Sample records for interest security company

  1. National Interest Security Company NISC Formerly Technology Management...

    Open Energy Info (EERE)

    search Name: National Interest Security Company (NISC) (Formerly Technology & Management Services (TMS) Inc.) Place: Gaithersburg, Maryland Zip: 20879 Product: TMS provides...

  2. Conflict of Interest with Faculty Owned Companies General Principle

    E-Print Network [OSTI]

    Shepp, Larry

    Conflict of Interest with Faculty Owned Companies General Principle Keep your company activities separate and distinct from your Rutgers professor activities. Expect your company to be treated exactly like any other company. The fact that it partially owned by Rutgers faculty member does not give it any

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    tech transfer officers are now seeking U.S. companies to license and commercialize the device for electronics chip cooling. Companies interested in licensing the Sandia Cooler...

  4. Cyber Security Companies, governments, and consumers depend on secure and reliable

    E-Print Network [OSTI]

    Hill, Wendell T.

    Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

  5. Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1994-07-15T23:59:59.000Z

    To establish policy, responsibilities, and authorities for the protection and control of safeguards and security interests. Cancels DOE O 5632.1B, DOE O 5632.2A, DOE O 5632.5, DOE O 5632.6, DOE O 5632.9A, DOE O 5632.11, DOE O 5635.1A, DOE O 5635.2B, DOE O 5635.3. Canceled by DOE O 473.1

  6. National Interest Security Company NISC Formerly Technology Management

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 -Energieprojekte3InformationofServices TMS Inc | Open Energy Information

  7. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    This Technical Manual establishes requirements for operational safety controls for onsite operations and provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an Onsite Packaging and Transfer Program, pursuant to DOE O 461.1A, Packaging and Transfer or Transportation of Materials of National Security Interest. The DOE contractor must document this program in its Onsite Packaging and Transfer Manual/Procedures. Admin Chg 1, 7-26-05. Certified 2-2-07. Canceled by DOE O 461.2.

  8. Farm Tractors in Kansas: How to Perfect a Security Interest

    E-Print Network [OSTI]

    Johnstun, Aaron J.; Ware, Stephen J.

    2009-01-01T23:59:59.000Z

    -2153 . . . .”); id. § 28-2153(D) (“This section does not apply to: (1) [a] farm tractor.”). 3. Arkansas. See ARK. CODE ANN. § 4-9-311(a) (West 2004) (“[T]he filing of a financing statement is not necessary or effective to perfect a security interest in property... in an area away from the traveled surface of an established open highway.”); id. § 1102(33) (“‘Vehicle’ does not include bicycles, trailers except travel trailers and rental trailers, or implements of husbandry. . . . All implements of husbandry used...

  9. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Administration under contract DE-AC04-94AL85000. SAND 2012-0603P National Solar Thermal Test Facility The primary goal if the NSTTF is to provide experimental...

  11. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  12. US statutes of general interest to safeguards and security officers. Revision 12/95

    SciTech Connect (OSTI)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01T23:59:59.000Z

    This document is one of a three volume set. This document, BNL 52202, it titled, ``US Statutes of General Interest to Safeguards and Security Officers``, and is intended for use by officers.

  13. New companies get boost from Los Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn CyberNeutrons usedDOENew Technique653New companies

  14. PIA - Access Security Plan, Bechtel Jacobs Company LLC | Department of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002OpticsPeriodical: Volume 5,PET Imaging:Department 1

  15. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-04-26T23:59:59.000Z

    To establish requirements and responsibilities for offsite shipments of naval nuclear fuel elements, Category I and Category II special nuclear material, nuclear explosives, nuclear components, special assemblies, and other materials of national security interest. Cancels DOE O 461.1. Canceled by DOE O 461.1B and DOE O 461.2.

  16. Packaging and Transfer or Transportation of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    To establish requirements and responsibilities for the Transportation Safeguards System (TSS) packaging and transportation and onsite transfer of nuclear explosives, nuclear components, Naval nuclear fuel elements, Category I and Category II special nuclear materials, special assemblies, and other materials of national security interest. Cancels: DOE 5610.12 and DOE 5610.14.

  17. Packaging and Transportation for Offsite Shipment of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-20T23:59:59.000Z

    The purpose of this Order is to make clear that the packaging and transportation of all offsite shipments of materials of national security interest for DOE must be conducted in accordance with DOT and Nuclear Regulatory Commission (NRC) regulations that would be applicable to comparable commercial shipments, except where an alternative course of action is identified in this Order. Cancels DOE O 461.1A.

  18. Minnesota Innovation Partnerships (MN-IP) Try and Buy MN-IP Try and Buy --for companies interested in licensing existing U of M inventions

    E-Print Network [OSTI]

    Minnesota, University of

    is executed BUY (LICENSE) · Low, published royalty rate, with first $1 million of product sales royalty-free · Royalty rates based on industry comparables · Royalty rate discount for MN operating companies2 · Royalty

  19. Shai Agassi's story of his evolving personal interest in energy issues, and the evolv-ing business plan of his electric vehicle company, Better Place, provides an impor-

    E-Print Network [OSTI]

    Kammen, Daniel M.

    plan of his electric vehicle company, Better Place, provides an impor- tant lens on the pace short-lived efforts at developing electric vehicles. All this can be seen, in retrospect, as a clarion electric vehicles--is notable and challenging at the same time. The benefit of pure EV technology

  20. Securing Cloud Storage Service.

    E-Print Network [OSTI]

    Zapolskas, Vytautas

    2012-01-01T23:59:59.000Z

    ?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

  1. Fritz Technologies is a small company based in Sebastopol, California, specializing in information assurance and data security. Fritz has completed several contracts with the

    E-Print Network [OSTI]

    Ravikumar, B.

    Fritz Technologies is a small company based in Sebastopol, California, specializing in information office in Sebastopol, CA. Fritz Technologies is currently offering the following Internships for Sonoma

  2. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Siefert, Chris

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL

  3. Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration

    E-Print Network [OSTI]

    Langerhans, Brian

    , for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL ­ Supply chains and logistics ­ Systems of systems (e.g., the nuclear fuel cycle, fleet management) #12

  4. The cry of ``we need more, and better, com puter security education'' is now rampant.

    E-Print Network [OSTI]

    Bishop, Matt

    the principles well enough to apply them. Industry needs to protect its investments in people, equipment, and its to analyze a site, balance (internal and external) threats to the company with costs of implementing secu­ r are what matter. Government uses computer security as one of many tools to protect the national interest

  5. The cry of "we need more, and better, com-puter security education" is now rampant.

    E-Print Network [OSTI]

    Bishop, Matt

    the principles well enough to apply them. Industry needs to protect its investments in people, equipment, and its to analyze a site, balance (internal and external) threats to the company with costs of implementing secu. Government uses computer security as one of many tools to protect the national interest (we assume

  6. Researching Careers, Industries, and Companies Tracie Thomas

    E-Print Network [OSTI]

    Shull, Kenneth R.

    /Industry ­ Increased certainty when selecting an internship ­ Demonstrates a sincere interest in working this internship?" "I have always been interested in working in Finance, and Ford Motor Company is a well-know company" OR " I am very interested in working for a top-3 automaker in the US especially since Ford

  7. Patent Litigation for High Technology and Life Sciences Companies

    E-Print Network [OSTI]

    Shamos, Michael I.

    Patent Litigation for High Technology and Life Sciences Companies #12;© 2005 Fenwick & West LLP Corporate (emerging growth, financings, securities, mergers & acquisitions) n Intellectual Property (patent, copyright, licensing, trademark) n Litigation (patent and other IP, securities, antitrust, employment

  8. Standard Insurance Company 1100 SW Sixth Avenue

    E-Print Network [OSTI]

    Block, Louis

    Standard Insurance Company 1100 SW Sixth Avenue Portland OR 97204 www.standard.com Electronic Evidence Of Insurability Save Time: Provide Medical History Statements Online Standard Insurance Company is complete, allowing The Standard to begin the underwriting process immediately. The Web form is secure

  9. Research in the Interest of National Security

    E-Print Network [OSTI]

    . democracies Social organization drives innovation in technology which creates great disparities in wealth & Power · Production (cultivation) of food => specialized labor · Specialization led to innovation by a few societies that developed them early 2 #12;Successful Societies · Innovation occurs from many

  10. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  11. Investment companies

    E-Print Network [OSTI]

    Sauer, Edward F

    1961-01-01T23:59:59.000Z

    stockholder challenged the management fee paid to F. Eberstadt & Co. , Inc. , manager and distributor of Chemical Fund. The court dismissed the case on the grounds that excessive fees had not been proved. This case, however, could hardly be considered a... Tax-Exempt Bond Funds. . . . . . . . Daily Pricing of Mutual Investment Company Shares. 56 57 59 59 60 iv Management Fees. . . . . Tax-Free Exchange Funds . 61 62 V. CONCLUSIONS 63 BIBLIOGRAPHY GLOSSARY OF TERMS Balanced fund...

  12. An exploratory investigation of organizational security climate in a highly regulated environment.

    E-Print Network [OSTI]

    Bitzer, Edward George

    2010-01-01T23:59:59.000Z

    ??Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security performance.… (more)

  13. An exploratory investigation of organizational security climate in a highly regulated environment.

    E-Print Network [OSTI]

    Bitzer, Edward George, III

    2011-01-01T23:59:59.000Z

    ?? Security professionals, particularly those working in the field of nuclear security, have become increasingly interested in organizational characteristics which might influence an organization's security… (more)

  14. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  15. The Interest Rate Conundrum

    E-Print Network [OSTI]

    Craine, Roger; Martin, Vance L.

    2009-01-01T23:59:59.000Z

    Flows and US Interest Rates,” NBER Working Paper No 12560. [Working Paper # 2008 -03 The Interest Rate Conundrum Roger

  16. Grid Reliability- An Electric Utility Company's Perspective

    Broader source: Energy.gov [DOE]

    Presentation—given at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meeting—covers Southern Company's business continuity, North American Electric Reliability Corporation (NERC) cybersecurity, and homeland security as well as physical recovery after a major outage, and five questions to ask your local utility.

  17. Competitor Analysis Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    chemical company providing the household and industrial detergent, personal care, lubricant, oilfield

  18. Privatizing Public Interest Law

    E-Print Network [OSTI]

    Cummings, Scott L

    2011-01-01T23:59:59.000Z

    graduation, she received a public interest law foundation grant to work in the consumer rights project

  19. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  20. Business model transformation for the international division of a fortune 100 high technology company

    E-Print Network [OSTI]

    Mokhtari Dizaji, Reza, 1968-

    2008-01-01T23:59:59.000Z

    Raytheon Canada in Waterloo, Ontario offers a very interesting but challenging research case. As one of the international divisions of Raytheon Corporation, the company has a business model similar to its parent company. ...

  1. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  2. Quantifying and managing the risk of information security breaches participants in a supply chain

    E-Print Network [OSTI]

    Bellefeuille, Cynthia Lynn

    2005-01-01T23:59:59.000Z

    Technical integration between companies can result in an increased risk of information security breaches. This thesis proposes a methodology for quantifying information security risk to a supply chain participant. Given a ...

  3. Company No 2711000 THE COMPANIES ACTS 1985 to 1989

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company No 2711000 THE COMPANIES ACTS 1985 to 1989 COMPANY LIMITED BY GUARANTEE AND NOT HAVING(0)20 7367 2000 (AJC/JLTN/NSM/0W0107/00283) #12;2 THE COMPANIES ACTS 1985 to 1989 _______________________________________________________ COMPANY LIMITED BY GUARANTEE AND NOT HAVING A SHARE CAPITAL

  4. Thin slices of interest

    E-Print Network [OSTI]

    Madan, Anmol P. (Anmol Prem Prakash)

    2005-01-01T23:59:59.000Z

    In this thesis we describe an automatic human interest detector that uses speech, physiology, body movement, location and proximity information. The speech features, consisting of activity, stress, empathy and engagement ...

  5. Public Service Companies, General Provisions (Virginia)

    Broader source: Energy.gov [DOE]

    Public Service Companies includes gas, pipeline, electric light, heat, power and water supply companies, sewer companies, telephone companies, and all persons authorized to transport passengers or...

  6. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-09-15T23:59:59.000Z

    To establish Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of insite security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE 5634.1A. Canceled by DOE O 470.1 dated 9-28-95.

  7. Facility Approvals, Security Surveys, and Nuclear Materials Surveys

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-02-03T23:59:59.000Z

    To establish the Department of Energy (DOE) requirements for granting facility approvals prior to permitting safeguards and security interests on the premises and the conduct of on-site security and/or nuclear material surveys of facilities with safeguards and security interests. Cancels DOE O 5630.7 and DOE O 5634.1. Canceled by DOE 5634.1B.

  8. Notice of Interest

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddyof H-2 andNot SoDEPARTMENT OF ENERGY

  9. A Two-Constraint Approach to Risky CyberSecurity

    E-Print Network [OSTI]

    Faber, Ted

    A Two-Constraint Approach to Risky CyberSecurity Experiment Management John Wroclawski, Jelena Mirkovic, Ted Faber, Stephen Schwab #12;Risky CyberSecurity Research CyberSecurity systems becoming more;Domains of interest Traditional risky experiment Virus dissection Modern risky CyberSecurity

  10. company (company-name, city) 4.2 (h) Assume the companies may be located in

    E-Print Network [OSTI]

    Sidorova, Natalia

    company (company-name, city) 4.2 (h) Assume the companies may be located in several cities. Find all companies located in every city in which SBC is located. { t | ccompany (t[comp-name]=c[comp-name] c1company (c1[comp-name] = "SBC" c2company (c2[comp-name]=c[comp-name] c2[city] = c1[city

  11. Transportation Security

    Broader source: Energy.gov (indexed) [DOE]

    Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

  12. Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

  13. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  14. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  15. Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

  16. MACHINE AND FOUNDRY COMPANY

    Office of Legacy Management (LM)

    MACHINE AND FOUNDRY COMPANY kt '- : :' ENGINEERING DIVISIOJ ---. Cl FIELD iRIP ,REP@?T ,' i;:z;zy MEETING REPORT : .I.-.-' Y ::,:I :. &, .I7 ENGINEERING REPORT- : T, ...

  17. Mechanical Engineer Company Description

    E-Print Network [OSTI]

    Kostic, Milivoje M.

    Mechanical Engineer Company Description Control Solutions Inc. is a small, dynamic, and rapidly. Position Description The Mechanical Engineer is responsible for all aspects associated with the mechanical enclosures, brackets, cabling assemblies among others. Systems include mechanisms, sensors, hydraulics, among

  18. THE COMPANIES ACTS 1985 to 1989 COMPANY LIMITED BY GUARANTEE

    E-Print Network [OSTI]

    Rambaut, Andrew

    THE COMPANIES ACTS 1985 to 1989 ________________________________________________ COMPANY LIMITED of association of the Company. 1.2 In these Articles the following expressions shall, except where the context otherwise requires or permits, have the following meanings: "Act": the Companies Act 1985. "Articles

  19. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or local closed-loop controls that can perform more advanced functions such as demand response to balance load to PV power availability. A Platform for Autonomous Load...

  20. The Inverse Problem for Derivative Securities of Interest Rate

    E-Print Network [OSTI]

    2008-02-02T23:59:59.000Z

    May 26, 2000 ... consider the valuation of zero-coupon bond, which is sold in ... quantities can be determined by statistics and the least square method from the.

  1. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRA research and analysis expertise including national infrastructure, transportation, health care, agriculture, and, of course, nuclear power and national defense....

  2. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8138P Assessing the Impact of Severe Accidents The computer code MACCS (MELCOR Accident Consequence Code Systems) was developed at Sandia National Laboratories for the U.S. Nuclear...

  3. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Administration under contract DE-AC04-94AL85000. SAND2011-7909P Modeling High-Temperature Gas Reactors As the Next Generation Nuclear Plant Project progresses in its regulatory...

  4. Packaging and Transfer of Materials of National Security Interest Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-29T23:59:59.000Z

    The purpose of this Technical Manual is to establish requirements for operational safety controls for onsite operations. This Technical Manual provides Department of Energy (DOE) technical safety requirements and policy objectives for development of an onsite packaging and transfer program, pursuant to DOE O 461.1; the DOE contractor must document this program in its onsite packaging and transfer manual/procedures. Does not cancel other directives.

  5. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at Fukushima. Publications Kalinich, D. A. (2007). Yucca mountain transportation, aging and disposal canister leak path factor analysis (Sandia Report SAND2007-5851P)....

  6. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in large-scale, stationary storage applications to mitigate the variability of windsolar power generation (load leveling), minimize the electrical loads during peak demand...

  7. Manual for Protection and Control of Safeguards and Security Interests

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1996-04-10T23:59:59.000Z

    This Manual provides detailed requirements to supplement DOE O 5632.1C, which establishes policy for the protection and control of special nuclear material, Vital Equipment, classified matter, Departmental property and facilities, and unclassifed irradiated reactor fuel in transit. Chapter XI canceled by DOE O 470.1. Chapter III, paragraphs 1, 2, and 4 through 9 canceled by DOE O 471.2. DOE M 473.1-1 cancels the rest of this directive.

  8. Onsite Packaging and Transfer of Materials of National Security Interest

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-11-01T23:59:59.000Z

    The order prescribes requirements and responsibilities for identifying and mitigating undue risk of onsite transfers that are non compliant with U.S. Department of Transportation and Nuclear Regulatory Commission regulations. Cancels DOE O 461.1A and DOE M 461.1-1, Admin Chg 1.

  9. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    DOE SunShot Initiative. SunShot is a collaborative national initiative to make solar energy cost competitive with other energy generation by 2020. Reducing the installed cost of...

  10. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for planningtoAInfrastructure Improvements As the939P

  11. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity of theInfrastructure

  12. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity of theInfrastructureThe

  13. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity of theInfrastructureThe372P

  14. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity of

  15. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity ofTo meet the challenge of

  16. Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared Land Surface Emissivity in the Vicinity ofTo meet the challenge ofThe

  17. Web Page Development Company Description

    E-Print Network [OSTI]

    Dahl, David B.

    Web Page Development Company Description: Service Provider web site Short Project Name: Research support and networking. Company Description: Website Building Company. This company drives traffic to websites through search engines, and optimizes websites over time. Short Project Name: Site Build Project

  18. DCO Operations Interesting Statistics

    E-Print Network [OSTI]

    DCO Operations Interesting Statistics 35 40 45 50 55 60 65 70 75 80 85 90 95 100 105 110 115 120 Chart by: HANDS DOWN SOFTWARE, www.handsdownsoftware.com 1.00 0.95 0.90 0.85 0.80 0.75 0.70 0.65 0.60 0 is annotated with the American Society of Heating, Refrigerating and Air-Conditioning Engineers (ASHRAE

  19. US statutes for enforcement by security inspectors

    SciTech Connect (OSTI)

    Cadwell, J.J.; Ruger, C.J.

    1995-12-01T23:59:59.000Z

    This document is one of a three volume set. BNL 52201 is titled `Selected Text of Atomic Energy Act Executive Orders and Other Laws of General Interest to Safeguards and Security Executives`, and it contains detailed information for use by executives. BNL 52202 is titled `U.S. Statutes of General Interest to Safeguards and Security Officers`, and contains less detail than BNL 52201. It is intended for use by officers. BNL 52203 is titled `U.S. Statutes for Enforcement by Security Inspectors`, and it contains statutes to be applied by uniformed security inspectors.

  20. Case study on accounting fraud of U.S.-listed Chinese companies

    E-Print Network [OSTI]

    An, Tingting

    2014-01-01T23:59:59.000Z

    During the period from 2009 to 2013, 76 out of 848 U.S. federal securities class action litigations were against Chinese companies listed in U.S. markets. The U.S. Securities and Exchange Commission (SEC) has also initiated ...

  1. Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    E-Print Network [OSTI]

    Minnesota, University of

    Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage Vishal Kher Yongdae Kim players. While storage outsourcing is cost-effective, many companies are hesitating to outsource their storage due to security concerns. The success of storage outsourcing is highly dependent on how well

  2. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  3. Upgraded Coal Interest Group

    SciTech Connect (OSTI)

    Evan Hughes

    2009-01-08T23:59:59.000Z

    The Upgraded Coal Interest Group (UCIG) is an EPRI 'users group' that focuses on clean, low-cost options for coal-based power generation. The UCIG covers topics that involve (1) pre-combustion processes, (2) co-firing systems and fuels, and (3) reburn using coal-derived or biomass-derived fuels. The UCIG mission is to preserve and expand the economic use of coal for energy. By reducing the fuel costs and environmental impacts of coal-fired power generation, existing units become more cost effective and thus new units utilizing advanced combustion technologies are more likely to be coal-fired.

  4. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  5. Security In Information Systems

    E-Print Network [OSTI]

    Candan, Selçuk

    rights, and they are proposing security policies, security planning, personal data protection laws, etc

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  7. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  9. Volunteering as Performance: The Dynamic between Self-Interest and Selflessness within the Volunteer Industry

    E-Print Network [OSTI]

    Bernstein, Joshua D

    2013-04-26T23:59:59.000Z

    participants at Relay For Life perform a narrative of selflessness. Expanding my discussion of volunteering to a global perspective, my last chapter addresses volunteer tourism. I argue that the self-interest of both volunteers and volunteer travel companies...

  10. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  11. Hiring Company: Chevron Oronite Technology Group, a Chevron Company

    E-Print Network [OSTI]

    Southern California, University of

    additives for fuels and lubricating oils. We are a Global company and a subsidiary of Chevron Corporation

  12. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  13. Benham Companies ESCO Qualification Sheet

    Broader source: Energy.gov [DOE]

    Document outlines the energy service company (ESCO) qualifications for Leidos Engineering (part of Benham Companies) in relation to the U.S. Department of Energy's (DOE) energy savings performance contracts (ESPC).

  14. Secure coprocessing applications and research issues

    SciTech Connect (OSTI)

    Smith, S.W.

    1996-08-01T23:59:59.000Z

    The potential of secure coprocessing to address many emerging security challenges and to enable new applications has been a long-standing interest of many members of the Computer Research and Applications Group, including this author. The purpose of this paper is to summarize this thinking, by presenting a taxonomy of some potential applications and by summarizing what we regard as some particularly interesting research questions.

  15. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

  16. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  17. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  18. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  20. SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK

    E-Print Network [OSTI]

    Azevedo, Ricardo

    Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

  1. Aligning the interests of those having a vested interest in

    E-Print Network [OSTI]

    Russell, Lynn

    . Royalties, The better way of both investing in and financing of companies and projects Prepared for UCSD Jacobs School of Engineering's von Liebig Entrepreneurism Center #12;What is a royalty? A royalty is a percentage of defined revenues which has been exchanged by the royalty issuer with a party having an asset

  2. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  3. Regional companies eye growth

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegional companies eye growth Regional

  4. Company Level Imports Archives

    Annual Energy Outlook 2013 [U.S. Energy Information Administration (EIA)]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelines AboutDecemberSteam Coal Import96 4.87CBECS Public Use Data CBECS Public UseRobertCompany

  5. Company Name Company Name Address Place Zip Sector Product Website

    Open Energy Info (EERE)

    significantly better heating efficiency than conventional coiled wire elements A O Smith A O Smith Wisconsin Efficiency Solar Wisconsin based based company that makes both...

  6. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  7. IT Security Plan for Flight Simulation Program

    E-Print Network [OSTI]

    Hood, David; 10.5121/ijcsea.2011.1510

    2011-01-01T23:59:59.000Z

    Information security is one of the most important aspects of technology, we cannot protect the best interests of our organizations' assets (be that personnel, data, or other resources), without ensuring that these assetsare protected to the best of their ability. Within the Defense Department, this is vital to the security of not just those assets but also the national security of the United States. Compromise insecurity could lead severe consequences. However, technology changes so rapidly that change has to be made to reflect these changes with security in mind. This article outlines a growing technological change (virtualization and cloud computing), and how to properly address IT security concerns within an operating environment. By leveraging a series of encrypted physical and virtual systems, andnetwork isolation measures, this paper delivered a secured high performance computing environment that efficiently utilized computing resources, reduced overall computer processing costs, and ensures confidentia...

  8. Control Systems Cyber Security Standards Support Activities

    SciTech Connect (OSTI)

    Robert Evans

    2009-01-01T23:59:59.000Z

    The Department of Homeland Security’s Control Systems Security Program (CSSP) is working with industry to secure critical infrastructure sectors from cyber intrusions that could compromise control systems. This document describes CSSP’s current activities with industry organizations in developing cyber security standards for control systems. In addition, it summarizes the standards work being conducted by organizations within the sector and provides a brief listing of sector meetings and conferences that might be of interest for each sector. Control systems cyber security standards are part of a rapidly changing environment. The participation of CSSP in the development effort for these standards has provided consistency in the technical content of the standards while ensuring that information developed by CSSP is included.

  9. Regulations For Gas Companies (Tennessee)

    Broader source: Energy.gov [DOE]

    The Regulations for Gas Companies, implemented by the Tennessee Regulatory Authority (Authority) outline the standards for metering, distribution and electricity generation for utilities using gas....

  10. Kansas Certified Development Companies (Kansas)

    Broader source: Energy.gov [DOE]

    Kansas Certified Development Companies (CDC) assist businesses by developing loan packages that meet the financial need of a project. These packages often contain multiple sources of project...

  11. Xcel Energy PUBLIC SERVICE COMPANY

    Broader source: Energy.gov (indexed) [DOE]

    Xcel Energy PUBLIC SERVICE COMPANY P.O. Box 840 Denver, Colorado 80201-0840 April 3, 2009 Mr. Timothy Meeks Transmission Infrastructure Program Western Area Power Administration...

  12. Financial Conflict of Interest Information Financial Conflict of Interest Information

    E-Print Network [OSTI]

    Raina, Ramesh

    requires that sponsored travel be included in the disclosure, regardless of value. This does not, however their disclosure within 30 days of the occurrence of a new reportable financial interest(s). In order to maintain University, requires mandatory Training for all "Investigators" meaning "the project director or principal

  13. Career Interest | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    of oneself. As you begin to plan for your career, this Learning Module introduces five free career interest assessmentsurveys. To return back to the Leadership Development...

  14. Interested Parties - Myriant | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Myriant.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy Interested Parties - 1603 Program Discussion...

  15. Interested Parties - Organization for International Investment...

    Broader source: Energy.gov (indexed) [DOE]

    Investment PI.pdf More Documents & Publications Interested Parties - Morgan Wright Interested Parties - Andrew Lundquist Interested Parties - National Governors...

  16. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  17. Interested Parties - MIT | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Interested Parties - MIT ARLobbyist9-16.pdf More Documents & Publications Interested Parties - Morgan Wright Interested Parties - Patrick Murphy Interested Parties - Nextfuels...

  18. Interested Parties - Morgan Wright | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Morgan Wright Interested Parties - Morgan Wright LobbyistDisclosure.pdf More Documents & Publications Interested Parties - MIT Interested Parties - Patrick Murphy Interested...

  19. Interested Parties - Xtreme Power | Department of Energy

    Energy Savers [EERE]

    Xtreme Power Interested Parties - Xtreme Power 09-14-10XtremePower.pdf More Documents & Publications Interested Parties - XtremePower Interested Parties - Myriant Interested...

  20. Aditya A. Shah Deere & Company,

    E-Print Network [OSTI]

    Aditya A. Shah Deere & Company, Dubuque, IA 52001 e-mail: shahadityaa@johndeere.com Christiaan J. J 30332 e-mail: chris.paredis@me.gatech.edu Roger Burkhart Deere & Company, Moline, IL 61265 e it to an example of a hydraulic log splitter. Based on this initial example, we discuss two advantages

  1. UCC POLICY ON CAMPUS COMPANIES Introduction

    E-Print Network [OSTI]

    Schellekens, Michel P.

    UCC POLICY ON CAMPUS COMPANIES Introduction 1. It is now accepted that the role of the University in which it is located. 2. The establishment of a campus company is one vehicle for exploiting the output who wish to create a campus company. 3. A campus company is a private limited company

  2. Secure Business Process Management: A Roadmap Thomas Neubauer, Markus Klemen, Stefan Biffl

    E-Print Network [OSTI]

    process life cycle. I. INTRODUCTION In many domains companies model and optimize their busi- ness process management (BPM) aims at efficiently creating business value there is a number of threats are continously increasing their resources to protect their business processes against security threats. Companies

  3. Border Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

  4. Interest Group Survival: Shared Interests Versus Competition for Resources

    E-Print Network [OSTI]

    Haider-Markel, Donald P.

    1997-08-01T23:59:59.000Z

    Population ecology theory on interest group populations is examined to determine the implications for group membership levels in the states. Using the assumptions of the competitive exclusion principle, it is hypothesized ...

  5. Strathclyde Links Useful Knowledge for Growing Companies

    E-Print Network [OSTI]

    Mottram, Nigel

    Strathclyde Links Useful Knowledge for Growing Companies Arecent project, supported by Strathclyde Tibor Illes in the Department of Management Science, with University spin- out company, Cascade applications. The company identified the need for academic research expertise when reviewing one

  6. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  7. Interested Parties - Siemens | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    GCHarrisSiemens.PDF More Documents & Publications Interested Parties - Myriant Interested Parties - Patrick Murphy...

  8. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01T23:59:59.000Z

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  9. Sustainability Community Special Interest Group

    E-Print Network [OSTI]

    Blevis, Eli

    Sustainability Community Special Interest Group Meeting, CHI 2012 Eli Blevis, Yue Pan, & David: Weather Effects #12;Discussion Catalyst: Social Sustainability #12;Discussion Catalyst: Barriers & Brick Catalyst: Education #12;Discussion Catalyst: Cultural Factors #12;Discussion Catalyst: Finding Our Way #12

  10. Smart Meter Company Boosting Production, Workforce | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Smart Meter Company Boosting Production, Workforce Smart Meter Company Boosting Production, Workforce September 30, 2010 - 10:53am Addthis Kevin Craft What does this mean for me?...

  11. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  12. Global Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

  13. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  14. A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    A Distortion-Theoretic Perspective for Redundant Metering Security in a Smart Grid Mustafa El--In a smart grid environment some customers employ third-party meters and terminals for integrity verification of the smart meter power measurements reported by the electric utility company. We address the security issues

  15. SIMPLOT LIVESTOCK COMPANY POSITION ANNOUNCEMENT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    SIMPLOT LIVESTOCK COMPANY POSITION ANNOUNCEMENT Job description: Manage the Research, and cow/calf health and performance records Software prototype development and testing for data Experimental design and analysis Protocol development, writing and compliance Budget development

  16. The valuation of construction companies

    E-Print Network [OSTI]

    Sassine, Edmond, 1980-

    2004-01-01T23:59:59.000Z

    The main objective of this thesis is to study the valuation of construction companies in mergers and acquisitions. The thesis is divided into three main parts; Mergers and Acquisitions, Valuation, and a Case Study. Mergers ...

  17. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1993-06-01T23:59:59.000Z

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  18. managed for the U.S. Department of Energy by Brookhaven Science Associates, a company

    E-Print Network [OSTI]

    Ohta, Shigemi

    or as an e-mail attachment to: NNSS Course Brookhaven National Laboratory Building 197C P.O. Box 5000 Uptonmanaged for the U.S. Department of Energy by Brookhaven Science Associates, a company BROOKHAVEN NATIONAL LABORATORY Nuclear Nonproliferation, Safeguards, and Security in the 21st Century June 9 - June 27

  19. Data Sciences Technology for Homeland Security Information Management

    E-Print Network [OSTI]

    Kolda, Tamara G.

    . Samatova, D. Speck, R. Srikant, J. Thomas, M. Wertheimer, P. C. Wong SANDIA REPORT SAND2004-6648 Unlimited Report of the DHS Workshop on Data Sciences September 22-23, 2004 Jointly released by Sandia National, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security

  20. Eastern Kodak Company

    SciTech Connect (OSTI)

    Y.S. Tyan

    2009-06-30T23:59:59.000Z

    Lighting consumes more than 20% of electricity generated in the United States. Solid state lighting relies upon either inorganic or organic light-emitting diodes (OLEDs). OLED devices because of their thinness, fast response, excellent color, and efficiency could become the technology of choice for future lighting applications, provided progress is made to increase power efficiency and device lifetime and to develop cost-effective manufacturing processes. As a first step in this process, Eastman Kodak Company has demonstrated an OLED device architecture having an efficacy over 50 lm/W that exceeds the specifications of DOE Energy Star Program Requirements for Solid State Lighting. The project included work designed to optimize an OLED device, based on a stacked-OLED structure, with performance parameters of: low voltage; improved light extraction efficiency; improved internal quantum efficiency; and acceptable lifetime. The stated goal for the end of the project was delivery of an OLED device architecture, suitable for development into successful commercial products, having over 50 lum/W power efficiency and 10,000 hours lifetime at 1000 cd/m{sup 2}. During the project, Kodak developed and tested a tandem hybrid IES device made with a fluorescent blue emitter, a phosphorescent yellow emitter, and a phosphorescent red emitter in a stacked structure. The challenge was to find low voltage materials that do not absorb excessive amounts of emitted light when the extraction enhancement structure is applied. Because an extraction enhancement structure forces the emitted light to travel several times through the OLED layers before it is emitted, it exacerbates the absorption loss. A variety of ETL and HTL materials was investigated for application in the low voltage SSL device structure. Several of the materials were found to successfully yield low operating device voltages without incurring excessive absorption loss when the extraction enhancement structure was applied. An internal extraction layer comprises two essential components: a light extraction element (LEE) that does the actual extraction of emitted light and a light coupling layer (LCL) that allows the emitted light to interact with the extraction element. Modeling results show that the optical index of the LCL needs to be high, preferably higher than that of the organic layers with an n value of {approx}1.8. In addition, since the OLED structure needs to be built on top of it the LCL needs to be physically and chemically benign. As the project concluded, our focus was on the tandem hybrid device, which proved to be the more efficient architecture. Cost-efficient device fabrication will provide the next challenges with this device architecture in order to allow this architecture to be commercialized.

  1. Interests Diffusion in Social Networks

    E-Print Network [OSTI]

    D'Agostino, Gregorio; De Nicola, Antonio; Tucci, Salvatore

    2015-01-01T23:59:59.000Z

    Understanding cultural phenomena on Social Networks (SNs) and exploiting the implicit knowledge about their members is attracting the interest of different research communities both from the academic and the business side. The community of complexity science is devoting significant efforts to define laws, models, and theories, which, based on acquired knowledge, are able to predict future observations (e.g. success of a product). In the mean time, the semantic web community aims at engineering a new generation of advanced services by defining constructs, models and methods, adding a semantic layer to SNs. In this context, a leapfrog is expected to come from a hybrid approach merging the disciplines above. Along this line, this work focuses on the propagation of individual interests in social networks. The proposed framework consists of the following main components: a method to gather information about the members of the social networks; methods to perform some semantic analysis of the Domain of Interest; a p...

  2. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  3. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  4. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  5. Interested Parties - NNSA | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    NNSA Interested Parties - NNSA 06-03-10NNSA.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy...

  6. Interested Parties - 1603 Program Discussion | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    1603 Program Discussion Interested Parties - 1603 Program Discussion weekswagle.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy...

  7. Interested Parties - Energy Solutions | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    - Energy Solutions EnergySolutions.pdf More Documents & Publications Interested Parties - NRG Energy Interested Parties - Myriant Interested Parties - 1603 Program Discussion...

  8. Interested Parties - Multiple Loan Applications per Developer...

    Energy Savers [EERE]

    Documents & Publications Interested Parties - Allowing Multiple Projects per Application for Section 1705 Loan Guarantees Interested Parties - K&L Group Interested Parties - Shipp...

  9. Communications from Interested Parties | Department of Energy

    Energy Savers [EERE]

    September 14, 2010 Interested Parties - Xtreme Power September 3, 2010 Interested Parties - Smith Dawson & Andrews August 10, 2010 Interested Parties - MEMA previous 1 2 3 4 5 next...

  10. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

  11. Research Interest of Dilip Sarkar

    E-Print Network [OSTI]

    Sarkar, Dilip

    anywhere anytime. While traveling on vehicle we connect to the Internet using one or more of theses is to develop a group of autonomous mobile agents each with its own set of wireless sensors. These mobile agents at UM have fueled my interest. My goal is to develop parallel algorithms for bioinformatics problems

  12. Sandia National Laboratories: American Council of Engineering Companies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy Advanced Nuclear EnergyCouncil of Engineering Companies

  13. Interested Parties - Pittsburgh Green Innovators | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Attachment to Registered Lobbyist Disclosure Form: R More Documents & Publications Interested Parties - Andrew Lundquist Interested Parties - National Governors Association...

  14. Secure Voice over IP conferencing with decentralized group encryption

    E-Print Network [OSTI]

    Kannan, Steven (Steven K.)

    2007-01-01T23:59:59.000Z

    This thesis addresses the development of an end-to-end secure Voice over IP (VoIP) conference system. We are particularly interested in challenges associated with deploying such a system in ad-hoc networks containing low ...

  15. Using Operational Security (OPSEC) to Support a Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

  16. Information Security: Coordination of Federal Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

  17. Speed Dating Listing Company Name

    E-Print Network [OSTI]

    , Inc Morey Walker & Associates Engineering Inc. Nambe Pueblo Healthcare Services, LLC Environmental Solutions, Inc. AHTNA Government Services Corp. AIC General Contractor, Inc. Albert The Plumber, Inc. Alpha Restoration & Construction Services, LLC AmeriCom Automation Services, Inc. ATI Security

  18. Natural gas annual 1993 supplement: Company profiles

    SciTech Connect (OSTI)

    Not Available

    1995-02-01T23:59:59.000Z

    The Natural Gas Annual provides information on the supply and disposition of natural gas to a wide audience including industry, consumers, Federal and State agencies, and educational institutions. This report, the Natural Gas Annual 1993 Supplement: Company Profiles, presents a detailed profile of 45 selected companies in the natural gas industry. The purpose of this report is to show the movement of natural gas through the various States served by the companies profiled. The companies in this report are interstate pipeline companies or local distribution companies (LDC`s). Interstate pipeline companies acquire gas supplies from company owned production, purchases from producers, and receipts for transportation for account of others. Pipeline systems, service area maps, company supply and disposition data are presented.

  19. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  20. energy company opens American branch

    E-Print Network [OSTI]

    Lin, C.-Y. Cynthia

    and environmental science and policy departments at UC Davis, said she thinks it is wonderful that Ecostream is coming to the Sacramento area and that UC Davis is a prime location for research on sustainability. "Inenergy company opens American branch in West Sacramento Substainible energy

  1. IBM Software Lincoln Trust Company

    E-Print Network [OSTI]

    into account several "lessons learned" from the company's past pre-divestiture past. A process improve- ment team had existed several years prior, but was decommissioned due to lack of meaningful automation, there were also lessons from the past that needed to be integrated into the new program. Prior attempts

  2. NATIONAL LEAD COMPANY OF OHIO

    Office of Legacy Management (LM)

    t-t AL- 1. + T fi r,y* t ,.- . NATIONAL LEAD COMPANY OF OHIO Ofll i iy Ci)wp HEALTH AND SAFETY DIVISION - ANALYTICAL DEPT. ANALYTICAL DATA SHEET U-G b ;33y jl:tL G c-w &3(y I...

  3. Reed-Joseph International Company

    E-Print Network [OSTI]

    is offering field downloadable GPS/VHF logging collars and Solar Powered GPS/VHF backpack loggers for birds of battery powered and solar powered PTTs in a wide range of sizes, exclusively for birds. We will startReed-Joseph International Company 55 YEARS OF EXCELLENCE IN BIRD AND WILDLIFE CONTROL THE U

  4. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

  5. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  6. Data Security ROCKVILLE, MD

    E-Print Network [OSTI]

    Rau, Don C.

    by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  8. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  9. Lemnos interoperable security project.

    SciTech Connect (OSTI)

    Halbgewachs, Ronald D.

    2010-03-01T23:59:59.000Z

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  10. Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical...

    Broader source: Energy.gov (indexed) [DOE]

    Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company: DOE Smart Grid RFI Addressing Policy and Logistical Challenges Southern Company:...

  11. Designing for cost In an aerospace company

    E-Print Network [OSTI]

    Hammar, Elizabeth (Elizabeth Deming)

    2014-01-01T23:59:59.000Z

    Companies take different approaches, and achieve different degrees of implementation, in designing products for cost. This thesis discusses Target Costing and its application at The Boeing Company. Target Costing is a ...

  12. Mackle Company: Order (2010-SE-0106)

    Broader source: Energy.gov [DOE]

    DOE ordered Mackle Company, Inc. to pay a $27,200 civil penalty after finding the company had failed to certify that a variety of refrigerators, refrigerator-freezers, and freezers comply with the applicable energy conservation standards.

  13. Cryptography and Data Security

    E-Print Network [OSTI]

    Dorothy E. Denning; Peter; J. Denning

    1982-01-01T23:59:59.000Z

    The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

  14. Limited Liability Companies and Corporate Business Structures

    E-Print Network [OSTI]

    Thompson, Bill; Polk, Wade; Hayenga, Wayne

    2009-01-07T23:59:59.000Z

    This publication describes limited liability companies and corporate forms of business organization, including S-Corporations and C-Corporations....

  15. Energy Audit Helps Small Company Stay Competitive

    Broader source: Energy.gov [DOE]

    The recommended improvements are saving the West Linn Paper Company in Oregon an annual cost of about $380,000.

  16. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

  17. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

  18. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

  19. ENERGY SERVICES COMPANIES SUMMARY OF RESPONSES

    E-Print Network [OSTI]

    CALIFORNIA ENERGY COMMISSION SUMMARY OF ENERGY SERVICES COMPANIES SUMMARY OF RESPONSES STAFFREPORT The Energy Commission staff is grateful to the many energy services companies that responded to our survey...........................................................................A1 Appendix B: List of Energy Services Companies Serving California According to Survey Results

  20. Change Investment Companies BSA Retirement Plan

    E-Print Network [OSTI]

    Ohta, Shigemi

    Change Investment Companies BSA Retirement Plan: · Contact the Benefits Office at extension 7516 · Complete BSA Retirement Plan Allocation Form · If you do not have an account with the investment company you wish to add, you will need to complete the investment company application · The Benefits Office

  1. 2013 Business Career Fair Participating Companies

    E-Print Network [OSTI]

    Kaminsky, Werner

    2013 Business Career Fair Participating Companies 1. Abercrombie & Fitch 2. Accenture 3. ADP 4. Alaska National Insurance Company 5. Altria 6. Amazon 7. AT&T 8. Avalara 9. B/E Aerospace 10. Boeing 11, Inc. 61. Northwestern Mutual 62. Otis Elevator Company 63. PACCAR 64. Pacific Capital Resource Group

  2. Strathclyde Links Useful Knowledge for Growing Companies

    E-Print Network [OSTI]

    Mottram, Nigel

    Strathclyde Links Useful Knowledge for Growing Companies The University of Strathclyde by an Interface enquiry. The original enquiry came from Kelso based Gill Orde in Catering; a company that provides of the department of Civil Engineering replied to the initial Interface enquiry and after meeting with the company

  3. General Electric Company Oahu Wind Integration Study

    E-Print Network [OSTI]

    General Electric Company Oahu Wind Integration Study Final Report Delivered to: Richard Rocheleau-956-8346 e-mail: rochelea@hawaii.edu General Electric Company (in alphabetical order) Sebastian Achilles Date: December 16 2010 #12;2 Legal Notices This report was prepared by the General Electric Company (GE

  4. Communications from Interested Parties | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    - ARPA-E National Association of Manufacturers November 6, 2009 Interested Parties - Siemens October 29, 2009 Interested Parties - Multiple Loan Applications per Developer under...

  5. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  6. Companies commit to eliminate dodgy wood products Companies commit to eliminate dodgy wood products

    E-Print Network [OSTI]

    Companies commit to eliminate dodgy wood products Companies commit to eliminate dodgy wood products wood products only from sustainable managed sources. Canadian paper, pulp and wood company Domtar has. "Companies that seriously commit to responsible wood sourcing can have significant positive impacts on forest

  7. BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies

    E-Print Network [OSTI]

    Evans, Paul

    BA (Hons) Business Management (In-Company) Degree Information for Prospective Sponsoring Companies) Business Management (In-Company) degree, which is based at Nottingham Business School, is aimed of the programme is full time at the Business School but students then spend the next two years in a company

  8. ESPC ENABLE Energy Service Companies

    Broader source: Energy.gov [DOE]

    Energy Savings Performance Contract (ESPC) ENABLE projects use General Services Administration (GSA) Federal Supply Schedule 84, SIN 246-53 to select a qualified energy service company (ESCO). The ESCO is required to go through a two-step qualification process to become an eligible ESPC ENABLE or Schedule 84 service provider. The two-step process includes first, becoming Department of Energy (DOE)- qualified and second, being awarded a contract under the GSA Schedule.

  9. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  10. Why Brazilian companies are certifying their forests? Michelle Araujo 1

    E-Print Network [OSTI]

    Why Brazilian companies are certifying their forests? Michelle Araujo 1 , Shashi Kant , Laercio adoption by Brazilian companies. Furthermore, companies' familiarity with certification systems, external influences on pursuing forest certification, and companies' intention to recertify their forests

  11. Company).

    E-Print Network [OSTI]

    M. Andriot; J. V. Degroot; M. Jungk; T. Easton; A. Mountney (dow Corning; Dow Corning; Europe Sa; Dow Corning; Europe Sa; Dow Corning; Europe Sa; Gerlach E; Dow Corning Gmbh; Dow Corning; Europe Sa; Dow Corning Gmbh

    Silicones in industry usually refer to linear polydimethylsiloxanes. A combination of properties such as their backbone flexibility, low intermolecular interactions, low surface tension and thermal stability explain many of their applications. But the name silicone also is used for more complex structures, where some of the methyl groups have been replaced by other functional groups, from branched polymers to resinous materials and even cross-linked elastomers. This allows for modifying some of the silicones properties to specific needs. The objective of this chapter is to give the curious reader a short but scientific overview of the various applications where silicones are used, including their

  12. The Resilient Economy: Integrating Competitiveness and Security

    SciTech Connect (OSTI)

    Debbie van Opstal

    2009-01-07T23:59:59.000Z

    Globalization, technological complexity, interdependence, terrorism, climate and energy volatility, and pandemic potential are increasing the level of risk that societies and organizations now face. Risks also are increasingly interrelated; disruptions in one area can cascade in multiple directions. The ability to manage emerging risks, anticipate the interactions between different types of risk, and bounce back from disruption will be a competitive differentiator for companies and countries alike in the 21st century. What Policymakers Should Know The national objective is not just homeland protection, but economic resilience: the ability to mitigate and recover quickly from disruption. Businesses must root the case for investment in resilience strategies to manage a spectrum of risks, not just catastrophic ones. Making a business case for investment in defenses against low-probability events (even those with high impact) is difficult. However, making a business case for investments that assure business continuity and shareholder value is not a heavy lift. There are an infinite number of disruption scenarios, but only a finite number of outcomes. Leading organizations do not manage specific scenarios, rather they create the agility and flexibility to cope with turbulent situations. The investments and contingency plans these leading companies make to manage a spectrum of risk create a capability to respond to high-impact disasters as well. Government regulations tend to stovepipe different types of risk, which impedes companies abilities to manage risk in an integrated way. Policies to strengthen risk management capabilities would serve both security and competitiveness goals. What CEOs and Boards Should Know Operational risks are growing rapidly and outpacing many companies abilities to manage them. Corporate leadership has historically viewed operational risk management as a back office control function. But managing operational risks increasingly affects real-time financial performance. The 835 companies that announced a supply chain disruption between 1989 and 2000 experienced 33 percent to 40 percent lower stock returns than their industry peers. Twenty-five percent of companies that experienced an IT outage of two to six days went bankrupt immediately. Ninety-three percent of companies that lost their data center for 10 days or more filed for bankruptcy within a year.

  13. Energy Security Initiatives Update

    Broader source: Energy.gov (indexed) [DOE]

    -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

  14. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  15. Control Systems Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

  16. Industrial Security Specialst

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

  17. Nevada National Security Site

    Broader source: Energy.gov [DOE]

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  18. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

  19. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  20. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

  2. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  3. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  4. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  5. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

  6. Deere & Company Energy Management Program

    E-Print Network [OSTI]

    Darby, D. F.

    1981-01-01T23:59:59.000Z

    for evaluating each unit's ene~gy savings techniques. Two more key elements merit attention. These are "energy ethic" and "feedback". The people that comprise a company can enhance a conservation program if they are convinced it is for their good as well... vital but "good business" as well. Meet Lester! One of our factories has had an an:i mated movie produced which ~eatures a polar bear: hero. He represents the central theme of an ene~gy conservation awareness program. The program con~ tinues...

  7. Company Level Imports Explanatory Notes

    Gasoline and Diesel Fuel Update (EIA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"Click worksheet9,1,50022,3,,,,6,1,,781Title: Telephone:shortOilCompany Level Imports Explanatory Notes

  8. Benjamin Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORT Americium/CuriumSunways JV Jump to: navigation,CoJumpBenjamin Company

  9. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  10. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  11. Operational Security (OPSEC) Reminder | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

  12. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

  13. Platts top 250 global energy company rankings

    SciTech Connect (OSTI)

    NONE

    2006-11-15T23:59:59.000Z

    The third annual survey of global energy companies measures companies' financial performance using four metrics: asset worth, revenues, profits and return on invested capital. The following industry segments were analysed: coal and consumable fuel companies; diversified utilities; exploration and production; electric utilities; gas utilities; integrated oil and gas companies; refining and marketing; independent power producers and storage and transfer companies. Integrated oil and gas companies (IOGs) captured nine out of the top ten spots while IPPS struggled in 2005 as the sector on a whole lost money. The exploration and production segment showed financial stability while gas utilities saw their financials climb. The Exxon Mobile Corp. continued its reign of the number one spot.

  14. A Game-Theoretic Price Determination Algorithm for Utility Companies Serving a Community in Smart Grid

    E-Print Network [OSTI]

    Pedram, Massoud

    -cooperative utility companies who have incentives to maximize their own profits. The energy price competition forms. More interestingly, the use of dynamic energy pricing schemes incentivizes homeowners to consume to the change of energy usage as a factor of energy price. Although it is no longer possible to prove

  15. International Journal of High Speed Electronics and Systems World Scientific Publishing Company

    E-Print Network [OSTI]

    of intense interest for basic and applied research. Carbon nanotubes are sheets of graphene (a semiInternational Journal of High Speed Electronics and Systems © World Scientific Publishing Company CARBON NANOTUBE FIELD-EFFECT TRANSISTORS JING GUO*, SIYURANGA O. KOSWATTA, NEOPHYTOS NEOPHYTOU, AND MARK

  16. Issue 5: High Interest in Hybrid Cars

    E-Print Network [OSTI]

    Ong, Paul M.; Haselhoff, Kim

    2005-01-01T23:59:59.000Z

    2005). “High Interest in Hybrid Cars. ” SCS Fact Sheet, Vol.May 2005 High Interest in Hybrid Cars I NTRODUCTION PublicThe unique features of a hybrid car mean that it is more

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  18. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

  19. DATABASE SECURITY APPLICATIONS

    E-Print Network [OSTI]

    Sandhu, Ravi

    DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  2. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

  3. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  4. Other Purdue Web points of Interest

    E-Print Network [OSTI]

    Other Purdue Web points of interest. Purdue University Home Page --- Schedule of Classes · Graduate School · Agronomy · Computer Science --- CS & E ...

  5. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01T23:59:59.000Z

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  6. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  7. Enforcement Letter, Westinghouse Savannah River Company - November...

    Broader source: Energy.gov (indexed) [DOE]

    Savannah River Site On November 14, 2003, the U.S. Department of Energy (DOE) issued a nuclear safety Enforcement Letter to Westinghouse Savannah River Company related to...

  8. New Mexico Gas Company- Commercial Efficiency Programs

    Broader source: Energy.gov [DOE]

    The New Mexico Gas Company Commercial Energy Efficiency programs provide energy savings for businesses using natural gas for cooking and water heating. Prescriptive incentives for specified...

  9. Parallel Processing Letters World Scientific Publishing Company

    E-Print Network [OSTI]

    Miller, Russ

    Parallel Processing Letters © World Scientific Publishing Company THE OPERATIONS DASHBOARD essential operational services, it is imperative that grid administrators can troubleshoot the problems

  10. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  11. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  12. Utah_e_livestock_company

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctional Materials for 2CindyErda Livestock

  13. Headquarters Facilities Master Security Plan

    Energy Savers [EERE]

    Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

  14. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

  17. A deeper look at climate change and national security.

    SciTech Connect (OSTI)

    Baker, Arnold Barry; Backus, George A.; Romig, Alton Dale, Jr.

    2010-03-01T23:59:59.000Z

    Climate change is a long-term process that will trigger a range of multi-dimensional demographic, economic, geopolitical, and national security issues with many unknowns and significant uncertainties. At first glance, climate-change-related national security dimensions seem far removed from today's major national security threats. Yet climate change has already set in motion forces that will require U.S. attention and preparedness. The extent and uncertainty associated with these situations necessitate a move away from conventional security practices, toward a small but flexible portfolio of assets to maintain U.S. interests. Thoughtful action is required now if we are to acquire the capabilities, tools, systems, and institutions needed to meet U.S. national security requirements as they evolve with the emerging stresses and shifts of climate change.

  18. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

  19. B Allison Adams, BSBA `91 Caspers Company

    E-Print Network [OSTI]

    Wu, Dapeng Oliver

    Jeremy Foley UF Athletic Association B Kristen Foley Nielsen B Dr. James R. Follain Nelson A. Rockefeller Acquisition Center B Darin Cook, BS `87 Infinite Energy B Kyle Cooper, BSBA `05 Orlando Predators B James Columbia Timber Company B Katie Davis James Moore & Company B Stuart Davis, BSAc '80, MAcc `81 Titan

  20. Company Name: JobsInNH.com

    E-Print Network [OSTI]

    New Hampshire, University of

    Company Name: JobsInNH.com Web Site: www.jobsinnh.com Industry: Advertising & Marketing Brief Company Overview: "Since 2002, JobsInNH.com has been New Hampshire?s #1 employment resource. As recruiting and accelerate your job search. Connect with the best employers in the state who are hiring now" Majors

  1. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2013 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report For the year ended 30 September 2013 Report of the Directors

  2. Company number 5857955 Wellcome Trust Finance plc

    E-Print Network [OSTI]

    Rambaut, Andrew

    Company number 5857955 Wellcome Trust Finance plc Annual Report and Financial Statements Year ended 30 September 2012 #12;Company number 5857955 Wellcome Trust Finance plc Contents Page Directors Trust Finance plc Directors' Report for the year ended 30 September 2012 Report of the Directors

  3. Quick Tips: 7 Tips to Researching Companies BASIC TIPS

    E-Print Network [OSTI]

    Gering, Jon C.

    Quick Tips: 7 Tips to Researching Companies BASIC TIPS: · Visit the company's website. This is one of the best ways to research a potential employer. You can learn about the company's history, industry, and products, how the company is structured, and being to gain an understanding of the company's culture

  4. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  5. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  6. Platts top 250 global energy company rankings

    SciTech Connect (OSTI)

    Mullen, T.; Leonard, M.

    2005-12-01T23:59:59.000Z

    Revenues and profits for many firms surged last year over previous years. The turnaround from last year's global survey is dramatic. Asset- and revenue-rich integrated oil and gas companies dominate the top rungs of the 2005 Platts Top 250 Global Energy Company Rankings. The following industry segments were analyzed: diversified utilities; exploration and production; electric utilities; gas utilities; integrated oil and gas companies; refining and marketing; independent power producers; coal and consumable fuel companies and storage and transfer companies; The total combined revenue for the coal and consumable fuels sector was $74.7 billion. Leaders in this sector were: Yanzhou Coal Mining Co., CONSOl Energy Inc., Peabody Energy Corp., PT Bumi Resources Tbk, Cameco Corp., and Arch Coal. 14 tabs.

  7. Two worlds, one smart card An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers to office buildings and plants, companies these days issue their employees a (smart) card that is bothTwo worlds, one smart card An integrated solution for physical access and logical security using

  8. Two worlds, one smart card # An integrated solution for physical access and logical security

    E-Print Network [OSTI]

    Hoepman, Jaap-Henk

    issued, controlling access to over 1500 buildings, fitted with in total more than 6000 smart card readers#ce buildings and plants, companies these days issue their employees a (smart) card that is both an identityTwo worlds, one smart card # An integrated solution for physical access and logical security using

  9. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  11. Safety, Security & Fire Report

    E-Print Network [OSTI]

    Straight, Aaron

    2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

  12. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  13. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  14. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

  15. How degeneracies can obscure interesting physics

    E-Print Network [OSTI]

    L. Zamick; A. Escuderos

    2012-11-16T23:59:59.000Z

    We show how degeneracies, accidental or otherwise, can obscure some interesting physics. We further show how one can get around this problem.

  16. Aligning Utility Interests with Energy Efficiency Objectives...

    Open Energy Info (EERE)

    Interests with Energy Efficiency Objectives: A Review of Recent Efforts at Decoupling and Performance Incentives Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Aligning...

  17. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  18. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  19. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  20. Safety and Security Interface Technology Initiative

    SciTech Connect (OSTI)

    Dr. Michael A. Lehto; Kevin J. Carroll; Dr. Robert Lowrie

    2007-05-01T23:59:59.000Z

    Safety and Security Interface Technology Initiative Mr. Kevin J. Carroll Dr. Robert Lowrie, Dr. Micheal Lehto BWXT Y12 NSC Oak Ridge, TN 37831 865-576-2289/865-241-2772 carrollkj@y12.doe.gov Work Objective. Earlier this year, the Energy Facility Contractors Group (EFCOG) was asked to assist in developing options related to acceleration deployment of new security-related technologies to assist meeting design base threat (DBT) needs while also addressing the requirements of 10 CFR 830. NNSA NA-70, one of the working group participants, designated this effort the Safety and Security Interface Technology Initiative (SSIT). Relationship to Workshop Theme. “Supporting Excellence in Operations Through Safety Analysis,” (workshop theme) includes security and safety personnel working together to ensure effective and efficient operations. One of the specific workshop elements listed in the call for papers is “Safeguards/Security Integration with Safety.” This paper speaks directly to this theme. Description of Work. The EFCOG Safety Analysis Working Group (SAWG) and the EFCOG Security Working Group formed a core team to develop an integrated process involving both safety basis and security needs allowing achievement of the DBT objectives while ensuring safety is appropriately considered. This effort garnered significant interest, starting with a two day breakout session of 30 experts at the 2006 Safety Basis Workshop. A core team was formed, and a series of meetings were held to develop that process, including safety and security professionals, both contractor and federal personnel. A pilot exercise held at Idaho National Laboratory (INL) in mid-July 2006 was conducted as a feasibility of concept review. Work Results. The SSIT efforts resulted in a topical report transmitted from EFCOG to DOE/NNSA in August 2006. Elements of the report included: Drivers and Endstate, Control Selections Alternative Analysis Process, Terminology Crosswalk, Safety Basis/Security Documentation Integration, Configuration Control, and development of a shared ‘tool box’ of information/successes. Specific Benefits. The expectation or end state resulting from the topical report and associated implementation plan includes: (1) A recommended process for handling the documentation of the security and safety disciplines, including an appropriate change control process and participation by all stakeholders. (2) A means to package security systems with sufficient information to help expedite the flow of that system through the process. In addition, a means to share successes among sites, to include information and safety basis to the extent such information is transportable. (3) Identification of key security systems and associated essential security elements being installed and an arrangement for the sites installing these systems to host an appropriate team to review a specific system and determine what information is exportable. (4) Identification of the security systems’ essential elements and appropriate controls required for testing of these essential elements in the facility. (5) The ability to help refine and improve an agreed to control set at the manufacture stage.

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Recovery Act Helps Fuel Cell Company Stay on Course | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Recovery Act Helps Fuel Cell Company Stay on Course Recovery Act Helps Fuel Cell Company Stay on Course January 7, 2010 - 3:41pm Addthis Joshua DeLung An innovative company in...

  3. Tennessee Small Business Investment Company Credit Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Tennessee Small Business Company Credit Act offers $120 million in gross premiums tax credits to insurance companies that invest in companies certified by the State of Tennessee as TNInvestcos....

  4. Sun Life Assurance Company of Canada is a member of the Sun Life Financial group of companies. 2005 Sun Life Assurance Company of Canada. All rights reserved.

    E-Print Network [OSTI]

    Mullins, Dyche

    JL 5/26/09 Sun Life Assurance Company of Canada is a member of the Sun Life Financial group of companies. © 2005 Sun Life Assurance Company of Canada. All rights reserved. Sun Life Financial and the globe symbol are registered trademarks of Sun Life Assurance Company of Canada. SLPC 5302 07/02 H I G H

  5. LLNL: Science in the National Interest

    ScienceCinema (OSTI)

    George Miller

    2010-09-01T23:59:59.000Z

    This is Lawrence Livermore National Laboratory. located in the Livermore Valley about 50 miles east of San Francisco, the Lab is where the nations topmost science, engineering and technology come together. National security, counter-terrorism, medical technologies, energy, climate change our researchers are working to develop solutions to these challenges. For more than 50 years, we have been keeping America strong.

  6. Industrial & Systems Engineering Areas of Engineering Interests

    E-Print Network [OSTI]

    Berdichevsky, Victor

    Industrial & Systems Engineering Areas of Engineering Interests The Department of Industrial and Systems Engineering understands our students may work as Industrial Engineers in other engineering industries, and to help prepare them for these careers, the ISE Areas of Interest was formulated. The courses

  7. PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES

    E-Print Network [OSTI]

    Greenslade, Diana

    i PUBLIC INTEREST DISCLOSURE (PID) POLICY AND PROCEDURES #12;PUBLIC INTEREST DISCLOSURE POLICY a disclosure under the PID Act 7 5.2. How to make a disclosure under the PID Act 7 6. PROCEDURES FOR AUTHORISED OFFICERS 9 7.1. Authorised Officer must provide information about the PID Act 9 7.2. Receiving

  8. Enterprise Security: A Community of Interest Based Approach Patrick McDaniel

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    . In this paper we explore a brownfield approach to hardening an enterprise network against active malware

  9. Regulation of Gas, Electric, and Water Companies (Maryland)

    Broader source: Energy.gov [DOE]

    The Public Service Commission is responsible for regulating gas, electric, and water companies in the state. This legislation contains provisions for such companies, addressing planning and siting...

  10. Electronic Document Management System PIA, BechtelJacobs Company...

    Energy Savers [EERE]

    Electronic Document Management System PIA, BechtelJacobs Company, LLC Electronic Document Management System PIA, BechtelJacobs Company, LLC Electronic Document Management System...

  11. Employee Concerns Tracking System, PIA, Bechtel Jacobs Company...

    Energy Savers [EERE]

    PIA, Bechtel Jacobs Company, LLC More Documents & Publications Electronic Document Management System PIA, BechtelJacobs Company, LLC Dosimetry Records System PIA, bechtel...

  12. Vermont Wind Measurement Company Still Strong | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    Vermont Wind Measurement Company Still Strong Vermont Wind Measurement Company Still Strong April 9, 2010 - 3:16pm Addthis NRG's new building utilizes solar power, but their...

  13. Smart Companies "Wake up" Night Shift Workers Make More Mistakes...

    Office of Environmental Management (EM)

    Smart Companies "Wake up" Night Shift Workers Make More Mistakes & More Prone to Accidents Smart Companies "Wake up" Night Shift Workers Make More Mistakes & More Prone to...

  14. Private Company Uses EERE-Supported Chemistry Model to Substantially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Private Company Uses EERE-Supported Chemistry Model to Substantially Improve Combustion Engine Simulation Software Private Company Uses EERE-Supported Chemistry Model to...

  15. Dow Chemical Company: Assessment Leads to Steam System Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a Petrochemical Plant Dow Chemical Company: Assessment Leads to Steam System Energy Savings in a...

  16. Business Plan of a Motorcycle Company : Case: Motosi Oy.

    E-Print Network [OSTI]

    Ranne, Jukka

    2011-01-01T23:59:59.000Z

    ??The purpose of this Thesis is to explain in detail the Business plan of Motosi Oy. The company is a small start-up company that buys… (more)

  17. Global Material Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

  18. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

  19. safeguards and security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

  20. Nuclear Security 101 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

  1. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

  2. International Nuclear Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

  3. Defense Nuclear Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

  4. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

  5. Tracking Multiple Topics for Finding Interesting Articles

    SciTech Connect (OSTI)

    Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

    2008-01-03T23:59:59.000Z

    We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 25% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

  6. Tracking Multiple Topics for Finding Interesting Articles

    SciTech Connect (OSTI)

    Pon, R K; Cardenas, A F; Buttler, D J; Critchlow, T J

    2007-02-15T23:59:59.000Z

    We introduce multiple topic tracking (MTT) for iScore to better recommend news articles for users with multiple interests and to address changes in user interests over time. As an extension of the basic Rocchio algorithm, traditional topic detection and tracking, and single-pass clustering, MTT maintains multiple interest profiles to identify interesting articles for a specific user given user-feedback. Focusing on only interesting topics enables iScore to discard useless profiles to address changes in user interests and to achieve a balance between resource consumption and classification accuracy. Also by relating a topic's interestingness to an article's interestingness, iScore is able to achieve higher quality results than traditional methods such as the Rocchio algorithm. We identify several operating parameters that work well for MTT. Using the same parameters, we show that MTT alone yields high quality results for recommending interesting articles from several corpora. The inclusion of MTT improves iScore's performance by 9% to 14% in recommending news articles from the Yahoo! News RSS feeds and the TREC11 adaptive filter article collection. And through a small user study, we show that iScore can still perform well when only provided with little user feedback.

  7. General Construction Company Private Development Procedure

    E-Print Network [OSTI]

    Eason, Scott W.

    2006-05-19T23:59:59.000Z

    administration and subcontractor management in the execution of each project. General’s current operations are very conducive to private development. However, the company can no longer rely on an oral system to relay historical processes and procedures...

  8. Matching Gift Companies Page 1 of 6

    E-Print Network [OSTI]

    Lazar, Aurel A.

    Arizona Public Service Company 23. Arch Chemicals Inc. 24. Armstrong World Industries 25. Arrow Incorporated 55. ConnectiCare, Inc 56. ConocoPhillips 57. Cooper Industries, Ltd. 58. CSG Systems International

  9. Fall 2012 FUPWG Meeting Welcome: Southern Company

    Broader source: Energy.gov [DOE]

    Presentation—given at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meeting—covers the Southern Company's retail service territory, financials, customers and sales, power generation, U.S. military projects, and more.

  10. Deere and Company Energy Management Program

    E-Print Network [OSTI]

    Boyd, P. M.

    1980-01-01T23:59:59.000Z

    An overview of the Deere & Company energy management program is discussed. A review is made of seven key elements which have contributed to the success of the program. Installed projects and established programs are identified and discussed...

  11. New Mexico Gas Company- Residential Efficiency Programs

    Broader source: Energy.gov [DOE]

    The New Mexico Gas Company provides incentives for energy saving measures and improvements to residential homes. Rebates are available for adding insulation and for homes which attain Energy Star...

  12. A virtual company concept for reservoir management

    SciTech Connect (OSTI)

    Martin, F.D. [Dave Martin and Associates, Inc. (United States); Kendall, R.P.; Whitney, E.M. [Los Alamos National Lab., NM (United States)

    1998-12-31T23:59:59.000Z

    This paper describes how reservoir management problems were pursued with a virtual company concept via the Internet and World Wide Web. The focus of the paper is on the implementation of virtual asset management teams that were assembled with small independent oil companies. The paper highlights the mechanics of how the virtual team transferred data and interpretations, evaluated geological models of complex reservoirs, and used results of simulation studies to analyze various reservoir management strategies.

  13. An analysis of the bank holding company

    E-Print Network [OSTI]

    Facka, David William

    1969-01-01T23:59:59.000Z

    company exercises more supervision over the investments of each affiliate bank than over any of the other affiliate bank's activities. This service improves the flow of information, thus increasing the productivity of investments . Many of the services...) the conven- ience, needs, and welfare of the communities and the area concerned; and (5) whether or not the effect of such acquisition or merger or consolidation would be to expand the size or extent of the bank holding company system involved beyond...

  14. Finance, IT Operations& InformationSecurity Dear Colleagues,

    E-Print Network [OSTI]

    -examine collectively the customer service aspect of our grant and contract management. A dozen SEAS members, including, is Information Technology. While Indir has stepped into the role of Interim IT Director to keep the proverbial and to check out interesting tips about securing mobile devices and avoiding phishing scams. Harry Dumay, Ph

  15. Truffles --Secure File Sharing With Minimal System Administrator Intervention

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Truffles -- Secure File Sharing With Minimal System Administrator Intervention Peter Reiher Thomas sharing between arbitrary users at arbitrary sites connected by a network. Truffles is an interesting the potential of greatly increasing the workload of system administrators, if the services are not designed

  16. UCSF FOUNDATION DONATION OF SECURITIES: STOCKS AND MUTAL FUNDS

    E-Print Network [OSTI]

    Yamamoto, Keith

    -over- UCSF FOUNDATION DONATION OF SECURITIES: STOCKS AND MUTAL FUNDS GIFT TO CURRENT ACCOUNT Thank you for your interest in making a gift of stocks or mutual fund shares to the UCSF Foundation. We Foundation of your donation. Broker Instructions -- Credit to: State Street Bank & Trust, DTC #997, UCSF

  17. UCSF FOUNDATION DONATION OF SECURITIES: STOCKS AND MUTAL FUNDS

    E-Print Network [OSTI]

    Yamamoto, Keith

    -over- UCSF FOUNDATION DONATION OF SECURITIES: STOCKS AND MUTAL FUNDS GIFT TO ENDOWMENT ACCOUNT Thank you for your interest in making a gift of stocks or mutual funds shares to the UCSF Foundation. We to notify UCSF Foundation of your donation. · Broker Instructions -- Credit to: State Street Bank & Trust

  18. Environmental, Safety, Security, and Health Policy Brookhaven National Laboratory

    E-Print Network [OSTI]

    Ohta, Shigemi

    Environmental, Safety, Security, and Health Policy Brookhaven National Laboratory This document is a statement of BNL's ESSH policy. BNL is a world leader in scientific research and strives to demonstrate's progress on ESSH goals and adherence to this policy, I invite all interested parties to provide me

  19. COMMISSION REPORT PUBLIC INTEREST ENERGY RESEARCH

    E-Print Network [OSTI]

    policy, loading order, jobs, clean energy, energy infrastructure, electric vehicles, greenhouse gasCOMMISSION REPORT PUBLIC INTEREST ENERGY RESEARCH 2013 ANNUAL REPORT MARCH 2014 CEC5002014035CMF CALIFORNIA ENERGY COMMISSION Edmund G. Brown Jr., Governor #12

  20. Copyright and the public interest in China 

    E-Print Network [OSTI]

    Tang, Guan Hong

    2009-01-01T23:59:59.000Z

    This thesis will consider how the multidimensional public interest concept at once informs development of Chinese copyright law and also limits it. Since 1990 China has awarded copyright - individual rights - but also ...

  1. Energy Efficiency Interest Rate Reduction Program

    Broader source: Energy.gov [DOE]

    The Alaska Housing Finance Corporation (AHFC) offers interest rate reductions to home buyers purchasing new and existing homes with 5 Star and 5 Star Plus energy ratings. All homes constructed on...

  2. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

  3. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

  4. Safety, Security & Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

  5. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

  6. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  7. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  8. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  9. SAFEGUARDS AND SECURITY INTEGRATION WITH SAFETY ANALYSIS

    SciTech Connect (OSTI)

    Hearn, J; James Lightner, J

    2007-04-13T23:59:59.000Z

    The objective of this paper is to share the Savannah River Site lessons learned on Safeguards and Security (S&S) program integration with K-Area Complex (KAC) safety basis. The KAC Documented Safety Analysis (DSA), is managed by the Washington Savannah River Company (WSRC), and the S&S program, managed by Wackenhut Services, Incorporated--Savannah River Site (WSI-SRS). WSRC and WSI-SRS developed a contractual arrangement to recognize WSI-SRS requirements in the KAC safety analysis. Design Basis Threat 2003 (DBT03) security upgrades required physical modifications and operational changes which included the availability of weapons which could potentially impact the facility safety analysis. The KAC DSA did not previously require explicit linkage to the S&S program to satisfy the safety analysis. WSI-SRS have contractual requirements with the Department of Energy (DOE) which are separate from WSRC contract requirements. The lessons learned will include a discussion on planning, analysis, approval of the controls and implementation issues.

  10. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  11. The changing face of Hanford security 1990--1994

    SciTech Connect (OSTI)

    Thielman, J.

    1995-12-01T23:59:59.000Z

    The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

  12. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

  13. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  14. US Energy Service Company Industry: History and Business Models

    Office of Energy Efficiency and Renewable Energy (EERE)

    Information about the history of US Energy Service Company including industry history, setbacks, and lessons learned.

  15. Parallel Processing Letters fc World Scientific Publishing Company

    E-Print Network [OSTI]

    Calheiros, Rodrigo N.

    World Scientific Publishing Company http://ejournals.wspc.com.sg/ppl/ppl.shtml SCHEDULING AND MANAGEMENT

  16. Researching Industries and Employers WHY RESEARCH A COMPANY?

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    ://www.fortune.com Google or other search engines - type in the company name and see what comes up Hoover's OnlineResearching Industries and Employers WHY RESEARCH A COMPANY? Company and industry research about a particular industry or company. It will help you decide on the right industry for you

  17. Evaluation of Niche Markets For Small Scale Forest Products Companies

    E-Print Network [OSTI]

    Evaluation of Niche Markets For Small Scale Forest Products Companies Jan J. Hacker Resource.....................................................................................................................49 2 #12;Evaluation of Niche Markets for Small Scale Forest Products Companies 1.0 Introduction companies might identify and exploit them. Strategies employed by various companies and organizations within

  18. Discovery Park Impact Attracting New Companies and Start-ups

    E-Print Network [OSTI]

    Holland, Jeffrey

    Discovery Park Impact Attracting New Companies and Start-ups NEED The state of Indiana is positioned to attract new companies and startups, especially those companies in the life sciences sector with PDS Biotechnology, a company formed around innovative liposome drug delivery technology from

  19. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  1. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  2. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  3. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  4. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  5. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  6. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  8. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

  9. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  11. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  12. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  13. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  14. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  15. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  16. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  17. Telegraph Publishing Company INews and Obituaries Archive IEasy Printing Page 1 of3 Telegraph Publishing Company

    E-Print Network [OSTI]

    New Hampshire, University of

    Telegraph Publishing Company INews and Obituaries Archive IEasy Printing Page 1 of3 Telegraph Publishing Company News and Obi aries Archive THIS STORY HAS BEEN FORMATTED FOR EASY PRINTING Click here jo. It lets emergency officials do everything from tum on flashers to 1/29/2007http://nl.newsbank.com/nl-search

  18. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

  19. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    , efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  2. Sandia National Laboratories: Ocean Renewable Power Company's TidGen(tm)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLSMolten-Salt StorageNo More GreenWorkshopsO.V.Company's

  3. Architectural support for enhancing security in clusters

    E-Print Network [OSTI]

    Lee, Man Hee

    2009-05-15T23:59:59.000Z

    to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

  4. 8 Kerr Administration Building (541) 737-4085 www.oregonstate.edu/career When preparing for an interview or job search, it's important to research companies, product lines and

    E-Print Network [OSTI]

    Escher, Christine

    · (541) 737-4085 · www.oregonstate.edu/career When preparing for an interview or job search, it's important to research companies, product lines and competitors. Research will provide information to help you decide whether you're interested in the company and important data to refer to during an interview

  5. Interested Parties - AFL-CIO | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Parties - AFL-CIO 20091015104114.pdf More Documents & Publications Interested Parties - Myriant Interested Parties - NRG Energy Interested Parties - 1603 Program Discussion...

  6. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  7. Workforce Statistics - Office of Secure Transportation | National...

    National Nuclear Security Administration (NNSA)

    Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  8. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  9. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  10. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  11. New well control companies stress planning, engineering

    SciTech Connect (OSTI)

    Bell, S.; Wright, R.

    1994-04-01T23:59:59.000Z

    The technology for capping a blowing well has not changed during the last 50 years. Still, operators are finding new ways of using well control companies' expertise to help avoid potentially disastrous situations. This trend is especially critical given the current environmentally sensitive and cost-cutting times facing the oil industry. While regulatory agencies world-wide continue to hinder well control efforts during an offshore event, well control companies are focusing on technologies to make their job easier. Some of the most exciting are the hydraulic jet cutter, which gained fame in Kuwait, and electromagnetic ranging for drilling more accurate relief wells. With the number of subsea wells increasing, subsea intervention is a major target for future innovations. Well control companies are experiencing a change in their role to the offshore oil industry. Well control professionals discuss this expanded responsibility as well as other aspects of offshore blowouts including regulatory hindrances, subsea intervention and future technologies.

  12. Interest Theory Richard C. Penney Purdue University

    E-Print Network [OSTI]

    2007-09-19T23:59:59.000Z

    We recommend the TI BA II Plus, either the solar or battery version. .... per year. Bank A compounds yearly but uses simple interest for partial periods ..... (29) Assuming that house prices have inflated at an average rate of 8% per year for each ...

  13. Interest Theory Richard C. Penney Purdue University

    E-Print Network [OSTI]

    1910-30-42T23:59:59.000Z

    arial Exam. We recommend the TI BA II Plus, either the solar or battery version. .... Bank A compounds yearly but uses simple interest for partial periods while bank ..... Assuming that house prices have inflated at an average rate of 8% per year.

  14. Hydropower Potential Scoping Study Gauging Interest

    E-Print Network [OSTI]

    6/19/2013 1 Hydropower Potential Scoping Study ­ Gauging Interest Generating Resources Advisory and associated technologies. ­ Hydropower upgrades, new hydropower projects 2 Purpose Develop a hydro supply curve to determine the hydropower development potential in the NW region ­ Council's Seventh Power Plan

  15. Processing Personal Health Data in Legitimate Interest

    E-Print Network [OSTI]

    Alexin, Zoltán

    : excluding data from the National Health Insurance Fund database related to unsubsidized care events, medical diagnosis, the provision of care or treatment or the management of health-care services, and whereProcessing Personal Health Data in Legitimate Interest ,,Infocommunication technologies

  16. COMMISSION REPORT PUBLIC INTEREST ENERGY RESEARCH

    E-Print Network [OSTI]

    COMMISSION REPORT PUBLIC INTEREST ENERGY RESEARCH 2010 ANNUAL REPORT CALIFORNIA ENERGY of the Legislature: I am pleased to present this annual report to you. This report presents a review COMMISSION Edmund G. Brown Jr., Governor MARCH 2011 CEC5002011031CMF #12;CALIFORNIA ENERGY COMMISSION

  17. Cooperative monitoring and its role in regional security

    SciTech Connect (OSTI)

    Biringer, K.; Olsen, J.; Lincoln, R.; Wehling, F. [and others

    1997-03-01T23:59:59.000Z

    Cooperative monitoring systems can play an important part in promoting the implementation of regional cooperative security agreements. These agreements advance the national security interests of the United States in a post Cold War environment. Regional issues as widely varying as nuclear nonproliferation, trade and environmental pollution can be the source of tensions which may escalate to armed conflict which could have global implications. The Office of National Security Policy Analysis at the US Department of Energy (DOE) has an interest in seeking ways to promote regional cooperation that can reduce the threats posed by regional conflict. DOE technologies and technical expertise can contribute to developing solutions to a wide variety of these international problems. Much of this DOE expertise has been developed in support of the US nuclear weapons and arms control missions. It is now being made available to other agencies and foreign governments in their search for regional security and cooperation. This report presents two examples of interest to DOE in which monitoring technologies could be employed to promote cooperation through experimentation. The two scenarios include nuclear transparency in Northeast Asia and environmental restoration in the Black Sea. Both offer the potential for the use of technology to promote regional cooperation. The issues associated with both of these monitoring applications are presented along with examples of appropriate monitoring technologies, potential experiments and potential DOE contributions to the scenarios.

  18. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

  20. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

  1. Security Clearances; Limitations

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

  2. Strengthening Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

  3. Exceptional service in the national interest www.sandia.gov

    E-Print Network [OSTI]

    Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE) and the International, Homeland & Nuclear Security Strategic Management Unit Revised July 2012 Jill Hruby is the Vice as the corporate strategic thrust on Nuclear Security (in all, about $274M in funding during FY10). The Nuclear

  4. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    a class project done with the Yolo County Elections Office.would find interesting. Yolo County, California, makes bothprefer. The Clerk-Recorder, Yolo County’s chief election

  5. National security and the comprehensive test ban treaty

    SciTech Connect (OSTI)

    Landauer, J.K.

    1980-08-01T23:59:59.000Z

    For nearly three years now, the US, UK, and USSR have been working on the draft of a treaty that would ban all nuclear explosions (both peaceful applications and weapon tests) and institute verification and monitoring provisions to ensure compliance with the treaty. The status of the draft treaty is summarized. The question, Is a CTBT really in the interest of US national security. is analyzed with arguments used by both proponents and opponents of the CTBT. It is concluded that there are arguments both for and against a CTBT, but, for those whose approach to national security can be expressed as peace through preparedness, the arguments against a CTBT appear persuasive. (LCL)

  6. Qualified List of Energy Service Companies

    Broader source: Energy.gov [DOE]

    The Federal Energy Management Program (FEMP) established the U.S. Department of Energy (DOE) Qualified List of Energy Service Companies (ESCOs) in accordance with the Energy Policy Act of 1992 and 10 CFR 436. The DOE Qualified List of ESCOs is composed of private industry firms that have submitted an application and been qualified by a qualification review board comprised of DOE staff.

  7. Spin-out Company Portfolio Technology Transfer

    E-Print Network [OSTI]

    Aickelin, Uwe

    Spin-out Company Portfolio 2012 Technology Transfer The Sir Colin Campbell Building The University `Entrepreneurial University of the Year' in 2008. The Technology Transfer Office (TTO) has close links detail. Dr Susan Huxtable Director, Technology Transfer Tel: +44 (0)115 84 66388 Email: susan

  8. PREDICTION COMPANY Slippage March 1996 1

    E-Print Network [OSTI]

    -bond..................................................................................................................................5 2.2 Oil price, and is the "expected price". For futures the expected price is the price of the last tick before the order is generated. "Expected price" is s s sign o( ) f e­( )= o f e #12;PREDICTION COMPANY Slippage

  9. Hydrogen Technology Park DTE Energy -Company Overview

    E-Print Network [OSTI]

    Gas Production Detroit Edison Power Generation Energy Services* Energy Trading Biomass Energy Coal billion · 2.6 million customers · 11,000 MW of generation · 600 BCF natural gas delivery · 11,000 employees #12;3 Diversified Energy and Energy Technology Company * Energy Services: Coal Based Fuels

  10. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W.T.; Ferrante, T.A.

    1998-10-13T23:59:59.000Z

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface. 8 figs.

  11. Vehicle for carrying an object of interest

    DOE Patents [OSTI]

    Zollinger, W. Thor (Idaho Falls, ID); Ferrante, Todd A. (Westerville, OH)

    1998-01-01T23:59:59.000Z

    A vehicle for carrying an object of interest across a supporting surface including a frame having opposite first and second ends; a first pair of wheels fixedly mounted on the first end of the frame; a second pair of wheels pivotally mounted on the second end of the frame; and a pair of motors borne by the frame, each motor disposed in driving relation relative to one of the pairs of wheels, the motors propelling the vehicle across the supporting surface.

  12. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

  13. T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

  14. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

  15. Operational improvements at Jewell Coal and Coke Company`s non-recovery ovens

    SciTech Connect (OSTI)

    Ellis, C.E.; Pruitt, C.W.

    1995-12-01T23:59:59.000Z

    Operational improvements at Jewell Coal and Coke Company over the past five years includes safety and environmental concerns, product quality, equipment availability, manpower utilization, and productivity. These improvements with Jewell`s unique process has allowed Jewell Coal and Coke Company to be a consistent, high quality coke producer. The paper briefly explains Jewell`s unique ovens, their operating mode, improved process control, their maintenance management program, and their increase in productivity.

  16. Dye filled security seal

    DOE Patents [OSTI]

    Wilson, Dennis C. W. (Tijeras, NM)

    1982-04-27T23:59:59.000Z

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

  17. Cyberspace security system

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  18. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

  19. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

  20. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

  1. Security | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

  2. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

  3. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

  4. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

  6. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

  7. SunShot Award Helps Solar Tracking Company Expand Internationally...

    Office of Environmental Management (EM)

    SunShot Award Helps Solar Tracking Company Expand Internationally SunShot Award Helps Solar Tracking Company Expand Internationally October 30, 2014 - 5:46pm Addthis SunShot...

  8. Challenges for Growing Engineering Services within a Large Construction Company

    E-Print Network [OSTI]

    Olivares, R. Omar

    2008-12-19T23:59:59.000Z

    PKS is a construction company with annual revenues of 6 billon dollars. Some engineering services already exist in the company, yet the author believes that there is capacity for growth in engineering services; specifically in the discipline...

  9. Biomass Company Sets Up Shop in High School Lab | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Biomass Company Sets Up Shop in High School Lab Biomass Company Sets Up Shop in High School Lab March 30, 2010 - 2:45pm Addthis Stephen Graff Former Writer & editor for Energy...

  10. SEP Success Story: Green Launching Pad Taps Six More Companies...

    Energy Savers [EERE]

    Green Launching Pad Taps Six More Companies for Take-off SEP Success Story: Green Launching Pad Taps Six More Companies for Take-off April 29, 2011 - 9:58am Addthis Yesterday, U.S....

  11. Companies in Munich, employing Physicists General job databases

    E-Print Network [OSTI]

    Meissner Bolte www.mbp.de Bain & Company Germany, Inc. www.bain.de Consultancies Booz Allen Hamilton GmbH www.boozallen.de Booz & Company www.booz.com Basycon Unternehmensberatung GmbH www

  12. Mobile marketing strategies for B2C companies

    E-Print Network [OSTI]

    Sawant, Samir

    2010-01-01T23:59:59.000Z

    Mobile application ('apps') development is a recent pandemic phenomenon; companies that are not associated with mobile technologies are noticing it and want to develop their own mobile apps. However, these companies do not ...

  13. Asset Score Introduction for Energy Efficiency Services Companies...

    Energy Savers [EERE]

    Energy Efficiency Services Companies Asset Score Introduction for Energy Efficiency Services Companies February 25, 2015 2:00PM to 3:00PM EST https:attendee.gotowebinar.comrt...

  14. Litigation against public companies that fail to disclose timely information

    E-Print Network [OSTI]

    Leong, Hein Hing

    2014-01-01T23:59:59.000Z

    Every year, between 150 and 200 class action lawsuits are filed against public listed companies in the United States. When disclosure of the lawsuits is made to the investing public, the stock prices of these companies ...

  15. Asset Score Introduction for Energy Efficiency Services Companies...

    Energy Savers [EERE]

    Energy Efficiency Services Companies Asset Score Introduction for Energy Efficiency Services Companies February 27, 2015 2:00PM to 3:00PM EST https:attendee.gotowebinar.comrt...

  16. Corporate Energy Management: A Survey of Large Manufacturing Companies

    E-Print Network [OSTI]

    Norland, D. L.; Lind, L.

    Corporate practices regarding energy management vary substantially from one company to another. Some companies pay close attention to energy use throughout the corporation while others pay scant attention. This paper first describes what we call...

  17. Matching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation

    E-Print Network [OSTI]

    Gilchrist, James F.

    Corporation Foundation The Eaton Charitable Fund Electroline Corporation Eli Lilly and Company FoundationMatching Gift Companies LEHIGH UNIVERSITY 1 3M Corporation Abbott Laboratories Accenture Foundation Technologies, Inc. Air Products Air Products Foundation Albemarle Corporation Alcoa Foundation Alliance Capital

  18. Special Provisions Affecting Gas, Water, or Pipeline Companies (South Carolina)

    Broader source: Energy.gov [DOE]

    This legislation confers the rights and privileges of telegraph and telephone companies (S.C. Code 58-9) on pipeline and water companies, and contains several additional provisions pertaining to...

  19. Intern experience at URS Company: an internship report

    E-Print Network [OSTI]

    Elkarmi, Fawwaz, 1950-

    2013-03-13T23:59:59.000Z

    This report describes the author's internship experience with URS Company - Dallas, Texas, from May 1980 to May 1981. The internship company is a consulting engineering firm engaged in providing professional services...

  20. Illinois Company Implementing Solar Energy | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Company Implementing Solar Energy Illinois Company Implementing Solar Energy March 23, 2010 - 2:00pm Addthis J.F. Electric will soon install its own solar rooftop solar panels,...

  1. Optimal capital structure of deep sea foreign freight transportation companies

    E-Print Network [OSTI]

    Georgiadis, Vasilis

    2014-01-01T23:59:59.000Z

    This thesis aims to understand the optimal leverage range for shipping companies (maritime foreign freight transportation companies - SIC 4412), through data analysis. This study confirms that in a traditional industry ...

  2. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  3. Technology Transfer Success Stories, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

  4. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  5. David Telles wins NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  7. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  8. Underwriter Medical Insurance Al Rajhi Company for Cooperative Insurance

    E-Print Network [OSTI]

    Omar, Mohammad H.

    and Dammam with a plan to open more offices in different cities in Saudi Arabia. About the Company See more

  9. Evaluation and redesign of a company's distribution network

    E-Print Network [OSTI]

    Burgos Fuentes, Sergio Armando

    2004-11-15T23:59:59.000Z

    EVALUATION AND REDESIGN OF A COMPANY?S DISTRIBUTION NETWORK A Record of Study by SERGIO ARMANDO BURGOS FUENTES Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... for the degree of DOCTOR OF ENGINEERING August 2004 Major Subject: Engineering College of Engineering EVALUATION AND REDESIGN OF A COMPANY?S DISTRIBUTION NETWORK A Record of Study by SERGIO ARMANDO BURGOS FUENTES Approved...

  10. Department of Construction Management Companies Hiring Our Graduates

    E-Print Network [OSTI]

    , Raleigh, NC D. R. Horton, Myrtle Beach, SC D.S. Simmons, Inc., Goldsboro, NC Daniels & Daniels Company

  11. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  12. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  13. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  14. What Covered Interest Parity Implies about the Theory of Uncovered Interest Parity.

    E-Print Network [OSTI]

    Pippenger, John

    2012-01-01T23:59:59.000Z

    covered interest parity (CIP) implies that the theory canSection 3 describes what covered CIP implies about UIP.role of risk premiums when CIP holds. Section 5 uses Sarno

  15. Interest networks : understanding the influence of interesting people in an organization

    E-Print Network [OSTI]

    Ma, Julia Shuhong

    2012-01-01T23:59:59.000Z

    This thesis applies network theory to firms, their employees, and various aspects of the employees to understand diversity within an industry at both the firm-level and employee-level. We hypothesize that the interest ...

  16. Kharisma Jaya Gemilang (KJG), an Indonesian company part-

    E-Print Network [OSTI]

    companies based in Asia, Africa, and South America. We are also engaged in timber trade policy initiativesKharisma Jaya Gemilang (KJG), an Indonesian company part- nering with TTAP received the Tropical verification through a variety of site visits of companies engaged in the process. Rachel But- ler, Head

  17. Page 1 of 2 UNIVERSITY OF SUSSEX WHOLLY OWNED COMPANIES

    E-Print Network [OSTI]

    Sussex, University of

    Page 1 of 2 UNIVERSITY OF SUSSEX ­ WHOLLY OWNED COMPANIES FREEDOM OF INFORMATION PUBLICATION SCHEME companies from 1 January 2009. The Guide is intended as a summary of where the classes of information for Wholly Owned Companies) may be accessed. 2. The Guide does not list individual publications covered

  18. National Forest Land Scheme case study Kilfinan Community Forest Company

    E-Print Network [OSTI]

    ;The hill grazing land that became Acharossan Forest was acquired by the Forestry Commission in 1963National Forest Land Scheme case study Kilfinan Community Forest Company: Acharossan Forest The applicant Kilfinan Community Forest Company (KCFC) is a charitable company limited by guarantee established

  19. Dutch Wholesale Company Highway 57 North Elnora, IN 47529

    E-Print Network [OSTI]

    2011 Dutch Wholesale Company Highway 57 North · Elnora, IN 47529 TOLL FREE: (800) 472-9178 · FAX States only. J enclosed is a check payable to Dutch Wholesale Company J J please send payment with your! Thank You! Dutch Wholesale Company Highway 57 North Elnora, IN 47529 Phone: (800) 472-9178 Fax: (812

  20. A Start-up company to start your career

    E-Print Network [OSTI]

    A Start-up company to start your career Professional Development Seminar March 6, 2013 #12;What is a start-up company? · Small, just started · Typically 1-5 years old · Often no products, no sales · Developing something totally new · May, or may not be a market #12;What is a start-up company? · Funding

  1. Research Investments in Large Indian Software Companies Pankaj Jalote

    E-Print Network [OSTI]

    Jalote, Pankaj

    of the company can use to improve the business. Research is typically not a business or a profit center to bring out newer products in the market place. But why does a service company need investment in researchResearch Investments in Large Indian Software Companies Pankaj Jalote Professor, Department

  2. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  3. Meeting State Carbon Emission Requirements through Industrial Energy Efficiency: The Southern California Gas Company’s Industrial End User Program

    Broader source: Energy.gov [DOE]

    This case study describes the Southern California Gas Company’s Industrial End User program, which helps large industrial customers increase energy efficiency and reduce energy use and greenhouse gas emissions.

  4. Analysis of Strategies of Companies under Carbon Constraint: Relationship between Profit Structure of Companies and Carbon/Fuel Price Uncertainty

    E-Print Network [OSTI]

    Hashimoto, Susumu

    This paper examines the relationship between future carbon prices and the expected profit of companies by case studies with model companies. As the future carbon price will vary significantly in accordance with the political ...

  5. August 2000 SECURITY FOR PRIVATE

    E-Print Network [OSTI]

    a small, in-house phone company for the organization that operates it. Protection of the PBX is thus - a form of passive attack in which an intruder observes information about calls (although not necessarily

  6. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  7. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  8. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  9. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  10. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  11. Foreign Energy Company Competitiveness: Background information

    SciTech Connect (OSTI)

    Weimar, M.R.; Freund, K.A.; Roop, J.M.

    1994-10-01T23:59:59.000Z

    This report provides background information to the report Energy Company Competitiveness: Little to Do With Subsidies (DOE 1994). The main body of this publication consists of data uncovered during the course of research on this DOE report. This data pertains to major government energy policies in each country studied. This report also provides a summary of the DOE report. In October 1993, the Office of Energy Intelligence, US Department of Energy (formerly the Office of Foreign Intelligence), requested that Pacific Northwest Laboratory prepare a report addressing policies and actions used by foreign governments to enhance the competitiveness of their energy firms. Pacific Northwest Laboratory prepared the report Energy Company Competitiveness Little to Do With Subsidies (DOE 1994), which provided the analysis requested by DOE. An appendix was also prepared, which provided extensive background documentation to the analysis. Because of the length of the appendix, Pacific Northwest Laboratory decided to publish this information separately, as contained in this report.

  12. Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes

    E-Print Network [OSTI]

    Bishop, Matt

    of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

  13. Property:Affiliated Companies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories onFocusOskiPhilipspresents newValues Jump to: navigation,Companies

  14. Property:CompanyType | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories onFocusOskiPhilipspresents newValues Jump to:CompanyOwnership

  15. Northwest Geothermal Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoading map...(Utility Company)References ↑ USNorthglenn, Colorado:CountyNorthwest Geothermal

  16. Obero Brasileira Power Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoading map...(Utility Company)ReferencesNuiqsut,Place,Oakmont, Pennsylvania:Oatfield,Obero

  17. Ocean Energy Company LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoading map...(Utility Company)ReferencesNuiqsut,Place,Oakmont,ObionAcres,LLC Jump to:

  18. American Transmission Company LLC | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCT Biomass Facility Jump to: navigation, search NameCompany LLC

  19. Exelon Energy Company (Pennsylvania) | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Power Basics (TheEtelligence (Smart Grid Project)Company (Pennsylvania) Jump to:

  20. Pricing Security L. Jean Camp

    E-Print Network [OSTI]

    Camp, L. Jean

    documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

  1. Fluid Mechanics and Homeland Security

    E-Print Network [OSTI]

    Settles, Gary S.

    Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

  2. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  3. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  4. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  5. FOOD SECURITY: WAYS FORWARD THROUGH

    E-Print Network [OSTI]

    Zaferatos, Nicholas C.

    FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

  6. Paper on "Other Major Litigation of Direct Interest to DOE" ...

    Broader source: Energy.gov (indexed) [DOE]

    Paper on "Other Major Litigation of Direct Interest to DOE" Paper on "Other Major Litigation of Direct Interest to DOE" Paper on Other Major Litigation of Direct Interest to DOE,...

  7. Shifting Interest Regimes of the Working Classes in Latin America

    E-Print Network [OSTI]

    Berins Collier, Ruth; Handlin, Samuel P.

    2005-01-01T23:59:59.000Z

    Handlin IIR Working Paper Shifting Interest Regimes of the2000), “Working-Class Power, Capitalist-Class Interest, andShifting Interest Regimes of the Working Classes in Latin

  8. Report to Congress: Expressions of interest in commercial clean coal technology projects in foreign countries

    SciTech Connect (OSTI)

    NONE

    1995-06-01T23:59:59.000Z

    This report was prepared in response to the guidance provided by the Congress in the course of the Fiscal Year 1995 appropriations process for the Department of Energy`s (DOE) Office of Fossil Energy (FE). As described in detail below, DOE was directed to make the international dissemination of Clean Coal Technologies (CCTs) an integral part of its policy to reduce greenhouse gas emissions in developing countries. Congress directed DOE to solicit ``Statements of Interest`` in commercial projects employing CCTs in countries projected to have significant growth in greenhouse gas emissions. Additionally, DOE was asked to submit to the Congress a report that analyzes the information contained in the Statements of Interest, and that identifies the extent to which various types of Federal incentives would accelerate the commercial availability of these technologies in an international context. In response to DOE`s solicitation of 18 November 1994, 77 Statements of Interest were received from 33 companies, as well as five additional materials. The contents of these submittals, including the requested Federal incentives, the CCTs proposed, the possible host countries, and the environmental aspects of the Statements of Interest, are described and analyzed in the chapters that follow.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  10. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  11. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  12. Technical analysis of US Army Weapons Systems and related advanced technologies of military interest. Final report

    SciTech Connect (OSTI)

    NONE

    1991-06-14T23:59:59.000Z

    This report summarizes the activities and accomplishments of an US Army technology security project designed to identify and develop effective policy guidelines for militarily critical technologies in specific Army systems and in broad generic technology areas of military interest, Individual systems analyses are documented in separate Weapons Systems Technical Assessments (WSTAs) and the general generic technology areas are evaluated in the Advanced Technology Assessment Reports (ATARs), However, specific details of these assessments are not addressed here, only recommendations regarding aspects of the defined approach, methodology, and format are provided and discussed.

  13. (Expired) Nationwide Limited Public Interest Waiver for LED Lighting...

    Energy Savers [EERE]

    (Expired) Nationwide Limited Public Interest Waiver for LED Lighting and HVAC Units: February 11, 2010 (Expired) Nationwide Limited Public Interest Waiver for LED Lighting and HVAC...

  14. UC Center for Information Technology Research in the Interest...

    Open Energy Info (EERE)

    UC Center for Information Technology Research in the Interest of Society (CITRIS) Jump to: navigation, search Logo: UC Center for Information Technology Research in the Interest of...

  15. Interested Parties - Smith Dawson & Andrews | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Smith Dawson & Andrews Interested Parties - Smith Dawson & Andrews 09-03-10SmithDawsonAndrews.pdf More Documents & Publications Interested Parties - ARPA-E National...

  16. Independent Activity Report, Office of Secure Transportation...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

  17. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  18. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  19. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  20. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  1. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  2. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  3. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

  4. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  5. National Securities Technologies _NSTec_ Livermore Operations...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

  6. Preliminary Notice of Violation, National Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

  7. National Nuclear Security Administration Appropriation and Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

  8. Independent Oversight Review, Nevada National Security Site,...

    Broader source: Energy.gov (indexed) [DOE]

    and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

  9. Automated Security Compliance Tool for the Cloud.

    E-Print Network [OSTI]

    Ullah, Kazi Wali

    2012-01-01T23:59:59.000Z

    ?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

  10. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  11. SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...

    Broader source: Energy.gov (indexed) [DOE]

    COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

  12. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  13. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  14. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Broader source: Energy.gov (indexed) [DOE]

    8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

  15. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  16. Beyond Google: Companies, Industries and Research using the Library November 2010

    E-Print Network [OSTI]

    Abolmaesumi, Purang

    Guide. In Factiva, select Companies/Markets tab, then Company. Search by company name for a report which, industry and trade. It also has fulltext of The Wall Street Journal. Search by company name using the Company/Org option in the dropdown menu next to the search box to retrieve articles about a company from

  17. Beyond Google: Companies, Industries and Research using the Library November 2011

    E-Print Network [OSTI]

    Abolmaesumi, Purang

    , select Companies/Markets tab, then Company. Search by company name for a report which includes, industry and trade. It also has fulltext of The Wall Street Journal. Search by company name using the Company/Org option in the dropdown menu next to the search box to retrieve articles about a company from

  18. Security control methods for CEDR

    SciTech Connect (OSTI)

    Rotem, D.

    1990-09-01T23:59:59.000Z

    The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

  19. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  20. National Security Science July 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

  1. Property:CompanyOwnership | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories onFocusOskiPhilipspresents newValues Jump to:CompanyOwnership Jump

  2. Noor Holding Company NOOR | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy ResourcesLoading map...(Utility Company) Jump to:City) JumpOpenJV JumpTectonic Jump to: navigation,Noor

  3. Company Name Tax Credit* Manufacturing Facility's

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up fromDepartmentTieCelebrate Earth Codestheat Two AluminumWHAT:Energy1Company Name

  4. Ascendant Energy Company Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300AlgoilEnergyElectric Coop CorpInformation ArthurAscendant Energy Company

  5. BP Energy Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 EastMaine: EnergyAustin Energy Place:Guidance DocumentsOperations |BP AmericaCompany

  6. NSTAR Electric Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating Solar Powerstories onFocus AreaDataBus Jump to:NSTAR Electric Company Country

  7. TEST UTILITY COMPANY | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-g GrantAtlas (PACAOpenSummersideJumpSyria: EnergyTEST UTILITY COMPANY

  8. Shanghai TL Chemical Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty Ltd Jump to: navigation, search|Sewaren,Shanghai JTU PVTL Chemical Company Jump

  9. Ovonic Battery Company Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth'sOklahoma/GeothermalOrange County is aOrmesa IOvonic Battery Company Inc Place:

  10. Massachusetts Electric Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429Lacey,(MonasterLowellis a townLoading map...(Redirected25. ItMassacCompany Jump

  11. Wellsboro Electric Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: SaltTroyer & Associates JumpWellsboro Electric Company

  12. Yemen Petroleum Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place:ReferenceEditWisconsin:YBR Solar JumpPetroleum Company Jump to:

  13. Valero Refining Company - NJ | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop,Save Energy NowNew HampshireValero Refining Company - NJ Jump to:

  14. Foss and Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublicIDAPowerPlantSitingConstruction.pdfNotify98.pdf JumpFlixMapFile Jump to:ForseoMcKinley,Worth,Foss and Company

  15. Company Template (Fixed Support) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Ownedof EnergyAdvanced-30 QER Report:ofAnnualCommunicationsCompany

  16. Gemini Solar Development Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision has beenFfe2fb55-352f-473b-a2dd-50ae8b27f0a6TheoreticalFuelCellGemini Solar Development Company Jump to:

  17. Suzlon Energy Company | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov Pty LtdSteen,Ltd Jump to: navigation, search Name:STS JumpSuzlon Energy Company

  18. DF-479 SD-11 Directory Security: Mechanisms and Practicality

    E-Print Network [OSTI]

    North American Directory

    This document reviews security issues and identifies some of the specific measures required to achieve security.

  19. updated 6/7/2007 Aerospace Security Certificate (21 Hours)

    E-Print Network [OSTI]

    Veiga, Pedro Manuel Barbosa

    Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

  20. A Strategy for Information Security: TOGAF , A. Movasseghi2

    E-Print Network [OSTI]

    Ertaull, Levent

    Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems