Sample records for interest security company

  1. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    National Interest Security Company NISC Formerly Technology Management Services TMS Inc Jump to: navigation, search Name: National Interest Security Company (NISC) (Formerly...

  2. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    tech transfer officers are now seeking U.S. companies to license and commercialize the device for electronics chip cooling. Companies interested in licensing the Sandia Cooler...

  3. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  4. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  5. Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish policy, responsibilities, and authorities for the protection and control of safeguards and security interests. Cancels DOE O 5632.1B, DOE O 5632.2A, DOE O 5632.5, DOE O 5632.6, DOE O 5632.9A, DOE O 5632.11, DOE O 5635.1A, DOE O 5635.2B, DOE O 5635.3. Canceled by DOE O 473.1

  6. National Interest Security Company NISC Formerly Technology Management

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall, Pennsylvania: EnergyEnergy Information Conference ofAnalyses | Place:

  7. Farm Tractors in Kansas: How to Perfect a Security Interest

    E-Print Network [OSTI]

    Johnstun, Aaron J.; Ware, Stephen J.

    2009-01-01T23:59:59.000Z

    -2153 . . . .”); id. § 28-2153(D) (“This section does not apply to: (1) [a] farm tractor.”). 3. Arkansas. See ARK. CODE ANN. § 4-9-311(a) (West 2004) (“[T]he filing of a financing statement is not necessary or effective to perfect a security interest in property... in an area away from the traveled surface of an established open highway.”); id. § 1102(33) (“‘Vehicle’ does not include bicycles, trailers except travel trailers and rental trailers, or implements of husbandry. . . . All implements of husbandry used...

  8. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    This Technical Manual establishes requirements for operational safety controls for onsite operations and provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an Onsite Packaging and Transfer Program, pursuant to DOE O 461.1A, Packaging and Transfer or Transportation of Materials of National Security Interest. The DOE contractor must document this program in its Onsite Packaging and Transfer Manual/Procedures. Admin Chg 1, 7-26-05. Certified 2-2-07. Canceled by DOE O 461.2.

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    one of its core values. Over the last decade, the company has developed an internal road map that guides new projects toward designs that Worldwide electricity demand increases...

  10. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips

  11. The role of a security strategy is to align company security and business goals, provide

    E-Print Network [OSTI]

    Fisher, Kathleen

    , and methodologies to assist you in building a complete unified information security program or individual elements's information security program meets its requirements across the board, it is vital to have one enterprise security strategy and one information security framework. Putting in a solid foundational program

  12. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    To establish requirements and responsibilities for the Transportation Safeguards System (TSS) packaging and transportation and onsite transfer of nuclear explosives, nuclear components, Naval nuclear fuel elements, Category I and Category II special nuclear materials, special assemblies, and other materials of national security interest. Cancels: DOE 5610.12 and DOE 5610.14.

  13. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-04-26T23:59:59.000Z

    To establish requirements and responsibilities for offsite shipments of naval nuclear fuel elements, Category I and Category II special nuclear material, nuclear explosives, nuclear components, special assemblies, and other materials of national security interest. Cancels DOE O 461.1. Canceled by DOE O 461.1B and DOE O 461.2.

  14. New companies get boost from Los Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparencyDOE Project Taps HPCNew User and DataNew companies get

  15. Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-20T23:59:59.000Z

    The purpose of this Order is to make clear that the packaging and transportation of all offsite shipments of materials of national security interest for DOE must be conducted in accordance with DOT and Nuclear Regulatory Commission (NRC) regulations that would be applicable to comparable commercial shipments, except where an alternative course of action is identified in this Order. Cancels DOE O 461.1A.

  16. My RESEARCH INTERESTS concentrate on: Design and implementation of novel cyber-physical systems with an enhanced functionality, security and

    E-Print Network [OSTI]

    Reznik, Leon

    . Melton and L. Reznik GPU-Based Simulation of Spiking Neural Networks with Real-Time Performance and High with an enhanced functionality, security and reliability and built upon sensor and control network platforms and reliability to security and safety Example : Integral quality evaluation procedures in cyber-physical systems

  17. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  18. Shai Agassi's story of his evolving personal interest in energy issues, and the evolv-ing business plan of his electric vehicle company, Better Place, provides an impor-

    E-Print Network [OSTI]

    Kammen, Daniel M.

    plan of his electric vehicle company, Better Place, provides an impor- tant lens on the pace short-lived efforts at developing electric vehicles. All this can be seen, in retrospect, as a clarion electric vehicles--is notable and challenging at the same time. The benefit of pure EV technology

  19. Tighter security for electronic information

    SciTech Connect (OSTI)

    Moore, T.

    1996-11-01T23:59:59.000Z

    Responding to interest expressed by many member utilities, EPRI is launching strategic core research in information security to help companies better protect power system operations, business-sensitive and private customer data, and networks from unauthorized access or use. Although the threat of computer security breaches has been relatively low and isolated in the past and break-ins have been few, the increasing use of networks for various business activities suggests that such risks will rise. EPRI expects to work through an existing strategic alliance with the Department of Energy to tap the expertise of the national laboratories in beefing up utilities` information security systems and practices. This paper describes these potential threats and strategies to combat them.

  20. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Langerhans, Brian

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL; determining rate of spread and social network for smallpox epidemic in Abakaliki, Nigeria (1972) · Studying

  1. Researching Careers, Industries, and Companies Tracie Thomas

    E-Print Network [OSTI]

    Shull, Kenneth R.

    /Industry ­ Increased certainty when selecting an internship ­ Demonstrates a sincere interest in working this internship?" "I have always been interested in working in Finance, and Ford Motor Company is a well-know company" OR " I am very interested in working for a top-3 automaker in the US especially since Ford

  2. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  3. Patent Litigation for High Technology and Life Sciences Companies

    E-Print Network [OSTI]

    Shamos, Michael I.

    Patent Litigation for High Technology and Life Sciences Companies #12;© 2005 Fenwick & West LLP Corporate (emerging growth, financings, securities, mergers & acquisitions) n Intellectual Property (patent, copyright, licensing, trademark) n Litigation (patent and other IP, securities, antitrust, employment

  4. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Sidiropoulos, Nikolaos D.

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94ALT i For example: #12;Semantic Graphs · Different types of edges · Attribute or relationship labels type of edge. DEDICOM PARAFAC Multilinear algebra Adjacency matrix Adjacency tensor #12;Using Tensors

  5. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  6. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  7. ESCO EXPRESSION OF INTEREST IN NOTICE OF OPPORTUNITY | Department...

    Broader source: Energy.gov (indexed) [DOE]

    essionofinterestform.docx More Documents & Publications LETTER TO SUCCESSFUL COMPANY OR ESCO ESCO EXPRESSION OF INTEREST EVALUATION WORKSHEET ESPC ENABLE PRELIMINARY LETTER TO...

  8. Investment companies

    E-Print Network [OSTI]

    Sauer, Edward F

    1961-01-01T23:59:59.000Z

    stockholder challenged the management fee paid to F. Eberstadt & Co. , Inc. , manager and distributor of Chemical Fund. The court dismissed the case on the grounds that excessive fees had not been proved. This case, however, could hardly be considered a... Tax-Exempt Bond Funds. . . . . . . . Daily Pricing of Mutual Investment Company Shares. 56 57 59 59 60 iv Management Fees. . . . . Tax-Free Exchange Funds . 61 62 V. CONCLUSIONS 63 BIBLIOGRAPHY GLOSSARY OF TERMS Balanced fund...

  9. Obama's Call for Public-Private Cyber Security Collaboration...

    Office of Environmental Management (EM)

    companies, equipment vendors, and government agencies to create a Control Systems Roadmap to secure the sector's computer control systems against cyber attack. As a result of...

  10. Sandia National Laboratories: Public Service Company of New Mexico

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public Service Company of New Mexico Electric Car Challenge Sparks Students' STEM Interest On January 9, 2015, in Energy, Energy Storage, News, News & Events, Partnership,...

  11. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  12. The Interest Rate Conundrum

    E-Print Network [OSTI]

    Craine, Roger; Martin, Vance L.

    2009-01-01T23:59:59.000Z

    Flows and US Interest Rates,” NBER Working Paper No 12560. [Working Paper # 2008 -03 The Interest Rate Conundrum Roger

  13. Grid Reliability- An Electric Utility Company's Perspective

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

  14. Alabama successes spur interest in eastern Gulf

    SciTech Connect (OSTI)

    Redden, J.

    1985-11-01T23:59:59.000Z

    The shallow waters of the eastern fringe of the Gulf of Mexico are becoming a world-class offshore gas play. Spurred by the success ratio offshore Alabama, the water off Mississippi and Florida are drawing intense interest as oil companies attempt to extend the prolific Norphlet formation. Sitting at the heart of the recent interest in the eastern Gulf are the state and federal waters off Alabama. Exploration and drilling activity in the area are discussed.

  15. Competitor Analysis Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    chemical company providing the household and industrial detergent, personal care, lubricant, oilfield

  16. Privatizing Public Interest Law

    E-Print Network [OSTI]

    Cummings, Scott L

    2011-01-01T23:59:59.000Z

    graduation, she received a public interest law foundation grant to work in the consumer rights project

  17. Consumer Products Companies Company Website Headquarters

    E-Print Network [OSTI]

    McGaughey, Alan

    . www.coach.com New York, NY Coca-Cola Company www.thecoca-colacompany.com Atlanta, GA Cole & Ashcroft L

  18. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  19. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Energy Savers [EERE]

    include the various files created by the Department to control and protect safeguards and security interests (e.g., classified information, sensitive unclassified information,...

  20. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  1. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  2. Letter of Interest Example

    Broader source: Energy.gov [DOE]

    Sample letter of interest describes the FEMP Call for Technical Services for American Recovery and Reinvestment Act funds.

  3. Gas Companies Program (Tennessee)

    Broader source: Energy.gov [DOE]

    The Gas Companies program is a set of rules that encourage the development of the natural gas industry in Tennessee. They empower gas companies to lay piped and extend conductors through the...

