expensive and less attractive than you expect

  1. Technical information

    Gasoline and Diesel Fuel Update (EIA)

    Home> Commercial Buildings Home> Technical Information > Estimation of Standard Errors Estimation of Standard Errors Sampling error is the difference between the survey estimate...

  2. Information Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science and Technology (ASIS&T) American Society for Indexing (ASI) Digital Library Federation (DLF) National Archives and Records Administration (NARA) Special...

  3. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Repository Index Permit Renewal Application (Parts A and B) Submissions, September 2009, Department of Energy CBFOWashington TRU Solutions Administrative Completeness...

  4. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Hilton Washington DCRockville Executive Meeting Center. Address is 1750 Rockville Pike, Rockville, Maryland, 20852. Hotel Information Home Page Maps and Transportation Area...

  5. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  6. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Visitor Information The Museum is open to the public every day except Thanksgiving, Christmas, and New Year's. Contact Us thumbnail of Bradbury Science Museum 505 667-4444 Email Museum Hours Open every day except Thanksgiving, Christmas, and New Year's. Tuesday-Saturday: 10 am-5 pm Sunday & Monday: 1-5 pm FREE ADMISSION Download our brochure for more information (pdf) Weather conditions Call ahead during snow storms: (505) 667-6622 or (877) 723-4101. We follow Los Alamos National

  7. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Info Visitor Information NERSC is located in Shyh Wang Hall-also known as the computational research and theory (CRT) building (Bldg. 59)-on the campus of Lawrence Berkeley National Laboratory in Berkeley, California. You can find information about visiting the lab, including an interactive campus map, transportation and lodging suggestions at http://www.lbl.gov/visit/. Your host must arrange site access prior to your visit. Last edited: 2016-01-06 16:48:46

  8. Information Sciences

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Information Sciences Uncovering actionable knowledge and generating insight into exascale datasets from heterogeneous sources in real time Leadership Group Leader Patrick M. Kelly Email Deputy Group Leader Amy Larson Email Contact Us Administrator Yvonne McKelvey Email Conceptual illustration of futuristic data stream processing. Developing methods and tools for understanding complex interactions and extracting actionable information from massive data streams. Basic and applied research

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  10. Information Request

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    November 25, 2008 TO: Sue Tierney, Phil Niedzielski-Eichner, Skila Harris FROM: Chris Kouts SUBJECT: Information Request As requested, enclosed is the additional information you requested yesterday. 1. Testimony: * September 24, 2008 before the Senate Committee on Commerce, Science and Transportation, * July 15, 2008 before the House Committee on Energy and Commerce * October 4, 2007 before the House Committee on the Budget and Chairman Spratt 2. Proposed Legislation "Nuclear Fuel

  11. Project Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Information Slider award map The REE Program funds projects focused on developing economically feasible and environmentally benign technologies for recovering REEs from coal and/or coal by-products. Project Information The listed projects represent the current REE program portfolio. Agreement Number Project Title Performer Name FWP-RIC REE FY2016-2020 Rare Earth Elements (REE) from Coal and Coal By-Products National Energy Technology Laboratory FE0027167 High Yield and Economical

  12. Computing Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information From here you can find information relating to: Obtaining the right computer accounts. Using NIC terminals. Using BooNE's Computing Resources, including: Choosing your desktop. Kerberos. AFS. Printing. Recommended applications for various common tasks. Running CPU- or IO-intensive programs (batch jobs) Commonly encountered problems Computing support within BooNE Bringing a computer to FNAL, or purchasing a new one. Laptops. The Computer Security Program Plan for MiniBooNE The

  13. Emulytics for Cyber-Enabled Physical Attack Scenarios: Interim LDRD Report of Year One Results.

    SciTech Connect (OSTI)

    Clem, John; Urias, Vincent; Atkins, William Dee; Symonds, Christopher J.

    2015-12-08

    Sandia National Laboratories has funded the research and development of a new capability to interactively explore the effects of cyber exploits on the performance of physical protection systems. This informal, interim report of progress summarizes the project’s basis and year one (of two) accomplishments. It includes descriptions of confirmed cyber exploits against a representative testbed protection system and details the development of an emulytics capability to support live, virtual, and constructive experiments. This work will support stakeholders to better engineer, operate, and maintain reliable protection systems.

  14. Hotel Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hotel Information Hotel Information Los Alamos National Laboratory is situated on a mesatop on the eastern side of the Jemez Mountains, an impressive series of ancient volcanoes with extensive views of the Sangre de Cristo Mountains in the east, where sunsets turn the western slopes a vibrant red. We hope you enjoy your stay in the Land of Enchantment. Contacts Mike Rogers (505) 665-2513 Email Chandra Savage Marsden (505) 664-0183 Email Lodging A block of rooms has been reserved under the name

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  16. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  17. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  18. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WIPP Stakeholder Information Index 2016 WIPP Stakeholder Information Documents 2015 WIPP Stakeholder Information Documents 2014 WIPP Stakeholder Information Documents 2013 WIPP Stakeholder Information Documents 2012 WIPP Stakeholder Information Documents 2011 WIPP Stakeholder Information Documents 2010 WIPP Stakeholder Information Documents 2009 WIPP Stakeholder Information Documents 2008 WIPP Stakeholder Information Documents 2007 WIPP Stakeholder Information Documents 2006 WIPP Stakeholder

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  20. Visitor Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visitor Information Visiting the Transportation Research and Analysis Computing Center For guests who wish to visit and meet with the technical staff, please contact the TRACC service desk or the Technical Point of Contact assigned to you for registration, scheduling, and confirmation, including Foreign Visits and Assignments. Registration with your host is required for entry into the TRACC facilities. A photo I.D., such as a driver's license or passport, is also required for facility access. If

  1. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 19, 2012 Class 1 Permit Modifications and NMED Responses Administrative Completeness and Final Determination, Class 1 Permit Modification Request, Contingency Plan Update, JE Kieling NMED dated December 17, 2012 Class 1 Permit Modification Request, Contingency Plan Update, Jose R. Franco, CBFO and M. F. Sharif, NWP, dated

  2. Information Repository

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Information Repository Documents WIPP Annual Waste Minimization Report Transmittal of the Waste Isolation Pilot Plant Annual Waste Minimization Report, dated November 14, 2013 Class 1 Permit Modifications and NMED Responses Class 1 Modification, August 29, 2013 WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088. (1. revise a course outline; 2. revise table and panel figures to include Panel 7; 3. update description related to Type B Packages; and 4. update TRUPACT-II and

  3. User information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information: Project Proposal Form Beamtime Request Form Emergency procedure policy Experimental Hall Policy Publications Lodging New Users First, please fill out the Project Proposal Form and submit to Craig Stevens. Next a beamtime request form should be completed and submitted to Lisa Bovenkamp along with any questions or requests for special accommodations. Before your first visit to CAMD, everyone must take and pass the CAMD Radiation Safety Test which may be taken online prior to your

  4. EVALUATION OF SULFATE ATTACK ON SALTSTONE VAULT CONCRETE AND SALTSTONESIMCO TECHNOLOGIES, INC. PART1 FINAL REPORT

    SciTech Connect (OSTI)

    Langton, C

    2008-08-19

    This report summarizes the preliminary results of a durability analysis performed by SIMCO Technologies Inc. to assess the effects of contacting saltstone Vaults 1/4 and Disposal Unit 2 concretes with highly alkaline solutions containing high concentrations of dissolved sulfate. The STADIUM{reg_sign} code and data from two surrogate concretes which are similar to the Vaults 1/4 and Disposal Unit 2 concretes were used in the preliminary durability analysis. Simulation results for these surrogate concrete mixes are provided in this report. The STADIUM{reg_sign} code will be re-run using transport properties measured for the SRS Vaults 1/4 and Disposal Unit 2 concrete samples after SIMCO personnel complete characterization testing on samples of these materials. Simulation results which utilize properties measured for samples of Vaults 1/4 and Disposal Unit 2 concretes will be provided in Revision 1 of this report after property data become available. The modeling performed to date provided the following information on two concrete mixes that will be used to support the Saltstone PA: (1) Relationship between the rate of advancement of the sulfate front (depth of sulfate ion penetration into the concrete) and the rate of change of the concrete permeability and diffusivity. (2) Relationship between the sulfate ion concentration in the corrosive leachate and the rate of the sulfate front progression. (3) Equation describing the change in hydraulic properties (hydraulic conductivity and diffusivity) as a function of sulfate ion concentration in the corrosive leachate. These results have been incorporated into the current Saltstone PA analysis by G. Flach (Flach, 2008). In addition, samples of the Saltstone Vaults 1/4 and Disposal Unit 2 concretes have been prepared by SIMCO Technologies, Inc. Transport and physical properties for these materials are currently being measured and sulfate exposure testing to three high alkaline, high sulfate leachates provided by SRNL is underway to validate the predicted results. Samples of saltstone were also prepared and will be evaluated for durability using the STADIUM{reg_sign} code and SIMCO methodology. Results available as of August 15 are included in this draft report. A complete set of results for saltstone will be available by December 31, 2008.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  6. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  7. Header Information

    National Nuclear Security Administration (NNSA)

    NRC 741 Crosswalk to SAMS 741 Field Number 741 Field Name SAMS 8.0 Field Header Information 1 Shipper's RIS ShipperRIS 2 Receiver's RIS ReceiverRIS 3 Transaction No. TransferNumber 4 Correction No. CorrectionNumber 5a Processing Code - Shipper * not entered 5b Processing Code - Receiver * not entered 6a Action Code - Shipper ActionCode 6b Action Code - Receiver ActionCode 8a Name and Address of Shipper * not entered 9a Name and Address of Receiver * not entered 10 No. of Data Lines NumberofLines

  8. Geneial Information

    Office of Legacy Management (LM)

    --- _____ ii3 ' 6 f Geneial Information su-u+./ I The Commission maintains a residue storage area known as the Airport Site at Robertson, l Missouri. This site is located immediately north of the St. Louis Municipal Airport and east of the McIknnell Aircraft Corporation Plant on Rr~wn Road in St. Louis County. Consent to use and occupy the 21.7 acre tract was obtalned by the Manhattan Dlstrlot on Marsh 2, 19&6. T!ltle uas auqubed to the property on Janwry 3, 1947 by condemnation proceeding8

  9. Supplemental Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Supplemental Information All documents by title A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 00-Table of Contents 1-11-11 10 CFR 34.27 10 CFR Part 20 29 CFR 1910.120 29 CFR 1910.134 29 CFR 1910.1200 30 CFR Part 48 30 CFR Part 49 30 CFR part 57 40 CFR 191.13 40 CFR 302 40 CFR 355 40 CFR Part 136 49 CFR Documents 56 CFR 55167 61 CFR Volume 109 A Back to top abstract ACC_ERMS239636 acknowledgments Ahrens and Hansen 1995 Ahrens and Onofrei 1996 Ahrens et. al 1996 Anderson 1978 Anderson et

  10. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  11. US Equities Disclosures

    U.S. Energy Information Administration (EIA) Indexed Site

    Jan Stuart +1-212-713-1074 jan.stuart@ubs.com Outline: EIA oil data on Wall Street, the UBS case ¨ Part A - Why we care - What we use the data for - Fundamentals more than anything else push oil prices around - What's even scarcer than oil is good timely data ¨ Part B - Quibbles - Year-over-year comparisons, growth rates or levels - "Revisions" - Filling-in-the-blanks ¨ Part C - I wish - Weekly crude oil imports by source - Inclusion of other federal stats driving oil demand 2 Jan

  12. Fuel Mix Disclosure

    Broader source: Energy.gov [DOE]

    California's retail electricity suppliers must disclose to all customers the fuel mix used in the generation of electricity. Utilities must use a standard label created by the California Energy...

  13. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  14. Information Technology Specialist (Information Security) | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Information Technology Specialist (Information Security) Information Technology Specialist (Information Security) Submitted by admin on Tue, 2016-05-10 18:01 Job Summary Organization Name Department Of Energy Agency SubElement Department of Energy Locations Oak Ridge, Tennessee Announcement Number DOE-SE-16-ST-00003-DHA Job Summary A successful candidate in this position will serve as an Information Technology Specialist (INFOSEC) responsible for the protection of the information and

  15. Secure Information Exchange Gateway for Electric Grid Operations

    SciTech Connect (OSTI)

    Robertson, F. Russell; Carroll, J. Ritchie; Sanders, William; Yardley, Timothy; Heine, Erich; Hadley, Mark; McKinnon, David; Motteler, Barbara; Giri, Jay; Walker, William; McCartha, Esrick

    2014-09-30

    The major objectives of the SIEGate project were to improve the security posture and minimize the cyber-attack surface of electric utility control centers and to reduce the cost of maintaining control-room-to-control-room information exchange. Major project goals included the design, development, testing, and commercialization of a single security-hardened appliance that could meet industry needs for resisting cyber-attacks while protecting the confidentiality and integrity of a growing volume of real-time information needed to ensure the reliability of the bulk electric system and interoperating with existing data formats and networking technologies. The SIEGate project has achieved its goals and objectives. The SIEGate Design Document, issued in March 2012, presented SIEGate use cases, provided SIEGate requirements, established SIEGate design principles, and prescribed design functionality of SIEGate as well as the components that make up SIEGate. SIEGate Release Version 1.0 was posted in January 2014. Release Version 1.0.83, which was posted on March 28, 2014, fixed many issues discovered by early adopters and added several new features. Release Candidate 1.1, which added additional improvements and bug fixes, was posted in June 2014. SIEGate executables have been downloaded more than 300 times. SIEGate has been tested at PJM, Entergy, TVA, and Southern. Security testing and analysis of SIEGate has been conducted at PNNL and PJM. Alstom has provided a summary of recommended steps for commercialization of the SIEGate Appliance and identified two deployment models with immediate commercial application.

  16. Photovoltaic Geographical Information System | Open Energy Information

    Open Energy Info (EERE)

    Information System Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Photovoltaic Geographical Information System Focus Area: Renewable Energy Topics: Opportunity...

  17. Information Technology - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Technology

  18. WIPP Recovery Information

    Broader source: Energy.gov [DOE]

    At the March 26, 2014 Board meeting J. R. Stroble CBFO, Provided Information on Locations to Access WIPP Recovery Information.

  19. ARM - Public Information Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govPublicationsPublic Information Materials Publications Journal Articles Conference Documents Program Documents Technical Reports Publications Database Public Information...

  20. Contractor Past Performance Information

    Broader source: Energy.gov (indexed) [DOE]

    management controls and the compliance assessments of contractor performance information. Section IV has best practices to address contractor performance information....

  1. Special Undergraduate Informations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Special Undergraduate Information Special Undergraduate Information for SAGE A National Science Foundation Research Experiences for Undergraduates program Contacts Institute...

  2. LLNL MSP-GSS-001 PIA, Office of the Chief Information Officer...

    Energy Savers [EERE]

    Safety Management Workshop Registration, PIA, Idaho National Laboratory Occupational Medicine - Assistant PIA, Idaho National Laboratory E-IDR (Inventory Disclosure Record) PIA,...

  3. Montana Geographic Information Library | Open Energy Information

    Open Energy Info (EERE)

    Montana Geographic Information Library Jump to: navigation, search OpenEI Reference LibraryAdd to library Map: Montana Geographic Information LibraryInfo GraphicMapChart Abstract...

  4. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  5. Energy information sheets

    SciTech Connect (OSTI)

    1995-07-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  6. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  7. Background Information on CBECS

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    Information on CBECS The following topics provide detailed information on survey methodology, the kinds of errors associated with sample surveys, estimation of standard errors,...

  8. Utilities | Open Energy Information

    Open Energy Info (EERE)

    historic, in human and machine readable formats. See also the NREL System Advisor Model (SAM) and NREL's BEOpt. Utility Outage Information dataset - Information and resources...

  9. Takigami | Open Energy Information

    Open Energy Info (EERE)

    ENERGYGeothermal Home Takigami General Information Name Takigami Sector Geothermal energy Location Information Address 2862-12 Kokonoe, Kusu District, Oita Prefecture 879-4802...

  10. ARM - People Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govPeople DirectoryReports ARM People Database Reports Email List Owner Information Email List Membership Information (password required) CategoryProgram List Membership...

  11. Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Exploration, Tracers Data Analysis, And Enhanced Data Distribution, Visualization, And Management Geographic Information System At Brady Hot Springs Area (Laney, 2005) Brady Hot...

  12. Alaska - CPCN General Information | Open Energy Information

    Open Energy Info (EERE)

    CPCN General Information Jump to: navigation, search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - Instructions: Alaska - CPCN General...

  13. Nevada Transmission Siting Information | Open Energy Information

    Open Energy Info (EERE)

    search OpenEI Reference LibraryAdd to library PermittingRegulatory Guidance - GuideHandbook: Nevada Transmission Siting InformationPermittingRegulatory GuidanceGuide...

  14. AUDIT REPORT The Energy Information Administration's Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technology Program" BACKGROUND The Energy Information Administration (EIA) is a statistical and analytical agency within the Department of Energy responsible for a wide range ...

  15. T-637: VMSA-2011-0009 VMware hosted product updates, ESX patches and VI, Client update resolve multiple

    Broader source: Energy.gov [DOE]

    This patch provides a fix for the following three security issues in the VMware Host Guest File System (HGFS). None of these issues affect Windows based Guest Operating Systems. CVE-2011-2146 Mount.vmhgfs Information Disclosure, information disclosure via a vulnerability that allows an attacker with access to the Guest to determine if a path exists in the Host filesystem and whether it is a file or directory regardless of permissions. CVE-2011-1787 Mount.vmhgfs Race Condition, privilege escalation via a race condition that allows an attacker with access to the guest to mount on arbitrary directories in the Guest filesystem and achieve privilege escalation if they can control the contents of the mounted directory. CVE-2011-2145 Mount.vmhgfs Privilege Escalation, privilege escalation via a procedural error that allows an attacker with access to the guest operating system to gain write access to an arbitrary file in the Guest filesystem. This issue only affects Solaris and FreeBSD Guest Operating Systems. For more information on the following associated CVE details please use the provided links below. This patch provides a fix for the following three security issues in the VMware Host Guest File System (HGFS). None of these issues affect Windows based Guest Operating Systems. CVE-2011-2146 Mount.vmhgfs Information Disclosure, information disclosure via a vulnerability that allows an attacker with access to the Guest to determine if a path exists in the Host filesystem and whether it is a file or directory regardless of permissions. CVE-2011-1787 Mount.vmhgfs Race Condition, privilege escalation via a race condition that allows an attacker with access to the guest to mount on arbitrary directories in the Guest filesystem and achieve privilege escalation if they can control the contents of the mounted directory. CVE-2011-2145 Mount.vmhgfs Privilege Escalation, privilege escalation via a procedural error that allows an attacker with access to the guest operating system to gain write access to an arbitrary file in the Guest filesystem. This issue only affects Solaris and FreeBSD Guest Operating Systems. For more information on the following associated CVE details please use the provided links below. CVE-2009-4536, CVE-2010-1188, CVE-2009-3080, CVE-2010-2240, CVE-2011-2146, CVE-2011-1787, CVE-2011-2145, and CVE-2011-2217

  16. Notices SUPPLEMENTARY INFORMATION: Section

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    112 Federal Register / Vol. 77, No. 182 / Wednesday, September 19, 2012 / Notices SUPPLEMENTARY INFORMATION: Section 3506 of the Paperwork Reduction Act of 1995 (44 U.S.C. chapter 35) requires that Federal agencies provide interested parties an early opportunity to comment on information collection requests. The Director, Information Collection Clearance Division, Privacy, Information and Records Management Services, Office of Management, publishes this notice containing proposed information

  17. WIPP - Joint Information Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Joint Information Center is located at 4021 National Parks Highway in Carlsbad, N.M. Joint Information Center In the unlikely event of an emergency, the WIPP Joint Information Center (JIC) serves as a central control point to coordinate multi-agency efforts to issue timely and accurate information to the public, news media and project employees. Emergency contact information: The public If the JIC is activated, members of the general public, including family members, may call (575) 234-7380

  18. Aquaculture information package

    SciTech Connect (OSTI)

    Boyd, T.; Rafferty, K.

    1998-08-01

    This package of information is intended to provide background information to developers of geothermal aquaculture projects. The material is divided into eight sections and includes information on market and price information for typical species, aquaculture water quality issues, typical species culture information, pond heat loss calculations, an aquaculture glossary, regional and university aquaculture offices and state aquaculture permit requirements. A bibliography containing 68 references is also included.

  19. Category:Geographic Information System | Open Energy Information

    Open Energy Info (EERE)

    Geographic Information System Jump to: navigation, search Geothermalpower.jpg Looking for the Geographic Information System page? For detailed information on Geographic Information...

  20. New Request for Information to Inform Department of Energy Critical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    New Request for Information to Inform Department of Energy Critical Materials Strategy New Request for Information to Inform Department of Energy Critical Materials Strategy ...

  1. Reducing the Risks. In the aftermath of a terrorist attack, wastewater utilities may have to contend with decontamination water containing chemical, biological, or radiological substances

    SciTech Connect (OSTI)

    Warren, Linda P.; Hornback, Chris; Strom, Daniel J.

    2006-08-01

    In the aftermath of a chemical, biological, or radiological (CBR) attack, decontamination of people and infrastructure will be needed. Decontamination inevitably produces wastewater, and wastewater treatment plants (WTPs) need to know how to handle decontamination wastewater. This article describes CBR substances; planning, coordinating, and communicating responses across agencies; planning within a utility; coordination with local emergency managers and first responders; mitigating effects of decontamination wastewater; and mitigating effects on utility personnel. Planning for Decontamination Wastewater: A Guide for Utilities, the document on which this article is based, was developed under a cooperative agreement from the U.S. Environmental Protection Agency by the National Association of Clean Water Agencies (NACWA) and its contractor, CH2MHILL, Inc.

  2. Energy information sheets

    SciTech Connect (OSTI)

    Not Available

    1993-12-02

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. Written for the general public, the EIA publication Energy Information Sheets was developed to provide information on various aspects of fuel production, prices, consumption and capability. The information contained herein pertains to energy data as of December 1991. Additional information on related subject matter can be found in other EIA publications as referenced at the end of each sheet.

  3. Supervisory Information Technology Specialist (Information Security)

    Broader source: Energy.gov [DOE]

    The Office of the Chief Information Officer is seeking a motivated and highly-qualified candidate to serve as the Director of the Cybersecurity Operations Office and oversee development and...

  4. Office of Information Management

    Broader source: Energy.gov [DOE]

    The Office of Information Management provides a broad range of information technology services in support of the Associate Under Secretary for the Office of Environment, Health, Safety and Security (AU).

  5. Physics Informed Machine Learning

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Physics Informed Machine Learning Physics Informed Machine Learning WHEN: Jan 19, 2016 8:00 AM - Jan 22, 2016 4:00 PM WHERE: Inn at Loretto, Santa Fe CATEGORY: Science TYPE: ...

  6. Information Technology Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-12-23

    The Order identifies the objectives, components, and responsibilities for implementing processes to ensure the effective management of information and information systems within the Department. Supersedes DOE O 200.1.

  7. SOURCE SELECTION INFORMATION -

    Broader source: Energy.gov (indexed) [DOE]

    an action described in Section 311 of P.L. 112-74 in excess of 1,000,000. This information is source selection information related to the conduct of a Federal agency...

  8. Physics Informed Machine Learning

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Physics Informed Machine Learning Physics Informed Machine Learning WHEN: Jan 19, 2016 8:00 AM - Jan 22, 2016 4:00 PM WHERE: Inn at Loretto, Santa Fe CATEGORY: Science TYPE:...

  9. Contractor Past Performance Information

    Broader source: Energy.gov (indexed) [DOE]

    2013) 3 the use of contractor performance information, outlines associated management responsibilities that agency Chief Acquisition Officers (CAOs) and Senior...

  10. Controlled Unclassified Information

    Energy Savers [EERE]

    3-1 Chapter 13 Controlled Unclassified Information This chapter describes the security procedures adopted by DOE HQ to implement the requirements of the following DOE regulations and directives: 10 CFR Part 1017, Identification and Protection of Unclassified Controlled Nuclear Information DOE Order 471.1B, Identification and Protection of Unclassified Controlled Nuclear Information DOE Order 471.3, Identifying and Protecting Official Use Only Information DOE Manual 471.3-1, Manual for

  11. Energy information directory 1995

    SciTech Connect (OSTI)

    1995-10-01

    The National Energy Information Center provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. This Energy Information Directory is used to assist the Center staff as well as other DOE staff in directing inquires to the proper offices.

  12. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  13. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-10-03

    To establish the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)] or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Supersedes DOE O 475.2A.

  14. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-02-01

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)] or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Cancels DOE O 475.2 and DOE M 475.1-1B.

  15. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-03

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD), Formerly Restricted Data (FRD), and Transclassified Foreign Nuclear Information (TFNI)]or Executive Order (E.O.) 13526 [National Security Information (NSI)], so that it can be protected against unauthorized dissemination.

  16. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  17. Developing information-space Confidence Building Measures (CBMs) between India and Pakistan

    SciTech Connect (OSTI)

    Yamin, Tughral

    2014-06-01

    The Internet has changed the world in ways hitherto unknown. The international financial system, air, land and maritime transport systems are all digitally linked. Similarly most militaries are fully or partially networked. This has not only sped up the decision making processes at all levels, it has also rendered these systems vulnerable to cyber-attacks. Cyber-warfare is now recognized as the most potent form of non-kinetic war fighting. In order to prevent large scale network-attacks, cyber-powers are simultaneously spending a lot of time, money and effort to erect redundant cyber-defenses and enhancing their offensive cyber capabilities. Difficulties in creating a stable environment in information-space stem from differing national perceptions regarding the freedom of the Internet, application of international law and problems associated with attribution. This paper discusses a range of Confidence Building Measures that can be created between India and Pakistan in information-space to control malicious cyber behavior and avert an inadvertent war.

  18. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-02-26

    This Manual provides requirements for managing the Department of Energy (DOE) classification and declassification program, including details for classifying and declassifying information, documents, and material. This Manual also supplements DOE O 200.1, INFORMATION MANAGEMENT PROGRAM, which combines broad information management topics under a single Order. Specific requirements for each topic are issued in separate Manuals. Cancels DOE M 475.1-1. Canceled by DOE M 475.1-1B

  19. Disposal Information - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Us Hanford Site Wide Programs Hanford Site Solid Waste Acceptance Program Tools Disposal Information About Us Hanford Site Solid Waste Acceptance Program What's New Acceptance Criteria Acceptance Process Tools Approved High Integrity Containers Approved Sorbents, Stabilizers, and Void Fillers Disposal Information Points of Contact Disposal Information Email Email Page | Print Print Page |Text Increase Font Size Decrease Font Size Disposal of Radioactive Waste at Hanford The Hanford Site

  20. Data Mining for Security Information: A Survey

    SciTech Connect (OSTI)

    Brugger, S T; Kelley, M; Sumikawa, K; Wakumoto, S

    2001-04-19

    This paper will present a survey of the current published work and products available to do off-line data mining for computer network security information. Hundreds of megabytes of data are collected every second that are of interest to computer security professionals. This data can answer questions ranging from the proactive, ''Which machines are the attackers going to try to compromise?'' to the reactive, ''When did the intruder break into my system and how?'' Unfortunately, there's so much data that computer security professionals don't have time to sort through it all. What we need are systems that perform data mining at various levels on this corpus of data in order to ease the burden of the human analyst. Such systems typically operate on log data produced by hosts, firewalls and intrusion detection systems as such data is typically in a standard, machine readable format and usually provides information that is most relevant to the security of the system. Systems that do this type of data mining for security information fall under the classification of intrusion detection systems. It is important to point out that we are not surveying real-time intrusion detection systems. Instead, we examined what is possible when the analysis is done off-line. Doing the analysis off-line allows for a larger amount of data correlation between distant sites who transfer relevant log files periodically and may be able to take greater advantage of an archive of past logs. Such a system is not a replacement for a real-time intrusion detection system but should be used in conjunction with one. In fact, as noted previously, the logs of the real-time IDS may be one of the inputs to the data mining system. We will concentrate on the application of data mining to network connection data, as opposed to system logs or the output of real-time intrusion detection systems. We do this primarily because this data is readily obtained from firewalls or real-time intrusion detectors and it looks the same regardless of the network architecture or the systems that run on the network. This similarity greatly simplifies the data cleansing step and provides a dataset with high orthogonality between multiple sites, increasing the accuracy of the data mining operations. The decision to use connection logs instead of packet logs is discussed below. This paper will survey both the research that has been done in this area to date and publicly available products that perform such tasks.

  1. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  2. Information Exchange development forums

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    GitHub repositories for creating and managing information exchanges (content models) for use in the NGDS and larger USGIN systems.

  3. SOURCE SELECTION INFORMATION -

    Energy Savers [EERE]

    disseminating this predecisional information, we respectfully request that you consult with the Department prior to making such a decision. The action, in support of the...

  4. SOURCE SELECTION INFORMATION -

    Office of Environmental Management (EM)

    disseminating this predecisional information, we respectfully request that you consult with the Department prior to making such a decision. This (if it is a multi-year...

  5. Information Sciences and Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    file systems Bioinformatics Infectious disease surveillance Climate change and energy security Smart grids Learn more about our Information Science and Technology capabilities

  6. Supervisory Information Technology Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will be responsible for providing Information Technology (IT) infrastructure, capabilities and technical support to the Department of Energy (DOE),...

  7. Transmission - Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact-Information-Transmission Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  8. Transmission Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact-Information Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects & Initiatives Finance &...

  9. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (247) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager Jeff Troutman...

  10. Personally Identifiable Information

    Broader source: Energy.gov [DOE]

    Websites and applications that collect data on individuals are gathering personally identifiable information (PII). PII is also often collected for customer surveys or user experience (UX) research.

  11. UNCLASSIFIED Information Science and ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Seminar Speaker Series Joachim M. Buhmann Institute for Machine Learning ETH Zurich Information theory of algorithms: How precisely should we compute in Big Data settings? ...

  12. Product Information Form

    Broader source: Energy.gov [DOE]

    When planning to present a new product to the EERE Product Governance Team, complete this product information form and email it to ee.communications@ee.doe.gov.

  13. Wattstopper | Open Energy Information

    Open Energy Info (EERE)

    Wattstopper Jump to: navigation, search Name: Wattstopper Place: Santa Clara, CA Website: www.wattstopper.com References: Wattstopper1 Information About Partnership with NREL...

  14. WVCP | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  15. CAES Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    View all events >> x CAES Home Home About Us Contact Information Our CAES Building FAQs Affiliated Centers Research Core Capabilities Laboratories and Equipment Technology Transfer...

  16. Masco | Open Energy Information

    Open Energy Info (EERE)

    Masco Jump to: navigation, search Name: Masco Place: Taylor, MI Website: www.masco.com References: Masco1 Information About Partnership with NREL Partnership with NREL Yes...

  17. Value of Information spreadsheet

    SciTech Connect (OSTI)

    Trainor-Guitton, Whitney

    2014-05-12

    This spreadsheet represents the information posteriors derived from synthetic data of magnetotellurics (MT). These were used to calculate value of information of MT for geothermal exploration. Information posteriors describe how well MT was able to locate the "throat" of clay caps, which are indicative of hidden geothermal resources. This data is full explained in the peer-reviewed publication: Trainor-Guitton, W., Hoversten, G. M., Ramirez, A., Roberts, J., Jlusson, E., Key, K., Mellors, R. (Sept-Oct. 2014) The value of spatial information for determining well placement: a geothermal example, Geophysics.

  18. Confidential Business Information

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    It is DOE's policy that all comments may be included in the public docket, without change and as received, including any personal information provided in the comments (except ...

  19. Protecting your personal information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015-Jan. 2016 all issues All Issues submit Protecting your personal information Quantum cryptography keeps data secure from cyber thieves October 1, 2014 Mass-producible...

  20. Envinity | Open Energy Information

    Open Energy Info (EERE)

    Envinity Jump to: navigation, search Name: Envinity Place: State College, PA Website: www.envinity.com References: Envinity Website1 Information About Partnership with NREL...

  1. IBACOS | Open Energy Information

    Open Energy Info (EERE)

    IBACOS Jump to: navigation, search Name: IBACOS Place: Pittsburgh, PA Website: www.ibacos.com References: IBACOS1 Information About Partnership with NREL Partnership with NREL...

  2. Icynene | Open Energy Information

    Open Energy Info (EERE)

    Name: Icynene Place: Mississauga, Canada Website: www.icynene.com References: New American Home 20061 Information About Partnership with NREL Partnership with NREL Yes...

  3. Freedom of Information Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of a criminal investigation or by an agency conducting a lawful national security intelligence investigation, information furnished by a confidential source, (E) would disclose...

  4. Nxegen | Open Energy Information

    Open Energy Info (EERE)

    Zip: 6457 Sector: Services Product: Intelligent energy management company. Provides real-time energy information and load management services to municipal, commercial, and...

  5. SOURCE SELECTION INFORMATION -

    Broader source: Energy.gov (indexed) [DOE]

    SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 Department of Energy Washington, DC 20585 (enter date here, centered revised template...

  6. ARM - People Address Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govAboutPerson Information About Become a User Recovery Act Mission FAQ Outreach Displays History Organization Participants Facility Statistics Forms Contacts Facility Documents...

  7. Service | Open Energy Information

    Open Energy Info (EERE)

    Building Types 1 References EIA CBECS Building Types U.S. Energy Information Administration (Oct 2008) Retrieved from "http:en.openei.orgwindex.php?titleService&oldid27...

  8. Coolerado | Open Energy Information

    Open Energy Info (EERE)

    Coolerado Jump to: navigation, search Name: Coolerado Place: Denver, CO Website: www.coolerado.com References: Coolerado1 Information About Partnership with NREL Partnership with...

  9. Emergency Public Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-08-21

    This volume defines elements of providing information to the public during and following emergencies. Canceled by DOE G 151.1-4.

  10. PBS-30 Supplemental Information

    Broader source: Energy.gov [DOE]

    At the April 8, 2015 Committee meeting David Rhodes DOE, Provided Supplemental Information on Project Categories for LANL Clean-up Budget Year 2017.

  11. Unclassified Controlled Nuclear Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-25

    To prevent unauthorized dissemination of Unclassified Controlled Nuclear Information (UCNI). Cancels DOE 5635.4 and DOE 5650.3A

  12. Information Technology Specialist

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Upper Great Plains Region, Power Systems Operations, Operations Computer Support ...

  13. Information Exchange management site

    Energy Science and Technology Software Center (OSTI)

    2012-08-01

    Django site used to manage the approved information exchanges (content models) after creation and public comment at https://github.com/usgin-models.

  14. Caterpillar | Open Energy Information

    Open Energy Info (EERE)

    Caterpillar Jump to: navigation, search Name: Caterpillar Place: Peoria, IL Website: www.cat.com References: NREL News Release: Reduce Truck Idling1 Information About Partnership...

  15. Ford | Open Energy Information

    Open Energy Info (EERE)

    search Name: Ford Place: Dearborn, MI Website: www.ford.com References: FORD-NREL CRADA1 Information About Partnership with NREL Partnership with NREL Yes Partnership...

  16. Trane | Open Energy Information

    Open Energy Info (EERE)

    NJ Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  17. NIST | Open Energy Information

    Open Energy Info (EERE)

    CO Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  18. SUPERVALU | Open Energy Information

    Open Energy Info (EERE)

    MN Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  19. Transformations | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  20. Synergy | Open Energy Information

    Open Energy Info (EERE)

    MA Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  1. Roxul | Open Energy Information

    Open Energy Info (EERE)

    ON Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  2. NYSERDA | Open Energy Information

    Open Energy Info (EERE)

    NY Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  3. Enterprise | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  4. Pulte | Open Energy Information

    Open Energy Info (EERE)

    MI Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  5. Samsung | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL National Wind Technology Center...

  6. SEMCO | Open Energy Information

    Open Energy Info (EERE)

    OH Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  7. Panasonic | Open Energy Information

    Open Energy Info (EERE)

    Information About Partnership with NREL Partnership with NREL Yes Partnership Type Test & Evaluation Partner Partnering Center within NREL Electricity Resources & Building...

  8. Technical Information Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Technical Information Specialist coordinating and executing data curation and quality activities, including software quality assurance, for...

  9. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  10. Environmental geographic information system.

    SciTech Connect (OSTI)

    Peek, Dennis; Helfrich, Donald Alan; Gorman, Susan

    2010-08-01

    This document describes how the Environmental Geographic Information System (EGIS) was used, along with externally received data, to create maps for the Site-Wide Environmental Impact Statement (SWEIS) Source Document project. Data quality among the various classes of geographic information system (GIS) data is addressed. A complete listing of map layers used is provided.

  11. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-08-28

    The Order establishes the program to identify information classified under the Atomic Energy Act [Restricted Data (RD) and Formerly Restricted Data (FRD)] or Executive Order 12958, as amended [National Security Information (NSI)], so that it can be protected against unauthorized dissemination. Canceled by DOE O 475.2

  12. Information extraction system

    DOE Patents [OSTI]

    Lemmond, Tracy D; Hanley, William G; Guensche, Joseph Wendell; Perry, Nathan C; Nitao, John J; Kidwell, Paul Brandon; Boakye, Kofi Agyeman; Glaser, Ron E; Prenger, Ryan James

    2014-05-13

    An information extraction system and methods of operating the system are provided. In particular, an information extraction system for performing meta-extraction of named entities of people, organizations, and locations as well as relationships and events from text documents are described herein.

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  14. Energy information directory 1994

    SciTech Connect (OSTI)

    Not Available

    1994-03-28

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory is a list of most Government offices and trade associations that are involved in energy matters. It does not include those DOE offices which do not deal with the public or public information.

  15. Employee Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee Information Employee Information Access Plus Benefits ISU Policy Library Leave Information Logging into Deltek Time & Expense (video) Entering Hours and Absence Requests (video Professional & Scientific Information Drug Free Workplace Training

  16. Sauerlach GEPP | Open Energy Information

    Open Energy Info (EERE)

    Home Sauerlach GEPP General Information Name Sauerlach GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 47.972400325481,...

  17. Unterhaching GEPP | Open Energy Information

    Open Energy Info (EERE)

    Home Unterhaching GEPP General Information Name Unterhaching GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 48.055885240766,...

  18. Information Science, Computing, Applied Math

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Science, Computing, Applied Math science-innovationassetsimagesicon-science.jpg Information Science, Computing, Applied Math National security depends on science ...

  19. Caliper Log | Open Energy Information

    Open Energy Info (EERE)

    Information Exploration Group: Downhole Techniques Exploration Sub Group: Well Log Techniques Parent Exploration Technique: Well Log Techniques Information Provided by...

  20. Golden - Local Information | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Golden-Local Information This page provides travel information for visitors to the Golden offices and laboratories of the National Renewable Energy Laboratory. Transportation NREL is accessible via bus on the RTD route 20 from Aurora and Denver. Route 20 travels along 20th Avenue and ends at the NREL Education Center. Visit the RTD Web site or call 303-299-6000 to plan your trip or for more information. Visit the Denver International Airport site to find: Car rental agencies Shuttle services,

  1. Information Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-09-30

    Provides a framework for managing information, information resources, and information technology investment, which supports the operating elements of the Department in the accomplishment of its missions and functions in both an efficient and effective manner and in accordance with Departmental policy. Cancels: DOE 1324.5B, DOE 5900.1A, DOE 1130.8A, DOE 1330.1D, DOE 1410.2, DOE 1450.3A, DOE 1700.1, DOE 1800.1A, DOE 5300.1C

  2. ENERGY INFORMATION CLEARINGHOUSE

    SciTech Connect (OSTI)

    Ron Johnson

    2003-10-01

    Alaska has spent billions of dollars on various energy-related activities over the past several decades, with projects ranging from smaller utilities used to produce heat and power in rural Alaska to huge endeavors relating to exported resources. To help provide information for end users, utilities, decision makers, and the general public, the Institute of Northern Engineering at UAF established an Energy Information Clearinghouse accessible through the worldwide web in 2002. This clearinghouse contains information on energy resources, end use technologies, policies, related environmental issues, emerging technologies, efficiency, storage, demand side management, and developments in Alaska.

  3. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo; Mili, Ali; Trien, Joseph P

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  4. Critical Materials Institute - invention disclosures

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a>

  5. High Command Fidelity Electromagnetically Driven Calorimeter (High-CoFi EleDriCal)
    Patent...

  6. Disclosure of Ex Parte Communication

    Broader source: Energy.gov [DOE]

    My firm represents an undisclosed client which manufactures high-end commercial and industrial electronic test and measurement devices.  On Tuesday May 5, 2015, at 1 p.m. Eastern time, we conducted...

  7. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    The Ohio Public Utilities Commission (PUCO) adopted rules in 2000 to implement this policy; the rules have been amended subsequently. There are separate rules for electric utilities providing a...

  8. Fuel Mix and Emissions Disclosure

    Broader source: Energy.gov [DOE]

    Massachusetts's 1997 electric utility restructuring legislation authorized the Massachusetts Department of Telecommunications and Energy (DTE)* to require certain electricity providers to disclose...

  9. invention disclosures | Critical Materials Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Critical Materials Institute will be defined by how well it meets its mission to assure supply chains of materials critical to clean energy technologies. To enable innovation in...

  10. info disclosure-rocky mts

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    NCSL/State and Tribal Government Working Group Appendix CLOSURE FOR THE SEVENTH GENERATION A REPORT FROM THE STEWARDSHIP COMMITTEE OF THE STATE AND TRIBAL GOVERNMENT WORKING GROUP National Conference of State Legislatures William T. Pound, Executive Director 1560 Broadway, Suite 700 Denver, Colorado 80202 (303) 830-2200 444 North Capitol Street, N.W. Washington, D.C. 20001 (202) 624-5400 February 1999 Closure for the Seventh Generation 2 NCSL/State and Tribal Government Working Group This book

  11. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  12. Energy Information Administration

    U.S. Energy Information Administration (EIA) Indexed Site

    Annual Report of the Origin of Natural Gas Liquids Production 1 U.S. DEPARTMENT OF ENERGY Energy Information Administration Washington, DC 20585 Form Approved OMB Number: 1905-0057 ...

  13. Energy Information Administration

    U.S. Energy Information Administration (EIA) Indexed Site

    X EIA-64A Annual Report of the Origin of Natural Gas Liquids Production 1 U.S. DEPARTMENT OF ENERGY Energy Information Administration Washington, DC 20585 Form Approved OMB Number: ...

  14. Identifying Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-08

    This Manual provides requirements for managing the Departments classification and declassification program, including details for classifying and declassifying information, documents, and material. Cancels DOE O 5650.2B.

  15. ARM - Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Related Links TWP-ICE Home Tropical Western Pacific Home ARM Data Discovery Browse Data Post-Experiment Data Sets Weather Summary (pdf, 6M) New York Workshop...

  16. NETL Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NETL Contact Information Contact U.S. Department of Energy National Energy Technology Laboratory PITTSBURGH, PA 626 Cochrans Mill Road P.O. Box 10940 Pittsburgh, PA 15236-0940...

  17. WIPP News & Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Carlsbad Field Office Information WIPP Overview Click on the Play button for an overview of the Waste Isolation Pilot Plant. (2.5 minutes, FLASH required) If you are not able to...

  18. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    manager for this system or application? Raymond Holmer (HS-1.22), Director, Office of ... D a t e ) e: Raymond Holmer itle: i r i c t o r , Office of Information Management, ...

  19. Freedom of Information Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    02, 2014 1:45 PM Submitted by Anonymous User This message was created by a Microsoft InfoPath form. The form data may be included as an attachment. Freedom of Information Act...

  20. Value of Information References

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Morency, Christina

    This file contains a list of relevant references on value of information (VOI) in RIS format. VOI provides a quantitative analysis to evaluate the outcome of the combined technologies (seismology, hydrology, geodesy) used to monitor Brady's Geothermal Field.

  21. Energy Information Directory 1996

    SciTech Connect (OSTI)

    1997-01-01

    This directory lists most government offices and trade associations that are involved in energy matters. It does not include DOE offices which do not deal with the public or public information.

  1. Conectiv | Open Energy Information

    Open Energy Info (EERE)

    navigation, search Name: Conectiv Place: Delaware References: Energy Information Administration.1 EIA Form 861 Data Utility Id 5027 This article is a stub. You can help OpenEI...

  2. Freedom of Information Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    S (BPA) - NN-1 Cc: Shay, Don Subject: Request for Corona and Field Effects Program Hi Kim, Pursuant to the Freedom of Information Act, I would like to request a copy of...

  3. Value of Information References

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Morency, Christina

    2014-12-12

    This file contains a list of relevant references on value of information (VOI) in RIS format. VOI provides a quantitative analysis to evaluate the outcome of the combined technologies (seismology, hydrology, geodesy) used to monitor Brady's Geothermal Field.

  4. Energy information directory 1998

    SciTech Connect (OSTI)

    1998-11-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists most Government offices and trade associations that are involved in energy matters.

  5. Building the Information Superhighway

    Office of Scientific and Technical Information (OSTI)

    impromptu video conference--a harbinger of the ease with which we will be able to talk, visit together, and share information in the near future--was broadcast in 11...

  6. Newbie | Open Energy Information

    Open Energy Info (EERE)

    about OpenEI? FaceBook 32x32.png Twitter 32x32.png Youtube 32x32.png The OpenEI energy blogs Ready for more? Check out the Content Developer section for more detailed information...

  7. Information Meeting- Education

    ScienceCinema (OSTI)

    None

    2011-04-25

    Suite à un circulaire, Messieurs Goldschmidt et Ullmann donnent plus d'information et attendent des questions/réponses concernant les problèmes d'éducation d'enfants

  8. Medical Information | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Medical Information Occupational Medicine provides a range of health services and can work with your personal physician on your health needs. A D D I T I O N A L L I N K S:...

  9. WIPP Information Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Skeen-Whitlock Building in Carlsbad. The WIPP Experience Exhibit at 4021 National Parks Highway in Carlsbad, N.M. WIPP Information Center Address: 4021 National Parks Highway...

  10. STEM Career Information Seminar

    Broader source: Energy.gov [DOE]

    This event will expose high school students to STEM professionals and STEM careers at the Department of Energy. We'll also cover the federal hiring process, internships, and information on getting involved in Department of Energy STEM programs.

  11. Identification of Classified Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1991-12-31

    To specify responsibilities, authorities, policy, and procedures for the management of the Department of Energy (DOE) program to identify classified information, documents, or material. Cancels DOE O 5650.2A, dated 5-8-85.

  12. Building the Information Superhighway

    Office of Scientific and Technical Information (OSTI)

    "Building the Information Superhighway" takes a look back at the history of the Internet, starting at a time when it had slowed to a crawl and the government was about to abandon the Internet as inherently flawed in concept. The article documents the contributions of the Department of Energy's Lawrence Berkeley National Laboratory in rescuing and then building today's Information Superhighway. Written in 1993, the article explores both the past and the future of the Internet. The

  13. Berkeley Lab Tour Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Berkeley Lab Tour Information Community Berkeley Global Campus Environmental Documents Tours Community Programs Friends of Berkeley Lab ⇒ Navigate Section Community Berkeley Global Campus Environmental Documents Tours Community Programs Friends of Berkeley Lab Public Tour Information for the Lawrence Berkeley National Laboratory. Tour date: Friday (See public tours web page drop-down list for available Fridays) Time: 10:00 am to 12:15 pm (2 hours and 15 min. although it could be slightly

  14. Information systems definition architecture

    SciTech Connect (OSTI)

    Calapristi, A.J.

    1996-06-20

    The Tank Waste Remediation System (TWRS) Information Systems Definition architecture evaluated information Management (IM) processes in several key organizations. The intent of the study is to identify improvements in TWRS IM processes that will enable better support to the TWRS mission, and accommodate changes in TWRS business environment. The ultimate goals of the study are to reduce IM costs, Manage the configuration of TWRS IM elements, and improve IM-related process performance.

  15. Information Sciences and Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences and Technology Information Sciences and Technology National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Executive Steve Stringer Business Development Executive Richard P. Feynman Center for Innovation (505) 660-2177 Email Los Alamos leverages advances in theory, algorithms,

  16. Special Undergraduate Informations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Special Undergraduate Information Special Undergraduate Information for SAGE A National Science Foundation Research Experiences for Undergraduates program Contacts Institute Director Reinhard Friedel-Los Alamos SAGE Co-Director W. Scott Baldridge-Los Alamos SAGE Co-Director Larry Braile-Purdue University Professional Staff Assistant Georgia Sanchez (505) 665-0855 Support to SAGE provides waiver of fees and a small stipend for attendance at SAGE for U.S. undergraduate students who are citizens or

  17. Information applications: Rapporteur summary

    SciTech Connect (OSTI)

    Siegel, S.

    1990-12-31

    An increased level of mathematical sophistication will be needed in the future to be able to handle the spectrum of information as it comes from a broad array of biological systems and other sources. Classification will be an increasingly complex and difficult issue. Several projects that are discussed are being developed by the US Department of Health and Human Services (DHHS), including a directory of risk assessment projects and a directory of exposure information resources.

  18. Information technology resources assessment

    SciTech Connect (OSTI)

    Loken, S.C.

    1993-01-01

    The emphasis in Information Technology (IT) development has shifted from technology management to information management, and the tools of information management are increasingly at the disposal of end-users, people who deal with information. Moreover, the interactive capabilities of technologies such as hypertext, scientific visualization, virtual reality, video conferencing, and even database management systems have placed in the hands of users a significant amount of discretion over how these resources will be used. The emergence of high-performance networks, as well as network operating systems, improved interoperability, and platform independence of applications will eliminate technical barriers to the use of data, increase the power and range of resources that can be used cooperatively, and open up a wealth of possibilities for new applications. The very scope of these prospects for the immediate future is a problem for the IT planner or administrator. Technology procurement and implementation, integration of new technologies into the existing infrastructure, cost recovery and usage of networks and networked resources, training issues, and security concerns such as data protection and access to experiments are just some of the issues that need to be considered in the emerging IT environment. As managers we must use technology to improve competitiveness. When procuring new systems, we must take advantage of scalable resources. New resources such as distributed file systems can improve access to and efficiency of existing operating systems. In addition, we must assess opportunities to improve information worker productivity and information management through tedmologies such as distributed computational visualization and teleseminar applications.

  19. Energy information directory 1997

    SciTech Connect (OSTI)

    1997-09-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, state, and local governments, the academic community, business and industrial organizations, and the general public. The two principal functions related to this task are: (1) operating a general access telephone line, and (2) responding to energy-related correspondence addressed to the Energy Information Administration (EIA). The Energy Information Directory was developed to assist the NEIC staff, as well as other Department of Energy (DOE) staff, in directing inquiries to the proper offices within DOE, other Federal agencies, or energy-related trade associations. The Directory lists some of the Government offices and trade associations that are involved in energy matters. It includes those DOE offices which deal with the public or public information. For the purposes of this publication, each entry has been given a numeric identification symbol. The index found in the back of this publication uses these identification numbers to refer the reader to relevant entries.

  20. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources Information Resources Photo of NREL employee Michael Deru using a desktop computer. The Geothermal Technologies Office is a source of current, relevant information about enhanced geothermal systems (EGS) technologies and other geothermal technologies and applications. On these pages you'll find helpful publications, software, and websites for the geothermal community and stakeholders. Geothermal information resources: Publications Technical Roadmaps

  1. Sandia Proprietary Information PII

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CBR (09/2014) Supersedes (07-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information CALIFORNIA CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are receiving this notice on behalf of the Personnel Security Background Review Office. If you have any questions regarding the Background Review process, or the attached form. Contact the Personnel Security Background Review Office at 1-800-417-2634, ext. 844-8902 or (505) 844-8902 or email: pebr@sandia.gov. In compliance with 48

  2. Sandia Proprietary Information PII

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRO (09-2014) Supersedes (09-2013) Issue Sandia Proprietary Information PII 1 Sandia Proprietary Information NM CONSULTANT PRE-PROCESSING BACKGROUND REVIEW You are receiving this notice on behalf of the Personnel Security Background Review Office. If you have any questions regarding the Background Review process, or the attached form. Contact the Personnel Security Background Review Office at 1-800-417-2634, ext. 844-8902 or (505) 844-8902. In compliance with 48 CFR 904.401 prior to selecting

  3. Office of Information Resources

    Energy Savers [EERE]

    ,2008 Melanie Pustay Director Office of Information and Privacy U.S. Department of Justice 1425 New York Ave., Suite 11050 Washington, DC 20530 Dear Ms. Pustay: Pursuant to the requirements set forth by Title 5, United States Code, Section 552(e), enclosed is a copy of the Annual Report on the administration of the Freedom of Information Act (FOIA) by the Department of Energy. The report will be made available on the World Wide Web through the FOIA Home Page of the Department. If you have any

  4. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Freedom of Information and Privacy Act Database Bureau: DOE-ID Project Unique ID: Date: May 8,2008 A. CONTACT INFORMATION 1. Who is the person completing this document? Nicole Brooks Title: FOIA/PA Officer Organization: DOE-ID Public Affairs Office Address: 1955 N. Fremont Ave, MS 1203 Idaho Falls, Idaho 83415 2. Who is the system owner? Nicole Brooks, FOIA/PA Officer U.S. DOE, Idaho Operations Office DOE-ID Public Affairs Office Address: 1955 N. Fremont Ave, MS 1203 Idaho Falls, Idaho 834 15 3.

  5. Office of Information Resources

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    I m ~ a c t Assessment (PIA) Name of Project: SEC-2 Bureau: US Department of Energy (DOE) Project Unique ID: DOE-ID Security clearance work tracking and budget system. Date: April 4,2008 A. CONTACT INFORMATION 1. Who is the person completing this document? Name: Jeffrey R. Lascheid Title: Program Manager Organization: Westech International, Inc. Address: 1955 N. Fremont Ave, MS 1170 Idaho Falls, ID 8341 5 2. Who is the system owner? Name: M. Christine Ott, Chief Information Officer US DOE, Idaho

  6. US Energy Information Administration EIA | Open Energy Information

    Open Energy Info (EERE)

    Administration EIA Jump to: navigation, search Name: US Energy Information Administration (EIA) Place: Washington DC, Washington, DC Zip: 20585 Product: The Energy Information...

  7. Security of Foreign Intelligence Information and Sensitive Compartmented Information Facilities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1993-07-23

    The order establishes responsibilities and authorities for protecting Foreign Intelligence Information (FII) and Sensitive Compartmented Information Facilities (SCIFs) within DOE. Supersedes DOE 5639.8.

  8. Smart Grid Information Clearinghouse (SGIC) | Open Energy Information

    Open Energy Info (EERE)

    TOOL Name: Smart Grid Information Clearinghouse (SGIC) AgencyCompany Organization: Smart Grid Information Clearinghouse Sector: Energy Focus Area: People and Policy Phase:...

  9. Utah Water Right Information Webpage | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Utah Water Right Information Webpage Abstract Provides information about obtaining a water rights...

  10. NMSLO Information Packet for Business Lease | Open Energy Information

    Open Energy Info (EERE)

    Information Packet for Business Lease Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- OtherOther: NMSLO Information Packet for Business...

  11. For Further Information

    Energy Savers [EERE]

    For Further Information 1. Media Inquiries Bartlett W. Jackson Assistant Press Secretary, Office of Public Affairs, Department of Energy Email: bartlett.jackson@hq.doe.gov 2. Consent-Based Siting Website energy.gov/consentbasedsiting 3. Invitation for Public Comment Submissions Email: consentbasedsiting@hq.doe.gov

  12. Small Wind Information (Postcard)

    SciTech Connect (OSTI)

    Not Available

    2011-08-01

    The U.S. Department of Energy's Wind Powering America initiative maintains a website section devoted to information about small wind turbines for homeowners, ranchers, and small businesses. This postcard is a marketing piece that stakeholders can provide to interested parties; it will guide them to this online resource.

  13. Information Technology Project Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-09-12

    This Guide provides Department of Energy recommended guidelines to ensure that the acquisition of information technology capital assets is performed in compliance with DOE O 413.3A, Program and Project Management for the Acquisition of Capital Assets, dated 7-28-06. Canceled by DOE N 251.105.

  14. Information Collection Management Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-10-11

    This Order sets forth DOE requirements and responsibilities for implementing the information collection management provisions of the Paperwork Reduction Act of 1995 and the Office of Management and Budgets implementing regulation Controlling Paperwork Burdens on the Public, as contained in 5 CFR 1320. No cancellation.

  15. Accident management information needs

    SciTech Connect (OSTI)

    Hanson, D.J.; Ward, L.W.; Nelson, W.R.; Meyer, O.R. (EG and G Idaho, Inc., Idaho Falls, ID (USA))

    1990-04-01

    In support of the US Nuclear Regulatory Commission (NRC) Accident Management Research Program, a methodology has been developed for identifying the plant information needs necessary for personnel involved in the management of an accident to diagnose that an accident is in progress, select and implement strategies to prevent or mitigate the accident, and monitor the effectiveness of these strategies. This report describes the methodology and presents an application of this methodology to a Pressurized Water Reactor (PWR) with a large dry containment. A risk-important severe accident sequence for a PWR is used to examine the capability of the existing measurements to supply the necessary information. The method includes an assessment of the effects of the sequence on the measurement availability including the effects of environmental conditions. The information needs and capabilities identified using this approach are also intended to form the basis for more comprehensive information needs assessment performed during the analyses and development of specific strategies for use in accident management prevention and mitigation. 3 refs., 16 figs., 7 tabs.

  16. Condition Assessment Information System

    Energy Science and Technology Software Center (OSTI)

    2002-09-16

    CAIS2000 records, tracks and cost maintenance deficiencies associated with condition assessments of real property assets. Cost information is available for 39,000 items in the currenht RS Means, Facilities Construction Manual. These costs can, in turn, be rolled by by asset to produce the summary condition of an asset or site.

  17. Information Services Directory

    SciTech Connect (OSTI)

    1991-03-01

    Congress passed the Nuclear Waste Policy Act of 1982 (NWPA) and its amendments establishing the national policy for safely storing, transporting and disposing of spent nuclear fuel and high-level radioactive waste in a geologic repository. This legislation created the Office of Civilian Radioactive Waste Management (OCRWM) within the US Department of Energy (DOE) to develop an integrated system for the safe and efficient disposal of high-level radioactive waste. The NWPA, as amended, directs DOE to study in detail the Yucca Mountain site in Nevada as the only candidate site for the Nation`s geologic repository. This Information Services Directory is intended to facilitate dissemination of information. The Directory is produced by the Education and Information Division of OCRWM`s Office of External Relations and will be updated periodically. This is the third such update since its issuance in August 1986. It is a reference document that lists the sources of program information available to states, Indian tribes, and the public.

  18. Energy information sheets, July 1998

    SciTech Connect (OSTI)

    1998-07-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  19. Energy information sheets, September 1996

    SciTech Connect (OSTI)

    1996-09-01

    The National Energy Information Center (NEIC), as part of its mission, provides energy information and referral assistance to Federal, State, and local governments, the academic community, business and industrial organizations, and the public. The Energy Information Sheets was developed to provide general information on various aspects of fuel production, prices, consumption, and capability. Additional information on related subject matter can be found in other Energy Information Administration (EIA) publications as referenced at the end of each sheet.

  20. Freedom of Information Act Response

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for information that you made to the Bonneville Power Administration (BPA) under the Freedom of Information Act (FOIA), 5 USC 552. You requested the following: Copies of all...

  1. Vehicle Technologies Office: Information Resources

    Broader source: Energy.gov [DOE]

    From here you can access additional information on advanced transportation technologies; view programmatic publications and technical information; learn the basics of hybrid vehicle technology;...

  2. Staying Informed | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    These devices will help you communicate with your power company, and they'll help you stay informed about restoration efforts, weather forecasts, and other important information. ...

  3. Las Pailas | Open Energy Information

    Open Energy Info (EERE)

    General Information Name Las Pailas Facility Geothermal Power Plant Sector Geothermal energy Location Information Location Guanacaste, Costa Rice Coordinates 10.7869295,...

  4. Malitbog GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Malitbog GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 11.151315086646, 124.64890480042 Loading map......

  5. Bruchsal GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Bruchsal GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 49.125177630171, 8.5671043395996 Loading map......

  6. Lahendong GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Lahendong GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 1.3235343193864, 124.83073711395 Loading map......

  7. Landau GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Landau GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 49.186587726033, 8.1233596801758 Loading map......

  8. Miravalles IV | Open Energy Information

    Open Energy Info (EERE)

    Information Name Miravalles IV Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 10.5251574, -85.254136 Loading map......

  9. Mindanao GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Mindanao GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 7.0161091018815, 125.22165298462 Loading map......

  10. Blumau GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Blumau GEPP Facility Power Plant Sector Geothermal energy Location Information Address Blumau, Austria Coordinates 47.124360162625,...

  11. Mambucal GEPP | Open Energy Information

    Open Energy Info (EERE)

    GEPP General Information Name Mambucal GEPP Facility Power Plant Sector Geothermal energy Location Information Coordinates 10.483002547448, 123.10599088669 Loading map......

  12. Green Machine | Open Energy Information

    Open Energy Info (EERE)

    Information Name Green Machine Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 45.943161, 24.96676 Loading map......

  13. TR1 | Open Energy Information

    Open Energy Info (EERE)

    TR1 General Information Name TR1 Facility Geothermal Power Plant Sector Geothermal energy Location Information Coordinates 38.342452711329, 28.556900024414 Loading map......

  14. LTS Information Management - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Management About Us LTS Home Page LTS Project Management LTS Transition and Timeline LTS Execution LTS Background LTS Information Management LTS Fact Sheets Briefings ...

  15. Deactivation & Decommissioning Knowledge Management Information...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge Management Information Tool (D&D KM-IT) Deactivation & Decommissioning Knowledge ...

  16. Information Technology Specialist (Info Security)

    Broader source: Energy.gov [DOE]

    (See Frequently Asked Questions for more information). Where would I be working? Western Area Power Administration, Corporate Services Office, Office of the Chief Information Officer, Cyber...

  17. Mercury Information Clearinghouse

    SciTech Connect (OSTI)

    Chad A. Wocken; Michael J. Holmes; Dennis L. Laudal; Debra F. Pflughoeft-Hassett; Greg F. Weber; Nicholas V. C. Ralston; Stanley J. Miller; Grant E. Dunham; Edwin S. Olson; Laura J. Raymond; John H. Pavlish; Everett A. Sondreal; Steven A. Benson

    2006-03-31

    The Canadian Electricity Association (CEA) identified a need and contracted the Energy & Environmental Research Center (EERC) to create and maintain an information clearinghouse on global research and development activities related to mercury emissions from coal-fired electric utilities. With the support of CEA, the Center for Air Toxic Metals{reg_sign} (CATM{reg_sign}) Affiliates, and the U.S. Department of Energy (DOE), the EERC developed comprehensive quarterly information updates that provide a detailed assessment of developments in the various areas of mercury monitoring, control, policy, and research. A total of eight topical reports were completed and are summarized and updated in this final CEA quarterly report. The original quarterly reports can be viewed at the CEA Web site (www.ceamercuryprogram.ca). In addition to a comprehensive update of previous mercury-related topics, a review of results from the CEA Mercury Program is provided. Members of Canada's coal-fired electricity generation sector (ATCO Power, EPCOR, Manitoba Hydro, New Brunswick Power, Nova Scotia Power Inc., Ontario Power Generation, SaskPower, and TransAlta) and CEA, have compiled an extensive database of information from stack-, coal-, and ash-sampling activities. Data from this effort are also available at the CEA Web site and have provided critical information for establishing and reviewing a mercury standard for Canada that is protective of environment and public health and is cost-effective. Specific goals outlined for the CEA mercury program included the following: (1) Improve emission inventories and develop management options through an intensive 2-year coal-, ash-, and stack-sampling program; (2) Promote effective stack testing through the development of guidance material and the support of on-site training on the Ontario Hydro method for employees, government representatives, and contractors on an as-needed basis; (3) Strengthen laboratory analytical capabilities through analysis and quality assurance programs; and (4) Create and maintain an information clearinghouse to ensure that all parties can keep informed on global mercury research and development activities.

  18. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Audit Report A-07-16 for INL/CCP RH Waste Characterization Activities dated November 22, 2006 Transmittal of the Certification Audit Report for SRS A-07-01 dated November 21, 2006 Annual Proposed Acceptable Knowledge Sufficiency Determination List Annual Report Submittals Submittal of Acceptable Knowledge Sufficiency Determination Notice of Submittal of a Dispute

  19. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Certification Audit Report for the Advanced Mixed Waste Treatment Program, A-08-19 dated November 25, 2008 Transmittal of the Certification Audit Report for the Hanford TRU Program dated October 15, 2008 Transmittal of the Certification Audit Report for the Argonne National Laboratory-Central Characterization Project, Audit A-08-24 dated September 17,

  20. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    09 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Revised B6 Checklist and Additional Objective Evidence for the Idaho National Laboratory/Central Characterization Project Remote-Handled Waste Visual Examination Process, Audit A-10-03, dated November 24, 2009 Transmittal of the Certification Audit Report for the Advanced Mixed Waste Treatment Program, dated November 23, 2009 Transmittal of the

  1. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Recertification Audit Report for the Advanced Mixed Waste Treatment Project, Audit A-10-24, dated December 14, 2010 Transmittal of Carlsbad Field Office Final Audit Report A-10-23, Argonne National Laboratory Central Characterization Project for Remote Handled Waste Characterization dated October 14, 2010 Transmittal of Recertification Audit Report

  2. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Notification of Last Waste Emplacement and Intent to Commence Closure of the Waste Isolation Pilot Plant Hazardous Waste Disposal Unit Panel 5 dated March 30, 2011 Submittal of Final Audit Reports Transmittal of the Final Audit Report A-11-20, Argonne National Laboratory Central Characterization Project for Remote-Handled Waste Characterization dated October 26, 2011 Transmittal of the Recertification

  3. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Final Audit Report for the Argonne National Laboratory Central Characterization Project Recertification Audit A-12-16 dated December 19, 2012 Transmittal of the Final Audit Report for Recertification Audit A-12-14, INL Analytical Laboratories Utilizing the Central Characterization Project dated December 12, 2012 Transmittal of the Final Audit Report for Los Alamos

  4. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Notification of Panel 6 Closure and Final Waste Emplacement dated November 5, 2013 Submittal of Final Audit Reports Transmittal of the Final Audit Report for Recertification Audit A-14-01 of the Advanced Mixed Waste Treatment Project dated December 9, 2013 Final Audit Report for the Argonne National Laboratory Central Characterization Program Recertification Audit A-13-24 dated November 22, 2013

  5. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of Final Audit Report for CBFO Audit A-15-21 of the LANL/CCP dated December 9, 2015 Transmittal of the Final Audit Report for CBFO Audit A-15-18 INL/CCP TRU Waste Characterization and Certification Activities dated December 3, 2015 Final Audit Report for the Argonne National Laboratory Central Characterization Program Recertification Audit A-15-24 dated

  6. Information Resources - Publications

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Quick Search Search By: Keyword Author Title Year GO Main Menu Home My Papers Submit Status Signatures Search Admin Log Out Contract Acknowledgment Notice In June 2014, the Department of Energy's Office of Science issued new guidance for manuscripts produced by DOE-funded laboratories. Each submitted manuscript must now contain a Notice to the Publisher and an Acknowledgment. Notice to Publisher As per the JSA contract with DOE, it is necessary to inform the publisher of the U.S. Government

  7. INFORMATION TO USERS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    67006 INFORMAL REPORT PROPERTIES AND PERFORMANCE OF CEMENT- BASED GROUTS FOR GEOTHERMAL HEAT PUMP APPLICATIONS FINAL REPORT FY 1999 M.L. Allan and A.J. Philippacopoulos November 1999 Prepared for: Office of Geothermal Technologies United States Department of Energy Washington, DC 20585 Materials and Chemical Sciences Division DISCLAIMER This document was prepared as an account of work sponsored by an agenc:y of the United States Government. Neither the United States Government nor any agency

  8. WINDExchange: Information Resources

    Wind Powering America (EERE)

    Information Resources A range of WINDExchange resources are available, including links to relevant publications, podcasts, and webinars about wind energy topics. Annual Reports Cover of the 2013 Wind Technologies Market Report. 2014 Wind Technologies Market Report The report provides a comprehensive overview of 2014 trends in the U.S. wind industry and wind power market. DOE's Lawrence Berkeley National Laboratory draws from a variety of data sources and covers a broad range of topics. Cover of

  9. SOURCE SELECTION INFORMATION -

    Energy Savers [EERE]

    SOURCE SELECTION INFORMATION - SEE FEDERAL ACQUISITION REGULATION (FAR) 2.101 AND 3.104 Department of Energy Washington, DC 20585 (enter date here, centered revised template April 26, 2013) The Honorable Harold Rogers The Honorable Barbara A. Mikulski Chairman, Committee on Appropriations Chairwoman, Committee on Appropriations U.S. House of Representatives U.S. Senate Washington, DC 20515 Washington, DC 20510 The Honorable Rodney P. Frelinghuysen The Honorable Dianne Feinstein Chairman,

  10. 2016 Information Repository Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 Information Repository Documents WIPP Annual Waste Minimization Report Class 1* Permit Modifications and NMED Responses Class 1 and Class 1* Modifications WIPP Hazardous Waste Facility Permit EPA I.D. Number NM4890139088-TSDF John E. Kieling/Hazardous Waste Bureau dated January 27, 2016 Class 1* Modification, requiring prior agency approval, seeking to Revise Closure Schedule Dates in Attachment G Class 1 Permit Modifications and NMED Responses Class 1 Permit Modification Notification to the

  11. Network Information System

    Energy Science and Technology Software Center (OSTI)

    1996-05-01

    The Network Information System (NWIS) was initially implemented in May 1996 as a system in which computing devices could be recorded so that unique names could be generated for each device. Since then the system has grown to be an enterprise wide information system which is integrated with other systems to provide the seamless flow of data through the enterprise. The system Iracks data for two main entities: people and computing devices. The following aremore » the type of functions performed by NWIS for these two entities: People Provides source information to the enterprise person data repository for select contractors and visitors Generates and tracks unique usernames and Unix user IDs for every individual granted cyber access Tracks accounts for centrally managed computing resources, and monitors and controls the reauthorization of the accounts in accordance with the DOE mandated interval Computing Devices Generates unique names for all computing devices registered in the system Tracks the following information for each computing device: manufacturer, make, model, Sandia property number, vendor serial number, operating system and operating system version, owner, device location, amount of memory, amount of disk space, and level of support provided for the machine Tracks the hardware address for network cards Tracks the P address registered to computing devices along with the canonical and alias names for each address Updates the Dynamic Domain Name Service (DDNS) for canonical and alias names Creates the configuration files for DHCP to control the DHCP ranges and allow access to only properly registered computers Tracks and monitors classified security plans for stand-alone computers Tracks the configuration requirements used to setup the machine Tracks the roles people have on machines (system administrator, administrative access, user, etc...) Allows systems administrators to track changes made on the machine (both hardware and software) Generates an adjustment history of changes on selected fields« less

  12. Gasification Systems Project Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Information Gasifier Optimization Archived Projects Agreement Number Project Title Performer Name Technology Area FE0023497 Alstom's Limestone Chemical Looping Gasification Process for High Hydrogen Syngas Generation Alstom Power, Inc Gasification Systems FE0023577 Advanced Gasifier and Water Gas Shift Technologies for Low Cost Coal Conversion to High Hydrogen Syngas Gas Technology Institute Coal & Coal-Biomass to Liquids, Gasification Systems FE0023915 Pilot Scale Operation and

  13. Information technology resources assessment

    SciTech Connect (OSTI)

    Stevens, D.F.

    1992-01-01

    This year`s Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  14. Information technology resources assessment

    SciTech Connect (OSTI)

    Stevens, D.F.

    1992-01-01

    This year's Information Technology Resources Assessment (ITRA) is something of a departure from traditional practice. Past assessments have concentrated on developments in fundamental technology, particularly with respect to hardware. They form an impressive chronicle of decreasing cycle times, increasing densities, decreasing costs (or, equivalently, increasing capacity and capability per dollar spent), and new system architectures, with a leavening of operating systems and languages. Past assessments have aimed -- and succeeded -- at putting information technology squarely in the spotlight; by contrast, in the first part of this assessment, we would like to move it to the background, and encourage the reader to reflect less on the continuing technological miracles of miniaturization in space and time and more on the second- and third-order implications of some possible workplace applications of these miracles. This Information Technology Resources Assessment is intended to provide a sense of technological direction for planners in projecting the hardware, software, and human resources necessary to support the diverse IT requirements of the various components of the DOE community. It is also intended to provide a sense of our new understanding of the place of IT in our organizations.

  15. Only critical information was scanned

    Office of Legacy Management (LM)

    Only critical information was scanned. Entire document is available upon request - Click here to email a...

  16. NERSC Information Management (NIM) portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NERSC Information Management (NIM) portal The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Link to NIM interface NIM Guide for Users The NERSC Information Management (NIM) system is a web portal used to view and modify user account, usage, and allocations information. Read More » NIM Guide for PIs and Project Managers This Guide explains how to manage users in a project account (called a repository or repo).

  17. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources It is widely recognized that shared knowledge is the enabler of scientific progress. This recognition, combined with the fact that scientific and technical information (STI) is a principal deliverable coming from the Federal government's R&D program, underscores the Department's commitment to providing a wide-range of S&T Information Resources. In support of this commitment, the DOE Office of Scientific and Technical Information (OSTI) fulfills

  18. Information requested in Protocol No

    Energy Savers [EERE]

    Owner (ISO) Information System Owner (ISO) startup-849805_960_720.jpg The Information System Owner (ISO) is responsible for every stage in the lifecycle of an information system, including: procurement development integration modification operation maintenance retirement The ISO is a key contributor in: developing system design specifications testing implementation PDF icon Information System Owner Core Competency Training Worksheet More Documents & Publications Information System Security

  19. Information Collection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Collection Information Collection The Office of Environment, Health, Safety and Security (EHSS) continues to seek for ways to minimize the burden of information collection on DOE and its contractors. DOE collects information concerning the health, safety and security of DOE employees including its contractors and facilities. The information collected will be used by DOE to exercise management oversight over Management and Operating (M&O) contractors of DOE's Government-Owned

  20. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources The Information Resources section of this website contains a range of introductory and in-depth materials to provide further information about Bioenergy Technologies Office (BETO) activities, research, publications, tools, and terminology. Use the links below or left navigation menu options to find the information you need. Note: This Web page has been recently updated. The following sections have been moved: Bioenergy Technologies Blog, Newsletter,

  1. WIPP Stakeholder Information Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2007 WIPP Stakeholder Information Documents Closure of Underground Hazardous Waste Disposal Unit Submittal of Final Audit Reports Transmittal of the Certification Audit Report A-07-14 of the AMWTP dated September 27, 2007 Transmittal of the Certification Audit Report A-07-03 of the ANL-CCP dated September 18, 2007 Final Audit Report A-07-24 of the SRS-CCP Battelle Columbus RH Waste dated September 6, 2007 Transmittal of the Certification Audit Report for the Hanford Site, Audit A-07-10 dated

  2. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager Jeff Troutman 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) Karen Nunez (Deputy) 8658 6535 7-210H 80-160 Work Planning, Facility Specialists This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  3. PEMP General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3-A - 01/01/13 to 06/30/13 WTP Contract No. DE-AC27-01RV14136 Page 1 WTP PERFORMANCE EVALUATION & MEASUREMENT PLAN - PERIOD 2013-A TABLE OF CONTENTS Num ber PEMP General Information A Introduction 2 B Roles and Responsibilities 3 C Process and Schedule 5 D Contractor Self-Assessment 5 E PEMP Numbering System and Definitions 6 F Performance Periods 7 G Incentive Ratings and Definitions 7 Attachment A - Incentive B.1 - Award Fee - Project Management Incentive 7 B.1 Aw ard Fee - Project Managem

  4. PEMP General Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2-B - 07/01/12 to 12/31/12 WTP Contract No. DE-AC27-01RV14136 Page 1 WTP PERFORMANCE EVALUATION & MEASUREMENT PLAN - PERIOD 2012-B TABLE OF CONTENTS Num ber PEMP General Information A Introduction 2 B Roles and Responsibilities 3 C Process and Schedule 5 D Contractor Self-Assessment 5 E PEMP Numbering System and Definitions 6 F Performance Periods 7 G Incentive Ratings and Definitions 7 Attachment A - Incentive B.1 - Award Fee - Project Management Incentive 8 B.1 Aw ard Fee - Project Managem

  5. Wind energy information guide

    SciTech Connect (OSTI)

    1996-04-01

    This book is divided into nine chapters. Chapters 1--8 provide background and annotated references on wind energy research, development, and commercialization. Chapter 9 lists additional sources of printed information and relevant organizations. Four indices provide alphabetical access to authors, organizations, computer models and design tools, and subjects. A list of abbreviations and acronyms is also included. Chapter topics include: introduction; economics of using wind energy; wind energy resources; wind turbine design, development, and testing; applications; environmental issues of wind power; institutional issues; and wind energy systems development.

  6. Mound History and Information

    Office of Legacy Management (LM)

    Mound Site History and Information The Mound site, formerly known as the Mound Plant or Facility, takes its name from a nearby Na- tive American burial mound. The 306 acre facility is sited on a hill in the center of Miamisburg, Ohio. Construction of the Mound Plant began in 1946, and the site became operational in 1949. Mound, the nation's first post-war U.S. Atomic Energy Commission site to be constructed, was established to consolidate and continue the work conducted at the Dayton Units for

  7. Safety Staff Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Staff Contact Information Print Contact Extension Location CONTROL ROOM (24/7) 4969 80-140 Floor Operations Floor Operators 7464 (RING) 80-159 Building Manager Jeff Troutman 7358 80-151 Building Emergency Team (BET) This e-mail address is being protected from spambots. You need JavaScript enabled to view it (Leader) Karen Nunez (Deputy) 8658 6535 7-210H 80-160 Work Planning, Facility Specialists This e-mail address is being protected from spambots. You need JavaScript enabled to view it

  8. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  9. Information and Records Management Transition Guidance | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information and Records Management Transition Guidance Information and Records Management Transition Guidance Information and Records Management Transition Guidance (March 2004)...

  10. Unclassified Controlled Nuclear Information (UCNI) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unclassified Controlled Nuclear Information (UCNI) Unclassified Controlled Nuclear Information (UCNI) Welcome to the Unclassified Controlled Nuclear Information (UCNI) webpage. ...

  11. Unclassified Controlled Nuclear Information Training | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unclassified Controlled Nuclear Information Training Unclassified Controlled Nuclear Information Training Training Unclassified Controlled Nuclear Information for persons with ...

  12. Project Management Information Systems (PMIS) | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) Project Management Information Systems (PMIS) In today's day and age, Information ...

  13. Information Management Conference | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Management Conference Information Management Conference Information Management Conference The 34th Information Management Conference (IMC) sponsored by the Office of ...

  14. SmartGrid Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SmartGrid Information SmartGrid Information Smart Grid Information This web page provides information and resources on several policy issues critical to the continued development ...

  15. Dynamic Information Architecture System

    Energy Science and Technology Software Center (OSTI)

    1997-02-12

    The Dynamic Information System (DIAS) is a flexible object-based software framework for concurrent, multidiscplinary modeling of arbitrary (but related) processes. These processes are modeled as interrelated actions caused by and affecting the collection of diverse real-world objects represented in a simulation. The DIAS architecture allows independent process models to work together harmoniously in the same frame of reference and provides a wide range of data ingestion and output capabilities, including Geographic Information System (GIS) typemore » map-based displays and photorealistic visualization of simulations in progress. In the DIAS implementation of the object-based approach, software objects carry within them not only the data which describe their static characteristics, but also the methods, or functions, which describe their dynamic behaviors. There are two categories of objects: (1) Entity objects which have real-world counterparts and are the actors in a simulation, and (2) Software infrastructure objects which make it possible to carry out the simulations. The Entity objects contain lists of Aspect objects, each of which addresses a single aspect of the Entity''s behavior. For example, a DIAS Stream Entity representing a section of a river can have many aspects correspondimg to its behavior in terms of hydrology (as a drainage system component), navigation (as a link in a waterborne transportation system), meteorology (in terms of moisture, heat, and momentum exchange with the atmospheric boundary layer), and visualization (for photorealistic visualization or map type displays), etc. This makes it possible for each real-world object to exhibit any or all of its unique behaviors within the context of a single simulation.« less

  16. MANAGEMENT ALERT

    Broader source: Energy.gov (indexed) [DOE]

    COMMISSION FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Management Alert: Review of Allegations of Improper Disclosure of Confidential, Nonpublic...

  17. The Financial Reporting System Public Data

    Annual Energy Outlook [U.S. Energy Information Administration (EIA)]

    several physicalfinancial relationships. Description These files contain disclosure-free aggregate data from the Energy Information Administration's Financial Reporting System...

  18. U-214: HP Network Node Manager Java JDK / JRE Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    Vulnerabilities could be remotely exploited resulting in unauthorized information disclosure, modification, Denial of Service (DoS).

  19. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Contact Information Margaret Evans mevans@ameslab.gov 515-294-2056 Kori Grooms groomsk@ameslab.gov 515-294-2056 Vickie Hahn hahn@ameslab.gov 515-294-2056...

  20. SRI2007 Conference - Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information For further information about the conference, please click on the following link. E-mail Ms. Lee Ann Murphey or contact Ms. Lee Ann Murphey CAMDLSU 6980...

  1. Information Systems | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Systems Information Systems Condition Assessment Information System (CAIS) Inspection or assessment data is loaded into the Condition Assessment Information System (CAIS) Web database where it is costed using various RS Means Construction Cost Book data. RS Means is the predominant national cost estimating system. Currently CAIS Web contains over 53,000 line items dealing with building elements, components, and types and other structure and facilities, and infrastructure systems.

  2. BIO DZL | Open Energy Information

    Open Energy Info (EERE)

    DZL Place: Bangalore, Karnataka, India Product: Bangalore-based company involved in biodiesel production, jatropha development and biodiesel information dissemination....

  3. Liquid Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  4. Gas Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  5. Isotope Geothermometry | Open Energy Information

    Open Energy Info (EERE)

    Exploration Group: Geochemical Techniques Exploration Sub Group: Geochemical Data Analysis Parent Exploration Technique: Geothermometry Information Provided by Technique...

  6. Defining a new information exchange

    Energy Science and Technology Software Center (OSTI)

    2013-08-01

    This wiki page provides the public with all specifications needed to create a new information exchange (content model package).

  7. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources Information Resources Fact Sheets Enhanced Geothermal Systems Fact Sheet Enhanced Geothermal Systems Infographic FORGE Informational Flyer Multimedia View and download recent infographics and additional visuals created through FORGE. Final-FORGE-Flyer_830x1868.jpg FORGE_Phase_Infograhic_070114_withOutBlueBox-01.png References Greenhouse Gas Emissions from a Typical Passenger Vehicle - EPA-420-F-14-040a Reports Geothermal Energy Technologies Office 2015

  8. Forward Electronics | Open Energy Information

    Open Energy Info (EERE)

    focussed on optoelectronics, information appliances, consumer electronics and communication. Coordinates: 25.080441, 121.564194 Show Map Loading map......

  9. Sandia National Laboratories: Contact Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electromagnetics Bioscience Computing and Information Science Electromagnetics Facilities Programs & Capabilities Partnership Opportunities EM News & Reports Contact Information Engineering Science Geoscience Materials Science Nanodevices and Microsystems Radiation Effects and High Energy Density Science Research Contact Information Steve Glover 505-845-9620 sfglove@sandia.gov

  10. Wind Energy Information Guide 2004

    SciTech Connect (OSTI)

    anon.

    2004-01-01

    The guide provides a list of contact information and Web site addresses for resources that provide a range of general and technical information about wind energy, including general information, wind and renewable energy, university programs and research institutes, international wind energy associations and others.

  11. System for Information Discovery

    Energy Science and Technology Software Center (OSTI)

    1998-09-25

    SID characterizes natural language based documents so that they may be related and retrieved based on content similarity. This technology processes textual documents, autonoumsly identifies the major topics of the document set, and constructs an interpretable, high dimensional representation of each document. SID also provides the ability to interactively reweight representations based on user need, so users may analyze the dataset from multiple points of view. The particular advantages SID offers are speed, data compression,more » flexibility in representation, and incremental processing. SPIRE consists of software for visual analysis of text-based information sources. This technology enables users to make discoveries about the content of very large sets of textual documents without requiring the user to read or presort the documents. It employs algorithms for text and word proximity analysis to identify the key themes within the documents. The results of this analysis are projected onto a visual spatial proximity display (Galaxies or Themescape) where document proximity represents the degree of relatedness of theme.« less

  12. information systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    information systems NNSA's G2 Management Information System Wins Association for Enterprise Information's (AFEI) "Excellence in Enterprise Information Award" The G2 team and the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information Award. (WASHINGTON, D.C) - The National Nuclear Security Administration (NNSA) has received the 2015 Association for Enterprise Information's (AFEI) Excellence in Enterprise Information

  13. Ground Electromagnetic Techniques | Open Energy Information

    Open Energy Info (EERE)

    Information Exploration Group: Geophysical Techniques Exploration Sub Group: Electrical Techniques Parent Exploration Technique: Electromagnetic Techniques Information...

  14. Tribal Energy and Environmental Information | Open Energy Information

    Open Energy Info (EERE)

    Tribal Energy and Environmental Information Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Secondary Legal SourceSecondary Legal Source: Tribal...

  15. SWERA/Solar Resource Information | Open Energy Information

    Open Energy Info (EERE)

    SWERASolar Resource Information < SWERA Jump to: navigation, search SWERA logo.png Solar and Wind Energy Resource Assessment (SWERA) Interactive Web PortalPowered by OpenEI...

  16. COP 18 Side Event General Information | Open Energy Information

    Open Energy Info (EERE)

    Side Event General Information Jump to: navigation, search Low Emission Development Strategies Global Partnership Advancing climate-resilient, low-emission development around the...

  17. REEGLE - Clean Energy Information Gateway | Open Energy Information

    Open Energy Info (EERE)

    search Tool Summary LAUNCH TOOL Name: reegle.info - clean energy information portal AgencyCompany Organization: Renewable Energy and Energy Efficiency Partnership...

  18. Montana Information for 310 Applicant | Open Energy Information

    Open Energy Info (EERE)

    for 310 Applicant Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Montana Information for 310 Applicant Abstract Provides overview of joint...

  19. Central Information and Business Agency CIBA | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Name: Central Information and Business Agency (CIBA) Place: Lewis, Delaware Sector: Solar Product: Developer of solar farms in Europe via its...

  20. Integrated risk information system (IRIS)

    SciTech Connect (OSTI)

    Tuxen, L.

    1990-12-31

    The Integrated Risk Information System (IRIS) is an electronic information system developed by the US Environmental Protection Agency (EPA) containing information related to health risk assessment. IRIS is the Agency`s primary vehicle for communication of chronic health hazard information that represents Agency consensus following comprehensive review by intra-Agency work groups. The original purpose for developing IRIS was to provide guidance to EPA personnel in making risk management decisions. This original purpose for developing IRIS was to guidance to EPA personnel in making risk management decisions. This role has expanded and evolved with wider access and use of the system. IRIS contains chemical-specific information in summary format for approximately 500 chemicals. IRIS is available to the general public on the National Library of Medicine`s Toxicology Data Network (TOXNET) and on diskettes through the National Technical Information Service (NTIS).

  1. Information architecture. Volume 3: Guidance

    SciTech Connect (OSTI)

    1997-04-01

    The purpose of this document, as presented in Volume 1, The Foundations, is to assist the Department of Energy (DOE) in developing and promulgating information architecture guidance. This guidance is aimed at increasing the development of information architecture as a Departmentwide management best practice. This document describes departmental information architecture principles and minimum design characteristics for systems and infrastructures within the DOE Information Architecture Conceptual Model, and establishes a Departmentwide standards-based architecture program. The publication of this document fulfills the commitment to address guiding principles, promote standard architectural practices, and provide technical guidance. This document guides the transition from the baseline or defacto Departmental architecture through approved information management program plans and budgets to the future vision architecture. This document also represents another major step toward establishing a well-organized, logical foundation for the DOE information architecture.

  2. Transacting generation attributes across market boundaries: Compatible information systems and the treatment of imports and exports

    SciTech Connect (OSTI)

    Grace, Robert; Wiser, Ryan

    2002-11-01

    Voluntary markets for ''green'' power, and mandatory policies such as fuel source disclosure requirements and renewables portfolio standards, each rely on the ability to differentiate electricity by the ''attributes'' of the generation. Throughout North America, electricity markets are devising accounting and verification systems for generation ''attributes'': those characteristics of a power plant's production such as fuel source and emissions that differentiate it from undifferentiated (or ''commodity'') electricity. These accounting and verification systems are intended to verify compliance with market mandates, create accurate disclosure labels, substantiate green power claims, and support emissions markets. Simultaneously, interest is growing in transacting (importing or exporting) generation attributes across electricity market borders, with or without associated electricity. Cross-border renewable attribute transactions have advantages and disadvantages. Broad access to markets may encourage more renewable generation at lower cost, but this result may conflict with desires to assure that at least some renewable resources are built locally to achieve either local policy goals or purchaser objectives. This report is intended to serve as a resource document for those interested in and struggling with cross-border renewable attribute transactions. The report assesses the circumstances under which renewable generation attributes from a ''source'' region might be recognized in a ''sink'' region. The report identifies several distinct approaches that might be used to account for and verify attribute import and export transactions, and assesses the suitability of these alternative approaches. Because policymakers have often made systems ''compatibility'' between market areas a pre-requisite to allowing cross-border renewable transactions, this report develops criteria for ''compatible information systems.'' Where fully compatible information systems do not exist, certain cross-border attribute transactions may still be deemed suitably credible and verifiable to be recognized; this report also identifies possible criteria for such ''compatible transactions.'' The importance of credibly addressing imports and exports of renewable energy attributes should be evident. A lack of clarity as to what generation can and cannot be recognized in various markets can paralyze investment in and contracting for renewable generation. The development of rules for imports and exports will also minimize the potential for ''double counting'' of renewable energy attributes, will help define where and at what cost renewable plants will be built, and will directly impact the location of the benefits that renewable generation provides. This report ultimately concludes that the ''correct'' approach to treating renewable energy imports and exports depends on the context and motivations behind the transaction or the mandate, and that the presence of practical constraints or multiple objectives of ten make selecting the best approach difficult. That said, the report urges those creating market rules to move quickly in defining valid cross-border transaction structures and to consider the implications of their decisions on the creation of viable markets for new renewable generation.

  3. Information Resources | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Resources Information Resources We've organized links and information on solar energy technologies and the SunShot Initiative to make it easier for you to find what you're looking for. Solar Energy Technologies Office Newsletters Solar-focused newsletters highlight the key activities, events, funding opportunities, and publications that the SunShot Initiative supports. Solar Energy Resource Center Resources include articles, case studies, fact sheets, how-to guides, model rules and

  4. Subscription Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Subscription Information Subscription Information The DOE Office of Inspector General's (OIG) Early Alert system is a distribution list used to inform subscribers (Congress, media, Government offices/personnel, academic institutions, taxpayers, etc.) of significant OIG reports, press releases, publications, etc. the moment they are posted on the DOE OIG web site. Subscription is free and available to anyone with an e-mail address that has an interest in DOE OIG work. To subscribe/unsubscribe to

  5. Whistleblower Information | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Whistleblower Information Whistleblower Information OVERVIEW Whistleblowers play a critical role in keeping our government honest, efficient and accountable. In recognition of this role, Federal laws outline the duty of Federal employees to disclose wrongdoing, and they are to do so in an environment free from the threat of retaliation. This page, and the linked information accessible from this page, is designed to help educate DOE employees, contractors and grantees about whistleblower

  6. LA-5097-MS INFORMAL REPORT

    Office of Legacy Management (LM)

    5097-MS INFORMAL REPORT lamos lamos scientific laboratory scientific laboratory of the University of California of the University of California LOS ALAMOS. NEW MEXICO 87544 LOS ALAMOS. NEW MEXICO 87544 Los AIamos Land Areas Environmental Radiation Survey 1972 . In the interest of prompt distribution, this LAMS re port was not edited by the Technical Information staff. Printed in the United States of America. Available from National Technical Information Service U. S. Department of Commerce 5285

  7. Information Center | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Center Information Center The U.S. Department of Energy's (DOE) Office of Enterprise Assessments (EA) provides expert evaluations of management performance in safety, security and other areas by seasoned experts who are independent of line management. Information related to enforcement, safety, security, emergency management and cyber performance management is made available to the public in the EA Information Center. Enforcement Info Center The Department's Enforcement Office conducts

  8. Project Information by Key Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Technology Research Project Information Project Information by Key Technology Jump to: High Performance Materials Innovative Energy Concepts Sensors and Controls Simulation-Based Engineering Water Management R&D View Project Information by Program Area HIGH PERFORMANCE MATERIALS Agreement Number Project Title Performer Name Program Area FE0024076 Advanced Ultrasupercritical (AUSC) Tube Membrane Panel Development Alstom Power Inc. Plant Optimization Technologies FWP-AL-10-450-007 Design of

  9. Genscape Inc | Open Energy Information

    Open Energy Info (EERE)

    Zip: 40202 Product: Kentucky-based firm providing power supply information to support decision-making for energy traders, power plant and line owners and operators....

  10. ARM - Information for Guest Scientists

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PlainsInformation for Guest Scientists SGP Related Links Virtual Tour Facilities and Instruments Central Facility Boundary Facility Extended Facility Intermediate Facility...

  11. DFJ Mercury | Open Energy Information

    Open Energy Info (EERE)

    seed and early-stage venture capital firm that targets the information technology, advanced materials, and bioscience sectors. Coordinates: 29.76045, -95.369784 Show Map...

  12. General Motors | Open Energy Information

    Open Energy Info (EERE)

    Motors Jump to: navigation, search Name: General Motors Place: Detroit, MI Website: www.generalmotors.com References: General Motors1 Information About Partnership with NREL...

  13. Director, Information Technologies Services Office

    Broader source: Energy.gov [DOE]

    The mission of the Information Technologies Services Office (ITSO) is to provide effective corporate leadership to proactively identify and manage business system efficiency improvements and to...

  14. Clipper Windpower | Open Energy Information

    Open Energy Info (EERE)

    Windpower Jump to: navigation, search Name: Clipper Windpower Place: Carpinteria, CA Website: www.clipperwindpower.com References: Clipper Windpower1 Information About...

  15. Tommy Williams | Open Energy Information

    Open Energy Info (EERE)

    Tommy Williams Jump to: navigation, search Name: Tommy Williams Place: Gainesville, FL Website: www.tommywilliams.com References: Tommy Williams1 Information About Partnership...

  16. Optima Batteries | Open Energy Information

    Open Energy Info (EERE)

    Optima Batteries Jump to: navigation, search Name: Optima Batteries Place: Milwaukee, WI Website: www.optimabatteries.com References: Optima Batteries1 Information About...

  17. Geospatial Toolkit | Open Energy Information

    Open Energy Info (EERE)

    Laboratory (NREL). It integrates resource data and geographic information systems (GIS) - for integrated resource assessment. The Geospatial Toolkit (GsT) is a map-based...

  18. Schneider National | Open Energy Information

    Open Energy Info (EERE)

    National Jump to: navigation, search Name: Schneider National Place: Denver, CO Website: www.schneidernational.com References: Schneider National1 Information About Partnership...

  19. Contact Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contact Information Environment, Safety, Health & Assurance (ESH&A), G40 TASF, 294-2153 Sean Whalen ESH&A Manager, Quality Assurance Manager Safety and Security Management...

  20. Multimedia Information Retrieval Literature Review

    SciTech Connect (OSTI)

    Wong, Pak C.; Bohn, Shawn J.; Payne, Deborah A.

    2010-10-12

    This survey paper highlights some of the recent, influential work in multimedia information retrieval (MIR). MIR is a branch area of multimedia (MM). The young and fast-growing area has received strong industrial and academic support in the United States and around the world (see Section 7 for a list of major conferences and journals of the community). The term "information retrieval" may be misleading to those with different computer science or information technology backgrounds. As shown in our discussion later, it indeed includes topics from user interaction, data analytics, machine learning, feature extraction, information visualization, and more.

  1. Part 5: For Detailed Information

    Broader source: Energy.gov [DOE]

    This question and Answer Sheet is designed to provide answers to common questions regarding decommissioning under CERCLA. If you have questions or would like additional information on DOE's...

  2. Intech 21 | Open Energy Information

    Open Energy Info (EERE)

    Intech 21 Jump to: navigation, search Name: Intech 21 Place: Port Washington, NY Website: www.intech21.com References: Intech 211 Information About Partnership with NREL...

  3. Konarka Technologies | Open Energy Information

    Open Energy Info (EERE)

    Technologies Jump to: navigation, search Name: Konarka Technologies Place: Lowell, MA Website: www.konarkatechnologies.com References: Konarka Technologies1 Information About...

  4. Geothermal Resources | Open Energy Information

    Open Energy Info (EERE)

    the information needed to allow users to determine locations that are favorable to geothermal energy development. This was in response to the recommendation by the...

  5. BBI International | Open Energy Information

    Open Energy Info (EERE)

    BBI International Jump to: navigation, search Name: BBI International Place: Salida, Colorado Zip: 81201 Sector: Biofuels Product: Information service provider for the Biofuels...

  6. EBidenergy Inc | Open Energy Information

    Open Energy Info (EERE)

    Place: Rochester, New York Zip: 14623 Product: eBidenergy provides Energy Information Software and Solutions to help companies reduce energy costs. Coordinates: 43.1555,...

  7. Penn College | Open Energy Information

    Open Energy Info (EERE)

    College Jump to: navigation, search Name: Penn College Place: Williamsport, PA Website: www.penncollege.com References: Penn College1 Information About Partnership with NREL...

  8. Minerals Technologies | Open Energy Information

    Open Energy Info (EERE)

    Technologies Jump to: navigation, search Name: Minerals Technologies Place: Bethlehem, PA Website: www.mineralstechnologies.com References: Minerals Technologies1 Information...

  9. AWS Truewind | Open Energy Information

    Open Energy Info (EERE)

    con":"","group":"","inlineLabel":"","visitedicon":"" Hide Map References: AWS Truewind Web Site1 WindNavigator2 Information About Partnership with NREL Partnership with NREL...

  10. Merlin Contracting | Open Energy Information

    Open Energy Info (EERE)

    Merlin Contracting Jump to: navigation, search Name: Merlin Contracting Place: Las Vegas, NV Website: www.merlincontracting.com References: Merlin Contracting1 Information About...

  11. Taitem Engineering | Open Energy Information

    Open Energy Info (EERE)

    Taitem Engineering Jump to: navigation, search Name: Taitem Engineering Place: Ithaca, NY Information About Partnership with NREL Partnership with NREL Yes Partnership Type "CRADA"...

  12. New Ecology | Open Energy Information

    Open Energy Info (EERE)

    New Ecology Jump to: navigation, search Name: New Ecology Place: Boston, MA Website: www.newecology.com References: New Ecology1 Information About Partnership with NREL...

  13. Energy Guru | Open Energy Information

    Open Energy Info (EERE)

    Vienna, Virginia Zip: 22182 Sector: Renewable Energy Product: Washington-based renewable energy information provider. Coordinates: 48.202548, 16.368805 Show Map Loading map......

  14. Guards Information | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guards Information Plant Protection Services (PPS) is responsible identifying issues related to fire safety, industrial safety, and physical security at Ames Laboratory. Regular ...

  15. National Telecommunications and Information Administration |...

    Open Energy Info (EERE)

    related to the Internet economy, including online privacy, copyright protection, cybersecurity, and the global free flow of information online; Promoting the stability and...

  16. Scientific and Technical Information Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-14

    The Order establishes requirements and responsibilities for managing DOE's scientific and technical information. Cancels DOE O 241.1. Canceled by DOE O 241.1B.

  17. Biofuels Digest | Open Energy Information

    Open Energy Info (EERE)

    Digest Jump to: navigation, search Name: Biofuels Digest Address: 801 Brickell Avenue Suite 900 Place: Miami, Florida Zip: 33131 Sector: Services Product: Information Year Founded:...

  18. Drilling Methods | Open Energy Information

    Open Energy Info (EERE)

    Information Provided by Technique Lithology: StratigraphicStructural: Hydrological: Thermal: Dictionary.png Drilling Methods: No definition has been provided for this term....

  19. The challenge of information access

    SciTech Connect (OSTI)

    Travers, L.A.

    1990-12-31

    Traditional methods of risk communication may not work for large quantities of information. Federal databases are being created to meet the public`s right-to-know.

  20. Evolution of toxicology information systems

    SciTech Connect (OSTI)

    Wassom, J.S.; Lu, P.Y.

    1990-12-31

    Society today is faced with new health risk situations that have been brought about by recent scientific and technical advances. Federal and state governments are required to assess the many potential health risks to exposed populations from the products (chemicals) and by-products (pollutants) of these advances. Because a sound analysis of any potential health risk should be based on the use of relevant information, it behooves those individuals responsible for making the risk assessments to know where to obtain needed information. This paper reviews the origins of toxicology information systems and explores the specialized information center concept that was proposed in 1963 as a means of providing ready access to scientific and technical information. As a means of illustrating this concept, the operation of one specialized information center (the Environmental Mutagen Information Center at Oak Ridge National Laboratory) will be discussed. Insights into how toxicological information resources came into being, their design and makeup, will be of value to those seeking to acquire information for risk assessment purposes. 7 refs., 1 fig., 4 tabs.