  4. Constructivist Approach To Information Security Awareness In The Middle East

    E-Print Network [OSTI]

    Wang, Yongge

    Constructivist Approach To Information Security Awareness In The Middle East Mohammed Boujettif the application of an approach to en- hance information security awareness amongst employees within middle- eastern companies, in effort to improve information security. We aim at surveying the current attitudes

  5. Market Research Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    development - Market research for enterprise and education adoption - Plan and execute a company-wide pingMarket Research Company Description: A company focused on developing web-based graphical and future products and then develop the necessary strategies and collateral to stay on the bleeding edge

  6. Business model transformation for the international division of a fortune 100 high technology company

    E-Print Network [OSTI]

    Mokhtari Dizaji, Reza, 1968-

    2008-01-01T23:59:59.000Z

    Raytheon Canada in Waterloo, Ontario offers a very interesting but challenging research case. As one of the international divisions of Raytheon Corporation, the company has a business model similar to its parent company. ...

  7. Interesting points from presentations

    E-Print Network [OSTI]

    Toohey, Darin W.

    · Hydraulic fracturing (Fracking) · Lightning and NOx Emissions of sulfur and formation of aerosols and acid and crop (or drug) control · Fracking · The Japan nuclear reactor disaster (transport of aerosols for cleaner combustion #12;Hydraulic fracturing ("Fracking") Many unknowns ­ companies don't have to disclose

  8. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  9. Web points of interest

    E-Print Network [OSTI]

    Web points of interest ... JUGGLING CLUB; The Lafayette Citizens Band Home Page; Harold Boas' incredible list of math and life resources on the WEB.

  10. Security in 3rd Generation Mobile Networks

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    Security in 3rd Generation Mobile Networks Christos Xenakis and Lazaros Merakos Communication In the last few years, we have witnessed an explosion in demand for security measures motivated stakeholders are interested in the security level supported in the new emerging mobile environment. This paper

  11. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  12. QER- Comment of Southern Company

    Broader source: Energy.gov [DOE]

    Southern Company Services, Inc., as agent for Alabama Power Company, Georgia Power Company, Gulf Power Company, and Mississippi Power Company, (collectively, “Southern Companies”), are pleased to hereby provide their comments to the Department of Energy as it prepares the Quadrennial Energy Review. If there is anything else that we can do in this regard, please feel free to contact us.

  13. Faculty of MANAGEMENT Alberta Oil & Gas Company1

    E-Print Network [OSTI]

    Nakayama, Marvin K.

    Faculty of MANAGEMENT Alberta Oil & Gas Company1 Daphne Jackson, operations manager for Alberta Oil & Gas Company (AOGC) hangs up the phone in her home. Her boss, Will Russell, has phoned from Calgary's interest in the Waptaman oil field. Ordinarily, Will would lead such negotiations himself, but he has been

  14. Capital Reporting Company Quadrennial ...

    Office of Environmental Management (EM)

    3 05-27-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW STAKEHOLDER MEETING 3 PETROLEUM TRANSMISSION, STORAGE AND DISTRIBUTION ISSUES...

  15. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 UNITED STATES DEPARTMENT OF ENERGY OFFICE OF ENERGY POLICY AND SYSTEMS ANALYSIS QUADRENNIAL ENERGY REVIEW STAKEHOLDER...

  16. Capital Reporting Company Quadrennial ...

    Broader source: Energy.gov (indexed) [DOE]

    - DEPO www.CapitalReportingCompany.com 2014 1 UNITED STATE OF AMERICA DEPARTMENT OF ENERGY ---: : IN RE: : : QUADRENNIAL ENERGY REVIEW : : NEW...

  17. Energy Service Companies

    Broader source: Energy.gov [DOE]

    Energy service companies (ESCOs) develop, design, build, and fund projects that save energy, reduce energy costs, decrease operations and maintenance costs at their customers' facilities.

  18. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of on-site security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE O 5630.7 and DOE O 5634.1. Canceled by DOE 5634.1B.

  19. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-15T23:59:59.000Z

    To establish Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of insite security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE 5634.1A. Canceled by DOE O 470.1 dated 9-28-95.

  20. Thin slices of interest

    E-Print Network [OSTI]

    Madan, Anmol P. (Anmol Prem Prakash)

    2005-01-01T23:59:59.000Z

    In this thesis we describe an automatic human interest detector that uses speech, physiology, body movement, location and proximity information. The speech features, consisting of activity, stress, empathy and engagement ...

  1. Marketing Plan Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    productivity without the jitters/crash of normal energy drinks and shots. Short Project Name: Internet groups would generate the most profit? How can we cross-market/up-sell to our email database and 20K the model) Company Description: We are a rapidly growing, subscription-based, finance and technology company

  2. Public Service Companies, General Provisions (Virginia)

    Broader source: Energy.gov [DOE]

    Public Service Companies includes gas, pipeline, electric light, heat, power and water supply companies, sewer companies, telephone companies, and all persons authorized to transport passengers or...

  3. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. A Cooperative Cyber Defense for Securing Critical Infrastructures

    E-Print Network [OSTI]

    Fulp, Errin W.

    .g., the numerous private companies that make up North America's electrical power grids) that share computationalA Cooperative Cyber Defense for Securing Critical Infrastructures Glenn A. Fink glenn networked relationships. At electrical substations, it is common to find equipment from several companies

  6. MACHINE AND FOUNDRY COMPANY

    Office of Legacy Management (LM)

    MACHINE AND FOUNDRY COMPANY kt '- : :' ENGINEERING DIVISIOJ ---. Cl FIELD iRIP ,REP@?T ,' i;:z;zy MEETING REPORT : .I.-.-' Y ::,:I :. &, .I7 ENGINEERING REPORT- : T, ...

  7. Capital Reporting Company Quadrennial ...

    Energy Savers [EERE]

    11-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW PUBLIC MEETING 10: Infrastructure Constraints Monday, August 11, 2014 New Mexico State...

  8. Capital Reporting Company Quadrennial ...

    Office of Environmental Management (EM)

    07-21-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 QUADRENNIAL ENERGY REVIEW PUBLIC MEETING 6 MONDAY, JULY 21, 2014 HELD AT: RASHID AUDITORIUM-HILLMAN CENTER...

  9. Capital Reporting Company Quadrenntial ...

    Broader source: Energy.gov (indexed) [DOE]

    Quadrenntial Energy Review 04-21-2014 (866) 448 - DEPO www.CapitalReportingCompany.com 2014 1 NEW ENGLAND REGIONAL INFRASTRUCTURE CONSTRAINTS A Public Meeting on the Quadrennial...

  10. Case study on accounting fraud of U.S.-listed Chinese companies

    E-Print Network [OSTI]

    An, Tingting

    2014-01-01T23:59:59.000Z

    During the period from 2009 to 2013, 76 out of 848 U.S. federal securities class action litigations were against Chinese companies listed in U.S. markets. The U.S. Securities and Exchange Commission (SEC) has also initiated ...

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    develop more reliable PV technology. Researchers and integrators are working to reduce solar photovoltaic (PV) Levelized Cost of Energy (LCOE) to achieve PV power generation cost...

  12. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    The purpose of this Technical Manual is to establish requirements for operational safety controls for onsite operations. This Technical Manual provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an onsite packaging and transfer program, pursuant to DOE O 461.1; the DOE contractor must document this program in its onsite packaging and transfer manual/procedures. Does not cancel other directives.

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE SunShot Initiative. SunShot is a collaborative national initiative to make solar energy cost competitive with other energy generation by 2020. Reducing the installed cost of...

  14. The Inverse Problem for Derivative Securities of Interest Rate

    E-Print Network [OSTI]

    2008-02-02T23:59:59.000Z

    May 26, 2000 ... consider the valuation of zero-coupon bond, which is sold in ... quantities can be determined by statistics and the least square method from the.

  15. Manual for Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-04-10T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 5632.1C, which establishes policy for the protection and control of special nuclear material, Vital Equipment, classified matter, Departmental property and facilities, and unclassifed irradiated reactor fuel in transit. Chapter XI canceled by DOE O 470.1. Chapter III, paragraphs 1, 2, and 4 through 9 canceled by DOE O 471.2. DOE M 473.1-1 cancels the rest of this directive.

  16. Onsite Packaging and Transfer of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-11-01T23:59:59.000Z

    The order prescribes requirements and responsibilities for identifying and mitigating undue risk of onsite transfers that are non compliant with U.S. Department of Transportation and Nuclear Regulatory Commission regulations. Cancels DOE O 461.1A and DOE M 461.1-1, Admin Chg 1.

  17. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    devices. DEMAND RESPONSE INVERTER Sandia's Demand Response Inverter (DRI) is a multi-port power flow control system that increases renewable energy throughput, mitigates renewable...

  18. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    technical guidance to Beacon Power as part of a DOE project to design a large-scale flywheel- based frequency regulation power plant (shown above). The 1 MW Energy Storage Test...

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    used air instead of S-CO2. Germany built a number of these power plants, often with waste heat used to heat homes in town (cogeneration). * Sandia National Labs first produced...

  20. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto enhance

  1. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto enhance502P

  2. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P GaN for

  4. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P GaN

  5. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P GaN552P

  6. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P

  7. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P787P

  8. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we haveto741P787PThe

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years we

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion (Li-ion)

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion

  12. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion4435P

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion4435P2P

  14. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion4435P2P1P

  15. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years weLithium-ion4435P2P1P0P

  16. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many years

  17. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many yearsSandia is a nationally

  18. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many yearsSandia is a

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many yearsSandia is aConsistent and

  20. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many yearsSandia is aConsistent

  1. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) EnvironmentalGyroSolé(tm)HydrogenRFPTri-PartyFor many yearsSandia is aConsistentThe

  2. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P Quantifying the

  4. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P Quantifying the5759P

  5. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P Quantifying

  6. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P Quantifying1846P

  7. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P

  8. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P Modeling

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P ModelingP

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P ModelingPTo

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P ModelingPToP

  12. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P ModelingPToPA

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P

  14. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P0987P

  15. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P0987P1846P

  16. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link toInfluenceInfrared2270P7909P0987P1846P0987P

  17. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News link

  18. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News linkThermal Phenomena in Nuclear Energy Fire is a

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News linkThermal Phenomena in Nuclear Energy Fire is

  20. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News linkThermal Phenomena in Nuclear Energy Fire

  1. January through June 2010 Microsoft | Security Intelligence Report

    E-Print Network [OSTI]

    Bernstein, Phil

    /IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners Gullotto Microsoft Malware Protection Center Paul Henry Wadeware LLC Jeannette Jarvis CSS Security Jeff ISD Mark Miller Microsoft Trustworthy Computing Price Oden Microsoft IT Information Security and Risk

  2. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  3. Upgraded Coal Interest Group

    SciTech Connect (OSTI)

    Evan Hughes

    2009-01-08T23:59:59.000Z

    The Upgraded Coal Interest Group (UCIG) is an EPRI 'users group' that focuses on clean, low-cost options for coal-based power generation. The UCIG covers topics that involve (1) pre-combustion processes, (2) co-firing systems and fuels, and (3) reburn using coal-derived or biomass-derived fuels. The UCIG mission is to preserve and expand the economic use of coal for energy. By reducing the fuel costs and environmental impacts of coal-fired power generation, existing units become more cost effective and thus new units utilizing advanced combustion technologies are more likely to be coal-fired.

  4. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  5. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  6. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  7. Evolving Secure Computer Infrastructures Computer Science Department

    E-Print Network [OSTI]

    Fulp, Errin W.

    , . . . Security research has been network oriented High-speed firewall company, GreatWall Systems Research is more, quarrying, and oil and gas extraction Petroleum and coal products manufacturing Mining Furniture related to bio-inspiration published in 2012. Of the top 10 universities, 5 were Chinese and 2 were

  8. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  9. Company Level Imports Archives

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122 40Coal Stocks at CommercialDecadeReservesYear21Company Level Imports Company Level

  10. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  12. Secure coprocessing applications and research issues

    SciTech Connect (OSTI)

    Smith, S.W.

    1996-08-01T23:59:59.000Z

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  14. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  15. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  16. Hiring Company: Chevron Oronite Technology Group, a Chevron Company

    E-Print Network [OSTI]

    Southern California, University of

    additives for fuels and lubricating oils. We are a Global company and a subsidiary of Chevron Corporation

  17. Security in Wireless Data Networks: A Survey Paper

    E-Print Network [OSTI]

    Jain, Raj

    Security in Wireless Data Networks: A Survey Paper Abdel-Karim R. Al Tamimi abdelkarim.tamimi@gmail.com Abstract Both security and wireless communication will remain an interesting subject for years to come jeopardizing the communicated content. This paper illustrates the key concepts of security, wireless networks

  18. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  19. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  20. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  1. No Company Is An Island

    E-Print Network [OSTI]

    Maddox, A.

    No company is an island. Utilities and their industrial customers are discovering that collaboration can breed opportunity while isolation can lead to ruin. Inter company relationships have changed over recent years and HL&P and its customers...

  2. Benham Companies ESCO Qualification Sheet

    Broader source: Energy.gov [DOE]

    Document outlines the energy service company (ESCO) qualifications for Leidos Engineering (part of Benham Companies) in relation to the U.S. Department of Energy's (DOE) energy savings performance contracts (ESPC).

  3. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  6. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  7. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  8. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  9. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  10. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01T23:59:59.000Z

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. PIA - Access Security Plan, Bechtel Jacobs Company LLC | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732onMake YourDepartmentChartForums OutreachAMWTP

  15. Regional companies eye growth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements Recently Approved JustificationBio-Inspired PowerRegional companies eye

  16. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  17. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    Photovoltaics Spain S L REPS Renewable Energies and Photovoltaics Spain S L REPS Spain Solar Spanish solar project developer The firm is a subsidiary of Norwegian energy company...

  18. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    significantly better heating efficiency than conventional coiled wire elements A O Smith A O Smith Wisconsin Efficiency Solar Wisconsin based based company that makes both...

  19. Gas supplies of interstate/natural gas pipeline companies 1989

    SciTech Connect (OSTI)

    Not Available

    1990-12-18T23:59:59.000Z

    This publication provides information on the interstate pipeline companies' supply of natural gas during calendar year 1989, for use by the FERC for regulatory purposes. It also provides information to other Government agencies, the natural gas industry, as well as policy makers, analysts, and consumers interested in current levels of interstate supplies of natural gas and trends over recent years. 5 figs., 18 tabs.

  20. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  1. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  2. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  3. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  4. Career Interest | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    of oneself. As you begin to plan for your career, this Learning Module introduces five free career interest assessmentsurveys. To return back to the Leadership Development...

  5. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  6. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  7. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  8. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  9. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  10. Kansas Certified Development Companies (Kansas)

    Broader source: Energy.gov [DOE]

    Kansas Certified Development Companies (CDC) assist businesses by developing loan packages that meet the financial need of a project. These packages often contain multiple sources of project...

  11. Regulations For Gas Companies (Tennessee)

    Broader source: Energy.gov [DOE]

    The Regulations for Gas Companies, implemented by the Tennessee Regulatory Authority (Authority) outline the standards for metering, distribution and electricity generation for utilities using gas....

  12. National Security Technology Incubator Evaluation Process

    SciTech Connect (OSTI)

    None

    2007-12-31T23:59:59.000Z

    This report describes the process by which the National Security Technology Incubator (NSTI) will be evaluated. The technology incubator is being developed as part of the National Security Preparedness Project (NSPP), funded by a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of the components, steps, and measures of the proposed evaluation process. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. The NSTI will focus on serving businesses with national security technology applications by nurturing them through critical stages of early development. An effective evaluation process of the NSTI is an important step as it can provide qualitative and quantitative information on incubator performance over a given period. The vision of the NSTI is to be a successful incubator of technologies and private enterprise that assist the NNSA in meeting new challenges in national safety and security. The mission of the NSTI is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. To achieve success for both incubator businesses and the NSTI program, an evaluation process is essential to effectively measure results and implement corrective processes in the incubation design if needed. The evaluation process design will collect and analyze qualitative and quantitative data through performance evaluation system.

  13. ESCO EXPRESSION OF INTEREST EVALUATION WORKSHEET

    Broader source: Energy.gov [DOE]

    Document provides a worksheet to help Federal agencies evaluate energy service companies (ESCOs) that respond to Notices of Opportunity (NOO).

  14. Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl

    E-Print Network [OSTI]

    process life cycle. I. INTRODUCTION In many domains companies model and optimize their busi- ness process management (BPM) aims at efficiently creating business value there is a number of threats are continously increasing their resources to protect their business processes against security threats. Companies

  15. Interested Parties - Siemens | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    GCHarrisSiemens.PDF More Documents & Publications Interested Parties - Myriant Interested Parties - Patrick Murphy...

  16. Aditya A. Shah Deere & Company,

    E-Print Network [OSTI]

    Aditya A. Shah Deere & Company, Dubuque, IA 52001 e-mail: shahadityaa@johndeere.com Christiaan J. J 30332 e-mail: chris.paredis@me.gatech.edu Roger Burkhart Deere & Company, Moline, IL 61265 e it to an example of a hydraulic log splitter. Based on this initial example, we discuss two advantages

  17. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  18. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  19. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  20. Arbitrage With Fixed Costs" and Interest Rate Models Elys JOUINI Clotilde NAPPy

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Arbitrage With Fixed Costs" and Interest Rate Models Elyčs JOUINI Clotilde NAPPy June 26, 2007 Congress participants and in particular D. Feldman. 1 #12;Arbitrage With "Fixed Costs" and Interest Rate Models Abstract In this paper, we study securities market models with "...xed costs." We characterize

  1. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  2. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  3. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  4. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  5. A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid Mustafa El--In a smart grid environment some customers employ third-party meters and terminals for integrity verification of the smart meter power measurements reported by the electric utility company. We address the security issues

  6. Exceptional service in the national interest www.sandia.gov

    E-Print Network [OSTI]

    Security Strategic Management Unit (SMU). This SMU is responsible for Sandia's homeland security programs

  7. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  8. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  9. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  10. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  11. National Security Technology Incubation Strategic Plan

    SciTech Connect (OSTI)

    None

    2007-01-01T23:59:59.000Z

    This strategic plan contains information on the vision, mission, business and technology environment, goals, objectives, and incubation process of the National Security Technology Incubation Program (NSTI) at Arrowhead Center. The development of the NSTI is a key goal of the National Security Preparedness Project (NSPP). Objectives to achieve this goal include developing incubator plans (strategic, business, action, and operations), creating an incubator environment, creating a support and mentor network for companies in the incubator program, attracting security technology businesses to the region, encouraging existing business to expand, initiating business start-ups, evaluating products and processes of the incubator program, and achieving sustainability of the incubator program. With the events of 9/11, the global community faces ever increasing and emerging threats from hostile groups determined to rule by terror. According to the National Nuclear Security Administration (NNSA) Strategic Plan, the United States must be able to quickly respond and adapt to unanticipated situations as they relate to protection of our homeland and national security. Technology plays a key role in a strong national security position, and the private business community, along with the national laboratories, academia, defense and homeland security organizations, provide this technology. Fostering innovative ideas, translated into relevant technologies answering the needs of NNSA, is the purpose of the NSTI. Arrowhead Center of New Mexico State University is the operator and manager of the NSTI. To develop the NSTI, Arrowhead Center must meet the planning, development, execution, evaluation, and sustainability activities for the program and identify and incubate new technologies to assist the NNSA in meeting its mission and goals. Technology alone does not give a competitive advantage to the country, but the creativity and speed with which it is employed does. For a company to succeed, it must have sustainable competitive advantages in seven key areas: geography, products and businesses, distribution, sales and service culture, efficiency, brand, and most important, people. The four strategic goals of the plan are to: 1. Identify and recruit small businesses with technology applications for national security. 2. Design and implement a national security incubator program that provides incubator services and physical space for the targeted businesses. 3. Provide business assistance and technical leadership to NSTI clients to assist in bringing their products to market. 4. Construct a new multi-tenant facility with dedicated physical space for businesses with technology applications for national security.

  12. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    HF ReEnergy has focused its most recent efforts on the desire to create grid quality electricity from landfill waste The company also plans to focus on making existing coal plants...

  13. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  14. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  15. A variety of opportunities exist for geology graduates in the private and public sectors and in education. Petroleum companies, petroleum service companies, mining companies,

    E-Print Network [OSTI]

    and in education. Petroleum companies, petroleum service companies, mining companies, power companies, computer software companies, and entrepreneurs hire geologists for exploration, development, mining, production, hydrologist, mining geologist, oceanographer, production geologist, researcher, resource evaluator

  16. A variety of opportunities exist for geology graduates in the private and public sectors and in education. Petroleum companies, petroleum service companies, mining companies,

    E-Print Network [OSTI]

    and in education. Petroleum companies, petroleum service companies, mining companies, power companies, computer software companies, and entrepreneurs hire geologists for exploration, development, mining, production geologist, geologist, geophysicist, hydrologist, mining geologist, oceanographer, production geologist

  17. Interested Parties - Multiple Loan Applications per Developer...

    Energy Savers [EERE]

    Documents & Publications Interested Parties - Allowing Multiple Projects per Application for Section 1705 Loan Guarantees Interested Parties - K&L Group Interested Parties - Shipp...

  18. Communications from Interested Parties | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    September 14, 2010 Interested Parties - Xtreme Power September 3, 2010 Interested Parties - Smith Dawson & Andrews August 10, 2010 Interested Parties - MEMA previous 1 2 3 4 5 next...

  19. Interested Parties - NNSA | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    NNSA Interested Parties - NNSA 06-03-10NNSA.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy...

  20. Interests Diffusion in Social Networks

    E-Print Network [OSTI]

    D'Agostino, Gregorio; De Nicola, Antonio; Tucci, Salvatore

    2015-01-01T23:59:59.000Z

    Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a p...

  1. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    E-Print Network [OSTI]

    Minnesota, University of

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher Yongdae Kim are witnessing a revival of Storage Service Providers (SSP) in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are hesitating to outsource

  2. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  3. New Business Opportunity Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    report and analysis Company Description: A billion dollar, middle market private equity firm. We just trading and transaction comps from relevant databases. Assist in valuing new deals and marking to market organization of radiant heating

  4. energy company opens American branch

    E-Print Network [OSTI]

    Lin, C.-Y. Cynthia

    in clean-energy investment and delivering unique projects and innovative products and servicesenergy company opens American branch in West Sacramento Substainible energy for sustainable energy supply. Ecostream markets such things as solar roof panel installations and other long

  5. How companies can leverage crowdsourcing

    E-Print Network [OSTI]

    Cheung, Sunny

    2012-01-01T23:59:59.000Z

    Crowdsourcing is an increasingly popular phenomenon where companies solicit the help of the public in helping accomplish some of the activities commonly performed by employees or contractors. These activities can range ...

  6. The valuation of construction companies

    E-Print Network [OSTI]

    Sassine, Edmond, 1980-

    2004-01-01T23:59:59.000Z

    The main objective of this thesis is to study the valuation of construction companies in mergers and acquisitions. The thesis is divided into three main parts; Mergers and Acquisitions, Valuation, and a Case Study. Mergers ...

  7. Deere & Company Energy Management Program 

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01T23:59:59.000Z

    An overview of the Deere & Company Energy Management Program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  8. Secure Voice over IP conferencing with decentralized group encryption

    E-Print Network [OSTI]

    Kannan, Steven (Steven K.)

    2007-01-01T23:59:59.000Z

    This thesis addresses the development of an end-to-end secure Voice over IP (VoIP) conference system. We are particularly interested in challenges associated with deploying such a system in ad-hoc networks containing low ...

  9. Research Interest of Dilip Sarkar

    E-Print Network [OSTI]

    Sarkar, Dilip

    anywhere anytime. While traveling on vehicle we connect to the Internet using one or more of theses is to develop a group of autonomous mobile agents each with its own set of wireless sensors. These mobile agents at UM have fueled my interest. My goal is to develop parallel algorithms for bioinformatics problems

  10. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  11. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  12. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  13. An ounce of prevention vs. a pound of cure: How can we measure the value of IT security solutions?

    SciTech Connect (OSTI)

    Arora, Ashish; Hall, Dennis; Pinto, C. Ariel; Ramsey, Dwayne; Telang, Rahul

    2004-01-12T23:59:59.000Z

    This article discusses a framework to evaluate the costs and benefits of IT security solutions using a company's risk profile. This method uses an unconventional concept of benefit based on risk avoided rather than increased productivity.

  14. Interested Parties - Pittsburgh Green Innovators | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Attachment to Registered Lobbyist Disclosure Form: R More Documents & Publications Interested Parties - Andrew Lundquist Interested Parties - National Governors Association...

  15. Eastern Kodak Company

    SciTech Connect (OSTI)

    Y.S. Tyan

    2009-06-30T23:59:59.000Z

    Lighting consumes more than 20% of electricity generated in the United States. Solid state lighting relies upon either inorganic or organic light-emitting diodes (OLEDs). OLED devices because of their thinness, fast response, excellent color, and efficiency could become the technology of choice for future lighting applications, provided progress is made to increase power efficiency and device lifetime and to develop cost-effective manufacturing processes. As a first step in this process, Eastman Kodak Company has demonstrated an OLED device architecture having an efficacy over 50 lm/W that exceeds the specifications of DOE Energy Star Program Requirements for Solid State Lighting. The project included work designed to optimize an OLED device, based on a stacked-OLED structure, with performance parameters of: low voltage; improved light extraction efficiency; improved internal quantum efficiency; and acceptable lifetime. The stated goal for the end of the project was delivery of an OLED device architecture, suitable for development into successful commercial products, having over 50 lum/W power efficiency and 10,000 hours lifetime at 1000 cd/m{sup 2}. During the project, Kodak developed and tested a tandem hybrid IES device made with a fluorescent blue emitter, a phosphorescent yellow emitter, and a phosphorescent red emitter in a stacked structure. The challenge was to find low voltage materials that do not absorb excessive amounts of emitted light when the extraction enhancement structure is applied. Because an extraction enhancement structure forces the emitted light to travel several times through the OLED layers before it is emitted, it exacerbates the absorption loss. A variety of ETL and HTL materials was investigated for application in the low voltage SSL device structure. Several of the materials were found to successfully yield low operating device voltages without incurring excessive absorption loss when the extraction enhancement structure was applied. An internal extraction layer comprises two essential components: a light extraction element (LEE) that does the actual extraction of emitted light and a light coupling layer (LCL) that allows the emitted light to interact with the extraction element. Modeling results show that the optical index of the LCL needs to be high, preferably higher than that of the organic layers with an n value of {approx}1.8. In addition, since the OLED structure needs to be built on top of it the LCL needs to be physically and chemically benign. As the project concluded, our focus was on the tandem hybrid device, which proved to be the more efficient architecture. Cost-efficient device fabrication will provide the next challenges with this device architecture in order to allow this architecture to be commercialized.

  16. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  17. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  18. they have attracted interest from industry. Indeed, one company, SupraPolix, produces

    E-Print Network [OSTI]

    Keeling, Patrick

    , Cordier et al. have applied supramolecular chemistry to create a material that can heal at room supramolecular polymers with the ability to self-heal, although temperatures of 140 °C must be used. Now, however toobtainspecificmechanicalpropertiesinnew self-healing materials. Cordier and colleagues' starting ingredients are fatty acids from vegeta

  19. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  20. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  1. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  2. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  3. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  4. Natural gas annual 1993 supplement: Company profiles

    SciTech Connect (OSTI)

    Not Available

    1995-02-01T23:59:59.000Z

    The Natural Gas Annual provides information on the supply and disposition of natural gas to a wide audience including industry, consumers, Federal and State agencies, and educational institutions. This report, the Natural Gas Annual 1993 Supplement: Company Profiles, presents a detailed profile of 45 selected companies in the natural gas industry. The purpose of this report is to show the movement of natural gas through the various States served by the companies profiled. The companies in this report are interstate pipeline companies or local distribution companies (LDC`s). Interstate pipeline companies acquire gas supplies from company owned production, purchases from producers, and receipts for transportation for account of others. Pipeline systems, service area maps, company supply and disposition data are presented.

  5. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  6. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  7. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  8. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  9. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  10. Oil and Gas Company Oil and Gas Company Address Place Zip Website

    Open Energy Info (EERE)

    Dhahran Saudi Arabia http www saudiaramco com en home html Saudi Aramco Mobile Refinery Company SAMREF Saudi Aramco Mobile Refinery Company SAMREF P O Box Yanbu S audi...

  11. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  12. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  13. Reed-Joseph International Company

    E-Print Network [OSTI]

    is offering field downloadable GPS/VHF logging collars and Solar Powered GPS/VHF backpack loggers for birds of battery powered and solar powered PTTs in a wide range of sizes, exclusively for birds. We will startReed-Joseph International Company 55 YEARS OF EXCELLENCE IN BIRD AND WILDLIFE CONTROL THE U

  14. IBM Software Lincoln Trust Company

    E-Print Network [OSTI]

    into account several "lessons learned" from the company's past pre-divestiture past. A process improve- ment team had existed several years prior, but was decommissioned due to lack of meaningful automation, there were also lessons from the past that needed to be integrated into the new program. Prior attempts

  15. Energy Management at Deere & Company 

    E-Print Network [OSTI]

    Boyd, M. P.

    1979-01-01T23:59:59.000Z

    Deere & Company appreciates the opportunity to discuss energy management and conservation with you. Energy is a topic that will occupy our thoughts for many years to come and certainly will be in the forefront in the near future. It is a subject...

  16. Communications from Interested Parties | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    - ARPA-E National Association of Manufacturers November 6, 2009 Interested Parties - Siemens October 29, 2009 Interested Parties - Multiple Loan Applications per Developer under...

  17. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  18. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  19. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  20. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  1. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  2. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  3. Natural gas annual 1992: Supplement: Company profiles

    SciTech Connect (OSTI)

    Not Available

    1994-01-01T23:59:59.000Z

    The data for the Natural Gas Annual 1991 Supplement : Company Profiles are taken from Form EIA-176, (open quotes) Annual Report of Natural and Supplemental Gas Supply and Disposition (close quotes). Other sources include industry literature and corporate annual reports to shareholders. The companies appearing in this report are major interstate natural gas pipeline companies, large distribution companies, or combination companies with both pipeline and distribution operations. The report contains profiles of 45 corporate families. The profiles describe briefly each company, where it operates, and any important issues that the company faces. The purpose of this report is to show the movement of natural gas through the various States served by the 45 large companies profiled.

  4. Designing for cost In an aerospace company

    E-Print Network [OSTI]

    Hammar, Elizabeth (Elizabeth Deming)

    2014-01-01T23:59:59.000Z

    Companies take different approaches, and achieve different degrees of implementation, in designing products for cost. This thesis discusses Target Costing and its application at The Boeing Company. Target Costing is a ...

  5. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  6. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Broader source: Energy.gov (indexed) [DOE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  7. LETTER TO SUCCESSFUL COMPANY OR ESCO | Department of Energy

    Office of Environmental Management (EM)

    SUCCESSFUL COMPANY OR ESCO LETTER TO SUCCESSFUL COMPANY OR ESCO Document features a letter template and sample to help Federal agencies inform an energy services company (ESCO)...

  8. LETTER TO UNSUCCESSFUL COMPANY OR ESCO | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    UNSUCCESSFUL COMPANY OR ESCO LETTER TO UNSUCCESSFUL COMPANY OR ESCO Document features a letter template and sample to help Federal agencies inform energy service companies (ESCOs)...

  9. Nevada Geothermal Power Company, Inc. (Blue Mountain) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nevada Geothermal Power Company, Inc. (Blue Mountain) Nevada Geothermal Power Company, Inc. (Blue Mountain) Nevada Geothermal Power Company, Inc. (Blue Mountain) Nevada Geothermal...

  10. Energy Audit Helps Small Company Stay Competitive

    Broader source: Energy.gov [DOE]

    The recommended improvements are saving the West Linn Paper Company in Oregon an annual cost of about $380,000.

  11. UNDERSTANDING OUR COMPANY AN IBM PROSPECTUS

    E-Print Network [OSTI]

    a company or planned venture so that individuals can make informed decisions. Fully understanding the future lay in consolidation, and chose to bulk up. And then some companies just concluded that their core confidence in IBM's future. We have done much in recent years to transform our company. In a number

  12. ENERGY SERVICES COMPANIES SUMMARY OF RESPONSES

    E-Print Network [OSTI]

    a survey of the Energy Services Companies doing business in California. An Energy Services Company (ESCO. In addition, an ESCO frequently guarantees that the project's energy cost savings will be adequate to payCALIFORNIA ENERGY COMMISSION SUMMARY OF ENERGY SERVICES COMPANIES SUMMARY OF RESPONSES STAFFREPORT

  13. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  14. ESPC ENABLE Energy Service Companies

    Broader source: Energy.gov [DOE]

    Energy Savings Performance Contract (ESPC) ENABLE projects use General Services Administration (GSA) Federal Supply Schedule 84, SIN 246-53 to select a qualified energy service company (ESCO). The ESCO is required to go through a two-step qualification process to become an eligible ESPC ENABLE or Schedule 84 service provider. The two-step process includes first, becoming Department of Energy (DOE)- qualified and second, being awarded a contract under the GSA Schedule.

  15. Illinois Company Implementing Solar Energy

    Office of Energy Efficiency and Renewable Energy (EERE)

    J.F. Family Limited Partnership has been awarded $191,000 through the Recovery Act toward the use of solar energy at its Lakefront Parkway property in Edwardsville, Ill., which is the company headquarters for J.F. Electric Inc. The funding will be used to install a 75-kW solar photovoltaic system on the building’s roof, creating electricity on-site and creating or saving a total of 14 jobs.

  16. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  17. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  18. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  19. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  20. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  1. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  2. Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Page 969

    E-Print Network [OSTI]

    Lyuu, Yuh-Dauh

    Introduction to Mortgage-Backed Securities c 2008 Prof. Yuh-Dauh Lyuu, National Taiwan University Taiwan University Page 971 #12;Mortgage-Backed Securities · A mortgage-backed security (MBS) is a bond backed by an undivided interest in a pool of mortgages. · MBSs traditionally enjoy high returns, wide

  3. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  4. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  5. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  6. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  7. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  8. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  9. Issue 5: High Interest in Hybrid Cars

    E-Print Network [OSTI]

    Ong, Paul M.; Haselhoff, Kim

    2005-01-01T23:59:59.000Z

    2005). “High Interest in Hybrid Cars. ” SCS Fact Sheet, Vol.May 2005 High Interest in Hybrid Cars I NTRODUCTION PublicThe unique features of a hybrid car mean that it is more

  10. Energy service company opportunities get hotter

    SciTech Connect (OSTI)

    Barrett, L.B. [Barrett Consulting Associates, Inc., Colorado Springs, CO (United States)

    1995-08-01T23:59:59.000Z

    An option of growing interest to utilities and their customers is the energy service company or ESCO. It typically provides or coordinates several energy services including performing energy audits or analyses, designing and engineering of retrofit projects, managing the installation of more efficient equipment, and maintaining systems for optimal performance. Perhaps the key distinguishing feature of an ESCO is financing that allows the customer to avoid or reduce first costs and pay for the energy services through savings on electric and fuel bills. By paying for the energy services through savings on energy bills, the arrangement becomes a performance contract. It is difficult to find a major utility in North America that is not considering establishing or working with an ESCO. Many have made that commitment and many more are likely to do so. From the perspective of the facility owner, the increased presence of ESCOs will present some challenges in determining the best option, but the rewards for selecting an ESCO of high quality and reliability should be worth it. A facility manager considering a contract with an ESCO that is not a utility subsidiary should call their local utility for comparative information. A facility manager considering a contract with an ESCO that is a utility subsidiary should be aware that other organizations may be able to provide equivalent services.

  11. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  12. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  13. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  14. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  15. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  16. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  17. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  18. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07T23:59:59.000Z

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  19. Deere & Company Energy Management Program

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01T23:59:59.000Z

    for evaluating each unit's ene~gy savings techniques. Two more key elements merit attention. These are "energy ethic" and "feedback". The people that comprise a company can enhance a conservation program if they are convinced it is for their good as well... vital but "good business" as well. Meet Lester! One of our factories has had an an:i mated movie produced which ~eatures a polar bear: hero. He represents the central theme of an ene~gy conservation awareness program. The program con~ tinues...

  20. Broin Companies | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof Energy Future of CSP: ChallengesEnergyEnergyBroin Companies

  1. Wyrulec Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTownDells, Wisconsin: EnergyWyandanch, New York:State ParksWyrulec Company Jump to:

  2. Benjamin Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDIT REPORT Americium/CuriumAguaBBBWind LtdFengliBenjamin Company Jump

  3. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01T23:59:59.000Z

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  4. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  5. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  6. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  7. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  8. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  9. A Game-Theoretic Price Determination Algorithm for Utility Companies Serving a Community in Smart Grid

    E-Print Network [OSTI]

    Pedram, Massoud

    -cooperative utility companies who have incentives to maximize their own profits. The energy price competition forms. More interestingly, the use of dynamic energy pricing schemes incentivizes homeowners to consume to the change of energy usage as a factor of energy price. Although it is no longer possible to prove

  10. Natural gas: Governments and oil companies in the Third World

    SciTech Connect (OSTI)

    Davidson, A.; Hurst, C.; Mabro, R.

    1988-01-01T23:59:59.000Z

    It is asserted that oil companies claim to be generally receptive to gas development proposals; however, the lack of potential markets for gas, problems of foreign exchange convertibility, and lack of a legal framework often hinders their engagement. Governments, on the other hand, need to secure domestic energy supply and, if possible, gain some export earnings or royalties. An extensive discussion on the principles of pricing and fiscal regimes, potential points of disagreement is provided. A course of action is outlined from the managerial point of view to circumvent the most common pitfalls in planning and financing a gas project. Eight very detailed case studies are presented for Argentina, Egypt, Malaysia, Nigeria, Pakistan, Tanzania, Tunisia and Thailand.

  11. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  12. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  15. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  16. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  17. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  18. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  19. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  20. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  1. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. New Mexico Gas Company- Commercial Efficiency Programs

    Broader source: Energy.gov [DOE]

    The New Mexico Gas Company Commercial Energy Efficiency programs provide energy savings for businesses using natural gas for cooking and water heating. Prescriptive incentives for specified...

  3. Panasonic Corporation Energy Company formerly Matsushita Battery...

    Open Energy Info (EERE)

    to: navigation, search Name: Panasonic Corporation Energy Company (formerly Matsushita Battery Industrial Co) Place: Moriguchi, Osaka, Japan Zip: 570-8511 Product: Producer of...

  4. Colonial Pipeline Company Timothy C. Felt

    Broader source: Energy.gov (indexed) [DOE]

    that are critically important to our nation's economy. History In 1961, a handful of energy companies came together to build what was then the single largest privately funded...

  5. POWER PURCHASE AGREEMENT DELMARVA POWER & LIGHT COMPANY

    E-Print Network [OSTI]

    Firestone, Jeremy

    POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer") and BLUEWATER WIND 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 39 3

  6. MENTOR MEET New Student/Company Information

    E-Print Network [OSTI]

    MENTOR MEET New Student/Company Information Venture Connection Mentor Meet Info ________ Mentoring ________ Funding ________ NEXT STEPS - Office use Mentor: Actions Who By Date Other

  7. Enforcement Letter, Westinghouse Savannah River Company - November...

    Broader source: Energy.gov (indexed) [DOE]

    Savannah River Site On November 14, 2003, the U.S. Department of Energy (DOE) issued a nuclear safety Enforcement Letter to Westinghouse Savannah River Company related to...

  8. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  9. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  10. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  11. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  12. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  13. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  14. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  15. CRADA ORGANIZATIONAL CONFLICTS OF INTEREST (OCI) CERTIFICATION

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CRADA No. CRADA ORGANIZATIONAL CONFLICTS OF INTEREST (OCI) CERTIFICATION In accordance with Clause I.105 - Technology Transfer Mission, (n)(5)i of Contract No....

  16. Aligning Utility Interests with Energy Efficiency Objectives...

    Open Energy Info (EERE)

    Interests with Energy Efficiency Objectives: A Review of Recent Efforts at Decoupling and Performance Incentives Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Aligning...

  17. 5 February 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    / FORESTY PRODUCTS INTEREST GROUP 1 Title: Social network media in the forest products industry: A look Manufacturers Inc. (AHMI) surveyed a group of their members to determine if social media was being used, and exporting. Seven appendixes list resources and agencies that provide assistance to wood products companies

  18. 24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER -FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP

    E-Print Network [OSTI]

    for profitable, large-scale production have failed. The second-largest U.S. oil company by market value spent24 September 2014 SENT TO LSU AGCENTER/LOUISIANA FOREST PRODUCTS DEVELOPMENT CENTER - FOREST SECTOR / FORESTY PRODUCTS INTEREST GROUP 1 Chevron's Search for Plant-Based Alternative Fuels Flounders Joe Carroll

  19. LLNL: Science in the National Interest

    ScienceCinema (OSTI)

    George Miller

    2010-09-01T23:59:59.000Z

    This is Lawrence Livermore National Laboratory. located in the Livermore Valley about 50 miles east of San Francisco, the Lab is where the nations topmost science, engineering and technology come together. National security, counter-terrorism, medical technologies, energy, climate change our researchers are working to develop solutions to these challenges. For more than 50 years, we have been keeping America strong.

  20. Personal Background andPersonal Background and AreasAreas ofof InterestInterest

    E-Print Network [OSTI]

    Boehning, Dankmar

    General Topics CurrentCurrent AreasAreas ofof InterestInterest ResearchResearch AreasAreas inin Preperation InterestInterest ResearchResearch AreasAreas inin PreperationPreperation #12;Personal BackgroundHistory BesidesBesides cooperatingcooperating inin severalseveral projectsprojects in SEin SE AsiaAsia oneone

  1. Two worlds, one smart card An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers to office buildings and plants, companies these days issue their employees a (smart) card that is bothTwo worlds, one smart card An integrated solution for physical access and logical security using

  2. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers#ce buildings and plants, companies these days issue their employees a (smart) card that is both an identityTwo worlds, one smart card # An integrated solution for physical access and logical security using

  3. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  4. B Allison Adams, BSBA `91 Caspers Company

    E-Print Network [OSTI]

    Wu, Dapeng Oliver

    Jeremy Foley UF Athletic Association B Kristen Foley Nielsen B Dr. James R. Follain Nelson A. Rockefeller Acquisition Center B Darin Cook, BS `87 Infinite Energy B Kyle Cooper, BSBA `05 Orlando Predators B James Columbia Timber Company B Katie Davis James Moore & Company B Stuart Davis, BSAc '80, MAcc `81 Titan

  5. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2012 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report for the year ended 30 September 2012 Report of the Directors

  6. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2013 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report For the year ended 30 September 2013 Report of the Directors

  7. A Unified Formal Model for Service Oriented Architecture to Enforce Security Contracts

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    levels. Here, we are only interested in security control at the message exchanges level. 2. Background approaches of formalization are presented: process calculus models for expressing and analyzing service based-systems impor- tant security properties, like access control on services, con- fidentiality on transmitted data

  8. Recent biosensing developments in environmental security Adam K. Wanekaya,*a

    E-Print Network [OSTI]

    Chen, Wilfred

    Article on the web 7th May 2008 DOI: 10.1039/b806830p Environmental security is one of the fundamental in 1994. His research interests are in biomolecular engineering, environmental biotechnology, and nano-biotechnologyRecent biosensing developments in environmental security Adam K. Wanekaya,*a Wilfred Chenb

  9. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  10. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  11. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  12. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  13. Industrial & Systems Engineering Areas of Engineering Interests

    E-Print Network [OSTI]

    Berdichevsky, Victor

    Industrial & Systems Engineering Areas of Engineering Interests The Department of Industrial and Systems Engineering understands our students may work as Industrial Engineers in other engineering industries, and to help prepare them for these careers, the ISE Areas of Interest was formulated. The courses

  14. Strong Interest Inventory Profile with College Profile

    E-Print Network [OSTI]

    Peak, Derek

    Strong Interest Inventory ® Profile with College Profile College Profile developed by Jeffrey P Interest Inventory® Profile JANE SAMPLE Date taken 1.1.2005 F HOW THE STRONG CAN HELP YOU The Strong in your Strong results. Understanding your Strong Profile can help you identify a career focus and begin

  15. PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES

    E-Print Network [OSTI]

    Greenslade, Diana

    i PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES #12;PUBLIC INTEREST DISCLOSURE POLICY a disclosure under the PID Act 7 5.2. How to make a disclosure under the PID Act 7 6. PROCEDURES FOR AUTHORISED OFFICERS 9 7.1. Authorised Officer must provide information about the PID Act 9 7.2. Receiving

  16. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  18. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  19. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  20. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  1. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  2. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  3. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  4. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L. [Sandia National Labs., Albuquerque, NM (United States). Nonproliferation and Arms Control Analysis Dept.

    1996-11-01T23:59:59.000Z

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations. Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  7. Tennessee Small Business Investment Company Credit Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Tennessee Small Business Company Credit Act offers $120 million in gross premiums tax credits to insurance companies that invest in companies certified by the State of Tennessee as TNInvestcos....

  8. Sun Life Assurance Company of Canada is a member of the Sun Life Financial group of companies. 2005 Sun Life Assurance Company of Canada. All rights reserved.

    E-Print Network [OSTI]

    Mullins, Dyche

    JL 5/26/09 Sun Life Assurance Company of Canada is a member of the Sun Life Financial group of companies. © 2005 Sun Life Assurance Company of Canada. All rights reserved. Sun Life Financial and the globe symbol are registered trademarks of Sun Life Assurance Company of Canada. SLPC 5302 07/02 H I G H

  9. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  10. Enterprise Security: A Community of Interest Based Approach Patrick McDaniel

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    . In this paper we explore a brownfield approach to hardening an enterprise network against active malware

  11. Truffles --Secure File Sharing With Minimal System Administrator Intervention

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Truffles -- Secure File Sharing With Minimal System Administrator Intervention Peter Reiher Thomas sharing between arbitrary users at arbitrary sites connected by a network. Truffles is an interesting the potential of greatly increasing the workload of system administrators, if the services are not designed

  12. Environmental, Safety, Security, and Health Policy Brookhaven National Laboratory

    E-Print Network [OSTI]

    Ohta, Shigemi

    Environmental, Safety, Security, and Health Policy Brookhaven National Laboratory This document is a statement of BNL's ESSH policy. BNL is a world leader in scientific research and strives to demonstrate's progress on ESSH goals and adherence to this policy, I invite all interested parties to provide me

  13. Security bounds for efficient decoy-state quantum key distribution

    E-Print Network [OSTI]

    Marco Lucamarini; James F. Dynes; Bernd Fröhlich; Zhiliang Yuan; Andrew J. Shields

    2015-03-25T23:59:59.000Z

    Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.

  14. Copyright and the public interest in China 

    E-Print Network [OSTI]

    Tang, Guan Hong

    2009-01-01T23:59:59.000Z

    This thesis will consider how the multidimensional public interest concept at once informs development of Chinese copyright law and also limits it. Since 1990 China has awarded copyright - individual rights - but also ...

  15. Energy Efficiency Interest Rate Reduction Program

    Broader source: Energy.gov [DOE]

    The Alaska Housing Finance Corporation (AHFC) offers interest rate reductions to home buyers purchasing new and existing homes with 5 Star and 5 Star Plus energy ratings. All homes constructed on...

  16. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  17. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  18. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  19. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  20. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  1. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  2. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  3. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  4. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  5. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  6. The changing face of Hanford security 1990--1994

    SciTech Connect (OSTI)

    Thielman, J.

    1995-12-01T23:59:59.000Z

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

  7. Private Company Uses EERE-Supported Chemistry Model to Substantially...

    Office of Environmental Management (EM)

    Private Company Uses EERE-Supported Chemistry Model to Substantially Improve Combustion Engine Simulation Software Private Company Uses EERE-Supported Chemistry Model to...

  8. Vermont Wind Measurement Company Still Strong | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Vermont Wind Measurement Company Still Strong Vermont Wind Measurement Company Still Strong April 9, 2010 - 3:16pm Addthis NRG's new building utilizes solar power, but their...

  9. Regulation of Gas, Electric, and Water Companies (Maryland)

    Broader source: Energy.gov [DOE]

    The Public Service Commission is responsible for regulating gas, electric, and water companies in the state. This legislation contains provisions for such companies, addressing planning and siting...

  10. Sandia National Laboratories: UOP-a Honeywell Company

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    UOP-a Honeywell Company ECIS and UOP (a Honewell Company): CSTs Clean Radioactive Waste in Fukushima and Worldwide On February 14, 2013, in Energy, Materials Science, Nuclear...

  11. Dow Chemical Company: Assessment Leads to Steam System Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a Petrochemical Plant Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a...

  12. Sandia National Laboratories: Ocean Renewable Power Company TidGen®...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Company TidGen turbine High-Fidelity Hydrostructural Analysis of Ocean Renewable Power Company's (ORPC's) TidGen Turbine On March 19, 2014, in Computational Modeling &...

  13. New Mexico Gas Company- Residential Efficiency Programs

    Broader source: Energy.gov [DOE]

    The New Mexico Gas Company provides incentives for energy saving measures and improvements to residential homes. Rebates are available for adding insulation and for homes which attain Energy Star...

  14. Deere and Company Energy Management Program

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01T23:59:59.000Z

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  15. Fall 2012 FUPWG Meeting Welcome: Southern Company

    Broader source: Energy.gov [DOE]

    Presentation—given at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Southern Company's retail service territory, financials, customers and sales, power generation, U.S. military projects, and more.

  16. CompanieswithPNNLRoots All of these companies

    E-Print Network [OSTI]

    Devary Communications ­ 1995 Directed Technologies Drilling, Inc. ­ 1992 Ebasco, (Foster Wheeler Toro Prepaid, Inc., now Coinstar) ­ 1997 New Horizon Technologies, Inc. ­ 1995 Nortec (formerlyCompanieswithPNNLRoots All of these companies have received foundational technology and

  17. Deere and Company Energy Management Program 

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01T23:59:59.000Z

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  18. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  19. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  20. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  1. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  2. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  4. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  5. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  6. A virtual company concept for reservoir management

    SciTech Connect (OSTI)

    Martin, F.D. [Dave Martin and Associates, Inc. (United States); Kendall, R.P.; Whitney, E.M. [Los Alamos National Lab., NM (United States)

    1998-12-31T23:59:59.000Z

    This paper describes how reservoir management problems were pursued with a virtual company concept via the Internet and World Wide Web. The focus of the paper is on the implementation of virtual asset management teams that were assembled with small independent oil companies. The paper highlights the mechanics of how the virtual team transferred data and interpretations, evaluated geological models of complex reservoirs, and used results of simulation studies to analyze various reservoir management strategies.

  7. An analysis of the bank holding company

    E-Print Network [OSTI]

    Facka, David William

    1969-01-01T23:59:59.000Z

    company exercises more supervision over the investments of each affiliate bank than over any of the other affiliate bank's activities. This service improves the flow of information, thus increasing the productivity of investments . Many of the services...) the conven- ience, needs, and welfare of the communities and the area concerned; and (5) whether or not the effect of such acquisition or merger or consolidation would be to expand the size or extent of the bank holding company system involved beyond...

  8. SAFEGUARDS AND SECURITY INTEGRATION WITH SAFETY ANALYSIS

    SciTech Connect (OSTI)

    Hearn, J; James Lightner, J

    2007-04-13T23:59:59.000Z

    The objective of this paper is to share the Savannah River Site lessons learned on Safeguards and Security (S&S) program integration with K-Area Complex (KAC) safety basis. The KAC Documented Safety Analysis (DSA), is managed by the Washington Savannah River Company (WSRC), and the S&S program, managed by Wackenhut Services, Incorporated--Savannah River Site (WSI-SRS). WSRC and WSI-SRS developed a contractual arrangement to recognize WSI-SRS requirements in the KAC safety analysis. Design Basis Threat 2003 (DBT03) security upgrades required physical modifications and operational changes which included the availability of weapons which could potentially impact the facility safety analysis. The KAC DSA did not previously require explicit linkage to the S&S program to satisfy the safety analysis. WSI-SRS have contractual requirements with the Department of Energy (DOE) which are separate from WSRC contract requirements. The lessons learned will include a discussion on planning, analysis, approval of the controls and implementation issues.

  9. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  10. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  11. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  12. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  13. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  14. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  15. Interested Parties - Smith Dawson & Andrews | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    09-03-10SmithDawsonAndrews.pdf More Documents & Publications Interested Parties - ARPA-E National Association of Manufacturers Interested Parties - Chrystler Interested...

  16. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  17. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  18. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  19. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  20. Y-12 honors companies, advocates for small-business success | Y-12 National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contributeSecurity Complex honors companies, ...

  1. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  2. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  3. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  4. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  5. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  6. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  7. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  8. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  9. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  10. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  11. Parallel Processing Letters fc World Scientific Publishing Company

    E-Print Network [OSTI]

    Calheiros, Rodrigo N.

    World Scientific Publishing Company http://ejournals.wspc.com.sg/ppl/ppl.shtml SCHEDULING AND MANAGEMENT

  12. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  13. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  14. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  15. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  16. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  17. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  18. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  19. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  20. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  2. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  4. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  5. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  8. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  9. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  10. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  11. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  12. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  13. Finding Regions of Interest on Toroidal Meshes

    SciTech Connect (OSTI)

    Wu, Kesheng; Sinha, Rishi R; Jones, Chad; Ethier, Stephane; Klasky, Scott; Ma, Kwan-Liu; Shoshani, Arie; Winslett, Marianne

    2011-02-09T23:59:59.000Z

    Fusion promises to provide clean and safe energy, and a considerable amount of research effort is underway to turn this aspiration intoreality. This work focuses on a building block for analyzing data produced from the simulation of microturbulence in magnetic confinementfusion devices: the task of efficiently extracting regions of interest. Like many other simulations where a large amount of data are produced,the careful study of ``interesting'' parts of the data is critical to gain understanding. In this paper, we present an efficient approach forfinding these regions of interest. Our approach takes full advantage of the underlying mesh structure in magnetic coordinates to produce acompact representation of the mesh points inside the regions and an efficient connected component labeling algorithm for constructingregions from points. This approach scales linearly with the surface area of the regions of interest instead of the volume as shown with bothcomputational complexity analysis and experimental measurements. Furthermore, this new approach is 100s of times faster than a recentlypublished method based on Cartesian coordinates.

  14. Processing Personal Health Data in Legitimate Interest

    E-Print Network [OSTI]

    Alexin, Zoltán

    : excluding data from the National Health Insurance Fund database related to unsubsidized care events, medical diagnosis, the provision of care or treatment or the management of health-care services, and whereProcessing Personal Health Data in Legitimate Interest ,,Infocommunication technologies

  15. Hydropower Potential Scoping Study Gauging Interest

    E-Print Network [OSTI]

    6/19/2013 1 Hydropower Potential Scoping Study ­ Gauging Interest Generating Resources Advisory and associated technologies. ­ Hydropower upgrades, new hydropower projects 2 Purpose Develop a hydro supply curve to determine the hydropower development potential in the NW region ­ Council's Seventh Power Plan

  16. Interest Theory Richard C. Penney Purdue University

    E-Print Network [OSTI]

    2007-09-19T23:59:59.000Z

    We recommend the TI BA II Plus, either the solar or battery version. .... per year. Bank A compounds yearly but uses simple interest for partial periods ..... (29) Assuming that house prices have inflated at an average rate of 8% per year for each ...

  17. Interest Theory Richard C. Penney Purdue University

    E-Print Network [OSTI]

    1910-30-42T23:59:59.000Z

    arial Exam. We recommend the TI BA II Plus, either the solar or battery version. .... Bank A compounds yearly but uses simple interest for partial periods while bank ..... Assuming that house prices have inflated at an average rate of 8% per year.

  18. National security and the comprehensive test ban treaty

    SciTech Connect (OSTI)

    Landauer, J.K.

    1980-08-01T23:59:59.000Z

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive. (LCL)

  19. Process Control Security 44 PublishedbytheieeeComPutersoCiety1540-7993/08/$25.002008ieeeieeeseCurity&PrivaCy

    E-Print Network [OSTI]

    Correia, Miguel

    - structures such as power, water, gas, oil, and trans- portation. Therefore, the threat is no longer against a rather weak, form of security, essentially by obscurity. However, criti- cal infrastructure companies, and control and supervision proto- cols are normally encapsulated on top of UdP-TCP/ IP. The common defense

  20. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  1. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W.T.; Ferrante, T.A.

    1998-10-13T23:59:59.000Z

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface. 8 figs.

  2. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W. Thor (Idaho Falls, ID); Ferrante, Todd A. (Westerville, OH)

    1998-01-01T23:59:59.000Z

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface.

  3. Property:CompanyType | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroupPerfectenergyInformationProjectAffiliated CompaniesCompanyType Jump

  4. Oman Oil Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOfRoseConcernsCompany Oil and Gas CompanyOklahoma/WindOkpilakIIOmahaOman

  5. Cooperative monitoring of regional security agreements

    SciTech Connect (OSTI)

    Pregenzer, A.L.; Vannoni, M.; Biringer, K.L.

    1995-08-01T23:59:59.000Z

    This paper argues that cooperative monitoring plays a critical role in the implementation of regional security agreements and confidence building measures. A framework for developing cooperative monitoring options is proposed and several possibilities for relating bilateral and regional monitoring systems to international monitoring systems are discussed. Three bilateral or regional agreements are analyzed briefly to illustrate different possibilities: (1) the demilitarization of the Sinai region between Israel and Egypt in the 1970s; (2) the 1991 quadripartite agreement for monitoring nuclear facilities among Brazil, Argentina, The Argentine-Brazilian Agency for Accounting and Control of Nuclear Materials and the International Atomic Energy Agency; and (3) a bilateral Open Skies agreement between Hungary and Romania in 1991. These examples illustrate that the relationship of regional or bilateral arms control or security agreements to international agreements depends on a number of factors: the overlap of provisions between regional and international agreements; the degree of interest in a regional agreement among the international community; efficiency in implementing the agreement; and numerous political considerations.Given the importance of regional security to the international community, regions should be encouraged to develop their own infrastructure for implementing regional arms control and other security agreements. A regional infrastructure need not preclude participation in an international regime. On the contrary, establishing regional institutions for arms control and nonproliferation could result in more proactive participation of regional parties in developing solutions for regional and international problems, thereby strengthening existing and future international regimes. Possible first steps for strengthening regional infrastructures are identified and potential technical requirements are discussed.

  6. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  8. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  9. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  10. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  11. Information Analysis Methodology for Border Security Deployment Prioritization and Post Deployment Evaluation

    SciTech Connect (OSTI)

    Booker, Paul M.; Maple, Scott A.

    2010-06-08T23:59:59.000Z

    Due to international commerce, cross-border conflicts, and corruption, a holistic, information driven, approach to border security is required to best understand how resources should be applied to affect sustainable improvements in border security. The ability to transport goods and people by land, sea, and air across international borders with relative ease for legitimate commercial purposes creates a challenging environment to detect illicit smuggling activities that destabilize national level border security. Smuggling activities operated for profit or smuggling operations driven by cross border conflicts where militant or terrorist organizations facilitate the transport of materials and or extremists to advance a cause add complexity to smuggling interdiction efforts. Border security efforts are further hampered when corruption thwarts interdiction efforts or reduces the effectiveness of technology deployed to enhance border security. These issues necessitate the implementation of a holistic approach to border security that leverages all available data. Large amounts of information found in hundreds of thousands of documents can be compiled to assess national or regional borders to identify variables that influence border security. Location data associated with border topics of interest may be extracted and plotted to better characterize the current border security environment for a given country or region. This baseline assessment enables further analysis, but also documents the initial state of border security that can be used to evaluate progress after border security improvements are made. Then, border security threats are prioritized via a systems analysis approach. Mitigation factors to address risks can be developed and evaluated against inhibiting factor such as corruption. This holistic approach to border security helps address the dynamic smuggling interdiction environment where illicit activities divert to a new location that provides less resistance to smuggling activities after training or technology is deployed at a given location. This paper will present an approach to holistic border security information analysis.

  12. Hydrogen Technology Park DTE Energy -Company Overview

    E-Print Network [OSTI]

    Gas Production Detroit Edison Power Generation Energy Services* Energy Trading Biomass Energy Coal billion · 2.6 million customers · 11,000 MW of generation · 600 BCF natural gas delivery · 11,000 employees #12;3 Diversified Energy and Energy Technology Company * Energy Services: Coal Based Fuels

  13. Search Business News, Stocks, Funds, Companies

    E-Print Network [OSTI]

    Yaghi, Omar M.

    To capture the carbon dioxide generated by coal plants, chemical companies like Dow Chemical Co. and energy in Business » Search All NYTimes.com Energy & Environment WORLD U.S. N.Y. / REGION BUSINESS TECHNOLOGY SCIENCE's Revival May Combat Climate Change Build a Better Carbon Trap and ... And Now, Climate Bill's Supporters

  14. AD CONTENT CHECK LIST: o Company logo

    E-Print Network [OSTI]

    Zakharov, Vladimir

    AD CONTENT CHECK LIST: o Company logo o Address o Contact Info: Phone, web site, and/or e-mail o that will perfectly reflect your image! Acceptable Formats For Logos/Graphics/Photos High-Res (300 dpi) PDF, EPS

  15. Portland General Electric Company Pilot Evaluation and

    E-Print Network [OSTI]

    . The purposes of this pilot were to measure the load impact of turning off water heaters during peak hours, test customer acceptance of remote control of their water heater, determine the company's capability to control) was installed in each participant's home. Water heaters were shut off remotely (curtailed), using the paging

  16. Aeroseal, LLC a JMD, Inc Company

    E-Print Network [OSTI]

    Aeroseal, LLC a JMD, Inc Company 6838 Ellicott Drive East Syracuse, NY 13057 www.aeroseal.com Seal the Savings! May 26, 2011 Brady Peeks Northwest test procedure using an Aeroseal SmartSeal system. The total leakage of the duct system to the outside

  17. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  18. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  19. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  20. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  1. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  2. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  3. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  4. Sandia Energy - Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatingsUltra-High-VoltagePower Company'sInAs Quantum DotAssurance

  5. Utility Wind Interest Group | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga,planning methodologies and toolsoperationWind Interest Group Place:

  6. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  7. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  8. Seawalls Are Not Enough: Climate Change & U.S. Interests

    E-Print Network [OSTI]

    Freeman, Jody; Guzman, Andrew

    2009-01-01T23:59:59.000Z

    natural gas, and electricity; (ii) manufactured goods; (iii) machinery and transport equipment (which includes See infra Part III.B (discussing the enhanced security

  9. Department of Mathematics Faculty Research Interests Fall 2013 ...

    E-Print Network [OSTI]

    lankr

    2013-12-13T23:59:59.000Z

    Samuel Wagstaff, Professor of Computer Science and Mathematics, Ph.D. Cornell. University 1970; number theory, information security. • Uli Walther, Professor ...

  10. Technical analysis of US Army Weapons Systems and related advanced technologies of military interest. Final report

    SciTech Connect (OSTI)

    NONE

    1991-06-14T23:59:59.000Z

    This report summarizes the activities and accomplishments of an US Army technology security project designed to identify and develop effective policy guidelines for militarily critical technologies in specific Army systems and in broad generic technology areas of military interest, Individual systems analyses are documented in separate Weapons Systems Technical Assessments (WSTAs) and the general generic technology areas are evaluated in the Advanced Technology Assessment Reports (ATARs), However, specific details of these assessments are not addressed here, only recommendations regarding aspects of the defined approach, methodology, and format are provided and discussed.

  11. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  12. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  13. Company, for the United States Department of Energy's National Nuclear Security

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1.Space DataEnergy Superior Energy PerformanceSandia is

  14. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  15. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  16. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  17. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  18. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  19. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  20. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  1. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  2. Operational improvements at Jewell Coal and Coke Company`s non-recovery ovens

    SciTech Connect (OSTI)

    Ellis, C.E.; Pruitt, C.W.

    1995-12-01T23:59:59.000Z

    Operational improvements at Jewell Coal and Coke Company over the past five years includes safety and environmental concerns, product quality, equipment availability, manpower utilization, and productivity. These improvements with Jewell`s unique process has allowed Jewell Coal and Coke Company to be a consistent, high quality coke producer. The paper briefly explains Jewell`s unique ovens, their operating mode, improved process control, their maintenance management program, and their increase in productivity.

  3. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  4. Biomass Company Sets Up Shop in High School Lab | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Biomass Company Sets Up Shop in High School Lab Biomass Company Sets Up Shop in High School Lab March 30, 2010 - 2:45pm Addthis Stephen Graff Former Writer & editor for Energy...

  5. SEP Success Story: Green Launching Pad Taps Six More Companies...

    Office of Environmental Management (EM)

    Green Launching Pad Taps Six More Companies for Take-off SEP Success Story: Green Launching Pad Taps Six More Companies for Take-off April 29, 2011 - 9:58am Addthis Yesterday, U.S....

  6. Geothermal Business on the Rise for Kansas Company | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Business on the Rise for Kansas Company Geothermal Business on the Rise for Kansas Company April 16, 2010 - 4:43pm Addthis Paul Lester Communications Specialist, Office of Energy...

  7. Special Provisions Affecting Gas, Water, or Pipeline Companies (South Carolina)

    Broader source: Energy.gov [DOE]

    This legislation confers the rights and privileges of telegraph and telephone companies (S.C. Code 58-9) on pipeline and water companies, and contains several additional provisions pertaining to...

  8. Corporate Energy Management: A Survey of Large Manufacturing Companies

    E-Print Network [OSTI]

    Norland, D. L.; Lind, L.

    Corporate practices regarding energy management vary substantially from one company to another. Some companies pay close attention to energy use throughout the corporation while others pay scant attention. This paper first describes what we call...

  9. SunShot Incubator Awardee Helps Companies Offer Discount Solar...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SunShot Incubator Awardee Helps Companies Offer Discount Solar as Employee Perk SunShot Incubator Awardee Helps Companies Offer Discount Solar as Employee Perk March 31, 2015 -...

  10. Matching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation

    E-Print Network [OSTI]

    Gilchrist, James F.

    Corporation Foundation The Eaton Charitable Fund Electroline Corporation Eli Lilly and Company FoundationMatching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation Abbott Laboratories Accenture Foundation Technologies, Inc. Air Products Air Products Foundation Albemarle Corporation Alcoa Foundation Alliance Capital

  11. Intern experience at URS Company: an internship report

    E-Print Network [OSTI]

    Elkarmi, Fawwaz, 1950-

    2013-03-13T23:59:59.000Z

    This report describes the author's internship experience with URS Company - Dallas, Texas, from May 1980 to May 1981. The internship company is a consulting engineering firm engaged in providing professional services...

  12. Optimal capital structure of deep sea foreign freight transportation companies

    E-Print Network [OSTI]

    Georgiadis, Vasilis

    2014-01-01T23:59:59.000Z

    This thesis aims to understand the optimal leverage range for shipping companies (maritime foreign freight transportation companies - SIC 4412), through data analysis. This study confirms that in a traditional industry ...

  13. Interest Management in Distributed Simulation: A Survey* Bora I. Kumova

    E-Print Network [OSTI]

    Kumova, Bora

    Interest Management in Distributed Simulation: A Survey* Bora I. Kumova Dokuz Eylul University Management; Distributed Simulation Abstract Current interest management implementations can reduce the data clustering. Furthermore, a new taxonomy for interest management that includes these concepts is introduced

  14. Shifting Interest Regimes of the Working Classes in Latin America

    E-Print Network [OSTI]

    Berins Collier, Ruth; Handlin, Samuel P.

    2005-01-01T23:59:59.000Z

    Handlin IIR Working Paper Shifting Interest Regimes of the2000), “Working-Class Power, Capitalist-Class Interest, andShifting Interest Regimes of the Working Classes in Latin

  15. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  16. Current Size and Remaining Market Potential of the U.S. Energy Service Company Industry

    E-Print Network [OSTI]

    Stuart, Elizabeth

    2014-01-01T23:59:59.000Z

    disadvantage compared to solar companies that are verticallydisadvantage compared to solar companies that are verticallysolar leasing models with no upfront costs). These companies

  17. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  18. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  19. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  20. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview