Powered by Deep Web Technologies
Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

2

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

3

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

4

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

5

Audit Report, MANAGEMENT OF PATENT AND LICENSING ACTIVITIES AT...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Report, MANAGEMENT OF PATENT AND LICENSING ACTIVITIES AT DEPARTMENT-OWNED CONTRACTOR-OPERATED LABORATORIES, DOEIG-0479 Audit Report, MANAGEMENT OF PATENT AND LICENSING ACTIVITIES...

6

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

7

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

8

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

9

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

10

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

11

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

12

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

13

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

14

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

15

Managing license compliance in free and open source software development  

Science Conference Proceedings (OSTI)

License compliance in Free and Open Source Software development is a significant issue today and organizations using free and open source software are predominately focusing on this issue. The non-compliance to licenses in free and open source software ... Keywords: Compatibility analysis, Compliance management, Free and open source software, License compliance, Rights expression languages

G. R. Gangadharan; Vincenzo D'Andrea; Stefano Paoli; Michael Weiss

2012-04-01T23:59:59.000Z

16

Calvert Cliffs License Renewal Aging Management Review Reports  

Science Conference Proceedings (OSTI)

This report and associated CD-ROM documents the Calvert Cliffs License Renewal Aging Management Review Reports as of December 1998. The option to operate a nuclear power plant beyond its initial license term of 40 years is an important factor in financial decisions and long-term planning for utility asset management and capital improvement. This report provides other utilities with details of the technical evaluations to support their own preparation of a License Renewal Application (LRA).

1999-06-23T23:59:59.000Z

17

Chapter 5, "License Renewal and Aging Management for Continued Service  

SciTech Connect

As of August 2011, there were 104 commercial nuclear power reactors licensed to operate in 31 states in the United States. Initial operating licenses in the United States are granted for a period of 40 years. In order to help assure an adequate energy supply, the USNRC has established a timely license renewal process and clear requirements that are needed to ensure safe plant operation for an extended plant life. The principals of license renewal and the basic requirements that address license renewal are identified as well as additional sources of guidance that can be utilized as part of the license renewal process. Aging management program inspections and operating experience related to the concrete and steel containment structures are provided. Finally, several lessons learned are provided based on containment operating experience.

Naus, Dan J [ORNL] [ORNL

2013-01-01T23:59:59.000Z

18

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

19

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

20

Nuclear Power Plant License Renewal Environmental Life Cycle Management Plan Manual: License Renewal Environmental Compliance  

Science Conference Proceedings (OSTI)

This manual focuses on preparing to meet NRC environmental requirements for license renewal. It describes a nuclear power plant's day-to-day environmental protection activities and the relationship between these activities and a plan for preparing a license renewal environmental report supplement.

1995-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Proposal to negotiate the renewal of the contract for the licensing and maintenance of database management system software  

E-Print Network (OSTI)

Proposal to negotiate the renewal of the contract for the licensing and maintenance of database management system software

2008-01-01T23:59:59.000Z

22

Management of the Licensed Bases of Advanced Nuclear Plants: Proof of Approach  

Science Conference Proceedings (OSTI)

Prospective Advanced Nuclear Plant (ANP) owners must have high confidence that the integrity of the licensed bases (LB) of a plant will be effectively maintained over its lifecycle. Currently, licensing engineers use text retrieval systems, database managers, and checklists to access, update, and maintain vast and disparate licensing information libraries. This project adopted and demonstrated a "twin-engine" approach that integrates a program from the emerging class of concept searching tools with a mod...

2000-08-28T23:59:59.000Z

23

Utility Activities for Nuclear Power Plant Life Cycle Management and License Renewal  

Science Conference Proceedings (OSTI)

This report provides guidance to nuclear utilities on steps to take, industry activities undertaken, and products developed for life cycle management and license renewal (LCM/LR) activities. It provides information for establishing LCM/LR programs and may be useful to those underway.

1995-06-27T23:59:59.000Z

24

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

25

License Agreements  

Science Conference Proceedings (OSTI)

Standard Reference Database NIST 23 REFPROP License Information. Single Location License. A single location license ...

2013-05-06T23:59:59.000Z

26

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

27

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

28

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

29

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

30

Research License Agreement Template  

NLE Websites -- All DOE Office Websites (Extended Search)

Research License Template Research License Template RESEARCH LICENSE Between Alliance for Sustainable Energy, LLC And [COMPANY or UNIVERSITY NAME] This License Agreement (hereinafter "Agreement"), which shall be effective on the date it is executed by the last Party to sign (the "Effective Date"), is between Alliance for Sustainable Energy, LLC (hereinafter "Alliance"), Management and Operating Contractor for the National Renewable Energy Laboratory (hereinafter "NREL") located at 1617 Cole Blvd., Golden, Colorado 80401 and [COMPANY or UNIVERSITY NAME], (hereinafter "Research Licensee"), a [FOR-PROFIT or NON-PROFIT] entity organized and existing under the laws of the State of [NAME of STATE] and having a principal place of business at [ADDRESS], hereinafter referred

31

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

32

Email licensing  

Science Conference Proceedings (OSTI)

We propose a framework, email licensing, that allows email users to determine whose messages and in what content and conditions are authorized to come into their inboxes. The idea is to treat email address as a data owned by the addressee, and any use ... Keywords: Email licensing, Personal data licensing, Spam, Unsolicited emails

Yuh-Jzer Joung; Chu-Jui Yang

2009-05-01T23:59:59.000Z

33

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

34

Negotiable Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Negotiable Licensing Negotiable Licensing Negotiable Licenses LANL's significant portfolio of intellectual property (patents, copyrights, and trademarks) primarily results from federally-sponsored research and development in support of the Laboratory's national security mission. Also, we collaborate with industry to develop innovative, application-specific technology to further our partner's ultimate commercialization objectives. In each case, we develop valuable technology that provides benefit to both the public and private sectors, the majority of which is available for commercial licensing. To ensure that our partners have the necessary intellectual property advantage to successfully deploy LANL technology, we offer a variety of negotiable commercial license agreements that can be tailored to suit specific market

35

How to License Technologies | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Licensing Technology Licensing How To License ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Licensing Agreement Technology Innovation Program Technology Assistance Program Licensing Staff Search For Technologies Available Technologies Licensing Opportunity Announcements Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | How To License ORNL Technologies SHARE How To License ORNL Technologies Technology Evaluation The first step in the licensing process is for you to identify technologies of interest to you. As a starting point, you may wish to browse the available technologies or search using keywords and the ORNL InSpire Technology Search Engine. At any point in your search, please feel free to contact the commercialization manager identified for each technology or

36

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

37

Nuclear Maintenance Applications Center: Motor Management Guide Supporting Plant License Renewal Including Environmental Qualification Considerations  

Science Conference Proceedings (OSTI)

This report was developed by the Electric Power Research Institute’s Large Electric Motor Users Group Information Working Group, which includes motor engineers, motor specialist consultants, and vendors. Environmental qualification (EQ) program owners were also involved in the development of this report. This report addresses the most important elements of a sound motor management program to support an informed decision on motor preservation and motor life extension. Motor life extensions of ...

2013-06-07T23:59:59.000Z

38

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

39

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

40

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT  

United States Department of Energy (“DOE”) Contract No. DE-AC52-07NA27344 to manage ... Sale, or import of the Licensed Products, performance of ...

42

Sandia National Laboratories : Licensing/Technology Transfer ...  

Search; About Sandia; Mission Areas; Newsroom; Careers; Doing Business; Education; Contact Us; IP Management, Alliances & Licensing Contacts. IP Home; Search/Browse ...

43

Licensing - Oak Ridge National Laboratory | ORNL  

Licensing Things You Should Know about Working with ORNL. UT-Battelle manages and operates ORNL under a contract with the U.S. Department of Energy (DOE).

44

Y-12 cleaning technology licensed by Knoxville engineering firm...  

National Nuclear Security Administration (NNSA)

cleaning technology licensed by Knoxville engineering firm | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the...

45

Licensing Opportunity Announcements | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Technology Licensing | Licensing Opportunity Announcements SHARE Licensing Opportunity Announcements UT-Battelle, LLC, acting under its Prime Contract No. ORNL Laboratory Director Signs New License Agreement DE-AC05-00OR22725 with the U.S. Department of Energy (DOE) for the management and operation of the Oak Ridge National Laboratory (ORNL), is posting notice of near-term license opportunities for technologies listed on this page and is requesting license applications from potential commercialization partners. ORNL will license these technologies in defined fields of use. License applications will be evaluated based on prospective partners' ability and commitment to successfully commercialize the technology, with a preference for United States-based

46

Licensing NIST Technologies  

Science Conference Proceedings (OSTI)

... Partnerships Office (TPO) works with partners to license NIST patented inventions. Parties interested in licensing an issued patent or patent ...

2013-04-08T23:59:59.000Z

47

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

48

Yankee nuclear power station license renewal assessment  

Science Conference Proceedings (OSTI)

Nuclear power plants are initially licensed to operate for 40 years. Recent changes to US Nuclear Regulatory Commission regulations allow licenses to be renewed for up to 20 additional years. The new regulations require a comprehensive plant assessment to ensure continued effective aging management of equipment important to license renewal (ILR). Under the industry's lead plant program, Yankee Atomic Electric Company (YAEC) has assisted with development and demonstration of a generic license renewal assessment process. The generic assessment process developed under the lead plant program is the Nuclear Management and Resources Council methodology.

Hinkle, W.D. (Yankee Atomic Electric Co., Bolten, MA (United States))

1992-01-01T23:59:59.000Z

49

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

50

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

51

T-564: Vulnerabilities in Citrix Licensing administration components |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Vulnerabilities in Citrix Licensing administration 4: Vulnerabilities in Citrix Licensing administration components T-564: Vulnerabilities in Citrix Licensing administration components February 24, 2011 - 7:00am Addthis PROBLEM: Vulnerabilities in Citrix Licensing administration components. PLATFORM: Citrix Licensing Administration Console, formerly known as the License Management Console. ABSTRACT: The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. reference LINKS: Citrix ID:CTX128167 SecurityTracker Alert ID:1025123 Citrix Support IMPACT ASSESSMENT: Medium Discussion: Citrix has been made aware of a number of vulnerabilities in a third-party component that is used by the Citrix Licensing administration console. These vulnerabilities could potentially allow an unauthorized user to gain

52

TAO: License  

NLE Websites -- All DOE Office Websites (Extended Search)

Copyright 2013 , UChicago Argonne, LLC Copyright 2013 , UChicago Argonne, LLC Operator of Argonne National Laboratory All rights reserved. Toolkit for Advanced Optimization (TAO), Version 2.2.0 OPEN SOURCE LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Software changes, modifications, or derivative works, should be noted with comments and the author and organization's name. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

53

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

54

LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM  

NLE Websites -- All DOE Office Websites (Extended Search)

LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM NON-EXCLUSIVE PATENT LICENSE AGREEMENT This Agreement between Los Alamos National Security, LLC ("LANS"), under its United States Department of Energy ("DOE") Contract No. DE-AC52-06NA25396, to manage and operate Los Alamos National Laboratory ("LANL"), and ______________________________________, a _____________________________ corporation Company Name ("LICENSEE") (State of Incorporation) having its principal place of business at: ________________________________________________________________________________________ (Company Address) is effective on the date of execution by the last signing Party and payment of the License Issue Fee

55

Solar Heating Contractor Licensing  

Energy.gov (U.S. Department of Energy (DOE))

Michigan offers a solar heating contractor specialty license to individuals who have at least three years of experience installing solar equipment under the direction of a licensed solar contractor...

56

NREL: Technology Transfer - Licensing Agreements  

National Renewable Energy Laboratory Technology Transfer Licensing Agreements. Through licensing agreements, NREL provides industry with an opportunity to ...

57

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

58

V-073: IBM Tivoli Federated Identity Manager Signature Verification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System V-145: IBM Tivoli Federated Identity Manager Products Java Multiple Vulnerabilities...

59

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

60

License Iso. CM35  

Office of Legacy Management (LM)

License Iso. CM35 License Iso. CM35 hUhUll4MhiM&POlltYll7~ llolh-thRqalStract Alolan&le, vlrghla Attoatlonl w. & 0. EutahlDon Pursuant to the Atanic Energy Act of 1954 and Section 40.21 or the Code of Federal Regulations, Title 10 - Atomic Energy, Chapter 1, Part 40 - Control of Sauce Haterid, you are hereby licensed to receive possession of and title to three hundred uwi l lght the term of this liceaee for pounda of refined eource material during 880 in meueb and demlopmt aotiritim MDool.atd lfltb fual oleroat f*hrlcmtlon. You are nirthcr licensed to transfer aad deliver poaaeeslon of and title to refined ecwce material to any person licensed by the Atcmlc Energy ~~slon, VitAin the limits of his license. i f Am a condition of iemzaace of thie llcenee, you are required to maintain

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

62

License Application Guidelines  

market, and describe how the funding will be obtained. LICENSE APPLICATION GUIDELINES– 6. ... Key events that have led to your company’s current position in the

63

END USER LICENSE  

to be accessed over the internet; c. LICENSEE may copy the Software solely to the extent necessary to exercise the foregoing license, ...

64

END USER LICENSE SAC  

to be accessed over the internet; c. LICENSEE may copy the Software solely to the extent necessary to exercise the foregoing license, ...

65

Licensing Guidelines | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

parties. Licenses that include the right to sublicense to others also include financial terms for sublicensing revenue that is based on the commercialization of the technology by a...

66

Licensing Berkeley Lab Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

to inquire. For more information on licensing, please see Frequently Asked Questions . Contact Us Receive Customized Tech Alerts Tech Transfer Site Map Last updated: 09172009...

67

VERMONT YANKEE NUCLEAR POWER STATION- NRC LICENSE  

E-Print Network (OSTI)

your application for a renewed license of your Vermont Yankee Nuclear Power Station. The enclosed report documents the result of the inspection which was discussed with members of your staff on May 24, 2007, at a publicly observed exit meeting conducted at the Latchis Theater in Brattleboro, VY. The purpose of this inspection was to examine the plant activities and documents that supported the application for a renewed license of the Vermont Yankee Nuclear Power Station. The inspection reviewed the screening and scoping of non-safety related systems, structures, and components, as required in 10 CFR 54.4(a)(2), and determined whether the proposed aging management programs are capable of reasonably managing the effects of aging. These NRC inspection activities constitute one of several inputs into the NRC review process for license renewal applications. The inspection team concluded screening and scoping of nonsafety-related systems, structures, and components, were implemented as required in 10 CFR 54.4(a)(2), and the aging management portions of the license renewal activities were conducted as described in the License Renewal Application. The inspection results supported a conclusion that the

Mr. Theodore; A. Sullivan

2007-01-01T23:59:59.000Z

68

Licensable Life Science Technologies | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensable Life Science Technologies A selection of biology-based technologies available for licensing licensablebiologicaltechnologies...

69

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

70

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

71

Evaluation of Thermal Fatigue Effects on Systems Requiring Aging Management Review for License Renewal for the Calvert Cliffs Nuclear Power Plant  

Science Conference Proceedings (OSTI)

In recent years, the nuclear power industry has devoted significant attention to metal fatigue and its impact on the design qualification and serviceability of operating components. This study provides a pilot plant demonstration of the current industry technical position on fatigue evaluation for license renewal, specifically addressing reactor water environmental effects. It also develops a technical evaluation method for determining fatigue life adequacy in a feedwater piping system, a pressurizer sur...

1998-02-25T23:59:59.000Z

72

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

73

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

74

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

75

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

76

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

77

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

78

PNNL: Technology Transfer - Our Licensing Guidelines  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Licensing Guidelines PNNL approaches licensing in a flexible, collaborative manner Although every technology license is unique, at PNNL we recognize that there are basic...

79

ENERGY STAR Guide for Licensed Professionals | ENERGY STAR Buildings &  

NLE Websites -- All DOE Office Websites (Extended Search)

Guide for Licensed Professionals Guide for Licensed Professionals Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories Target Finder

80

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

82

NRC LICENSE RENEWAL SCOPING/SCREENING INSPECTION  

E-Print Network (OSTI)

Dear Mr. Nazar: On May 21, 2004, the NRC completed an inspection regarding the application for license renewal for the D. C Cook Nuclear Plant. The enclosed report documents the inspection results, which were discussed with members of your staff. The purpose of this inspection was an examination of activities that support the application for a renewed license for D. C. Cook. The inspection consisted of a selected examination of procedures and representative records, and interviews with personnel regarding the process of scoping and screening plant equipment to select equipment subject to an aging management review. The inspection concluded that the scoping and screening portion of license renewal activities was conducted as described in the License Renewal Application and that documentation supporting the application is in an auditable and retrievable form. With the exception of the items identified in this report, your scoping and screening process was successful in identifying those systems, structures, and components required to be considered for aging management. In accordance with 10 CFR 2.390 of the NRC’s "Rules of Practice, " a copy of this letter and its enclosure will be available electronically for public inspection in the NRC Public Document Room or from the Publicly Available Records (PARS) component of NRC’s document system (ADAMS). ADAMS is accessible from the NRC Web site at

Cynthia D. Pederson; M. Finissi; Plant Manager; G. White; Michigan Public; Service Commission

2004-01-01T23:59:59.000Z

83

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

84

Argonne TDC: Licensing Intellectual Property from Argonne ...  

Licensing Intellectual Property from Argonne National Laboratory. Argonne's licensing program provides companies with opportunities to acquire rights in Argonne ...

85

NREL: Technology Transfer - Licensing Agreements  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensing Agreements Licensing Agreements Through licensing agreements, NREL provides industry with an opportunity to commercialize NREL-developed energy technologies and products. Our licensing opportunities are available to both small and large businesses-from start-ups to Fortune 500 companies. Process The licensing agreement process basically includes seven steps. See the NREL Licensing Agreement Process flowchart. We are committed to working through these steps in a timely manner. Experience suggests that the fastest means to reach an agreement is through direct communications to create understanding and agree on actions. 1. Identify and Qualify Opportunity To identify an opportunity, a company can browse the technologies available for licensing. When an opportunity has been identified, NREL then asks the company to

86

Combined Operating License Model Program Plan  

Science Conference Proceedings (OSTI)

The Model Program Plan (MPP) provides functional guidance on how to prepare a Combined Operating License (COL) application for a new nuclear power facility when incorporating previous findings from both design certification (DC) and an early site permit (ESP) proceedings. The plan identifies the activities necessary to prepare an application and provides guidance on planning and managing a COL program, including working with DC and ESP holders and using subcontracted resources to develop necessary new in...

2003-11-17T23:59:59.000Z

87

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Florida Program Type Solar/Wind Contractor Licensing Provider Florida Solar Energy Industries Association Until 1994, Florida offered limited specialty licenses for residential solar hot water and pool heating, as well a general solar contractor's license. These specialty licenses have not been issued since that time, although people holding these licenses may renew them. The new solar contractor license defines a broader scope of work. With the new license, solar contractors have the authority to install, maintain and

88

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractor Licensing Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Swimming Pool Heaters Water Heating Program Info State California Program Type Solar/Wind Contractor Licensing Provider California Contractors State License Board The California Contractors State License Board administers contractor licenses. The C-46 Solar Contractor license covers active solar water and space heating systems, solar pool heating systems, and photovoltaic systems. C-46 requirements include four years of experience and passing the business and law exam and the trade exam. Independent license schools offer courses to prepare for license exams.

89

PETSc: Documentation: Installation  

NLE Websites -- All DOE Office Websites (Extended Search)

Installation Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ License Linear...

90

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

91

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

92

License Renewal Application PREFACE  

E-Print Network (OSTI)

The following describes the information location, layout, and editorial conventions in the Beaver Valley Power Station (BVPS) License Renewal Application (hereinafter referred to as “this application ” or “the application”). Abbreviated names and acronyms used throughout the application are defined at the end of this preface. Commonly understood terms (such as U.S.) and terms used only in referenced document numbers may not be identified in this table. Regulatory documents such as NUREG-1801, Generic Aging Lessons Learned (GALL) Report,

Beaver Valley; Power Station

2007-01-01T23:59:59.000Z

93

GRR/Section 3-MT-d - Land Use License Process | Open Energy Information  

Open Energy Info (EERE)

d - Land Use License Process d - Land Use License Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-MT-d - Land Use License Process 03MTDLandUseLicenseProcess (1).pdf Click to View Fullscreen Contact Agencies Montana Department of Natural Resources & Conservation Regulations & Policies Surface Management Rule 36.25.103 Triggers None specified Click "Edit With Form" above to add content 03MTDLandUseLicenseProcess (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The land use license is intended to be used for short-term use of state-owned lands. This license may be used for casual use of the lands

94

Technology Licensing Contacts | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

(865) 574-1051 Biography Robert Scott Administrative Assistant scottre@ornl.gov (865) 241-2356 Jennifer Caldwell Technology Licensing, Group Leader caldwelljt@ornl.gov (865)...

95

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

96

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

97

Nondestructive Evaluation: Plant Aging/License Renewal Nondestructive Examination Gap Solutions and Strategies, Vol. 1  

Science Conference Proceedings (OSTI)

This report provides strategic direction to the development of nondestructive evaluation (NDE) technology and programs for the management of aging nuclear power plants and plant license renewal. Section 2 provides project proposal descriptions developed by staff of the Electric Power Research Institute (EPRI) to address issues identified by the Aging Plant NDE Working Group. Section 3 is a summary of support provided to the License Renewal Integration Working Group on NDE related to license renewal. Sect...

2008-12-22T23:59:59.000Z

98

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

99

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

100

Renewable Energy Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractor Licensing Contractor Licensing Renewable Energy Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Solar Buying & Making Electricity Home Weatherization Water Heating & Cooling Commercial Heating & Cooling Heating Water Heating Wind Program Info State Oregon Program Type Solar/Wind Contractor Licensing Provider Department of Consumer and Business Services Oregon requires trade licenses for people installing solar energy equipment, and contractor licenses for the companies that do construction. Companies with an electrical contractor license may engage in the business of making electrical installations. Similarly a plumbing contractor license allows a company to engage in the business of making plumbing

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Technologies Available for Licensing | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Licensing Technology Licensing How To License ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Licensing Agreement Technology Innovation Program Technology Assistance Program Licensing Staff Search For Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Licensing Opportunity Announcements Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies SHARE Available Technologies One of the primary missions of the Technology Transfer Division is to move our intellectual property from the research facility to the commercial

102

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Water Heating Commercial Heating & Cooling Heating Program Info State Nevada Program Type Solar/Wind Contractor Licensing Provider Nevada State Contractors Board - Reno Nevada law requires that solar energy system installers be licensed by the Nevada State Contractors Board. Contractors may be licensed under License Classification C-37 (solar contracting for solar water heating and space heating and air conditioning). Contractors may also perform solar work under License Classification C-1* (plumbing and heating), sub-classification (d) for solar water heating installations, or

103

Property:FERC License | Open Energy Information  

Open Energy Info (EERE)

License Jump to: navigation, search Property Name FERC License Property Type String Retrieved from "http:en.openei.orgwindex.php?titleProperty:FERCLicense&oldid610683...

104

DANESS DEVELOPERS SOFTWARE LICENSE AGREEMENT This Agreement ...  

Daness Developers Web License,.Version, 4.5, Sept. 2009 1 DANESS DEVELOPERS SOFTWARE LICENSE AGREEMENT. This Agreement, is made between the UChicago Argonne ...

105

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

general plumbing contractors carrying an S210 license are authorized to install solar thermal systems. The Division has also established solar-specific license classifications....

106

Sandia National Laboratories : Licensing/Technology Transfer ...  

IP Home; Search/Browse Technology Portfolios; Licensing Overview; Ready-to-Sign Licenses; DOE SBIR TTI; Government Use Notices; News; Contact Us; Technology Summary

107

NREL: Technology Transfer - Nonexclusive and Exclusive Licenses  

Nonexclusive and Exclusive Licenses. NREL's technology licensing agreements with companies are either nonexclusive or exclusive depending on their field of use.

108

Featured Licensing Professional - Energy Innovation Portal  

Eric Payne. Meet Eric Payne! Eric is the Senior Licensing Executive at the National Renewable Energy Laboratory and one of the licensing contacts on the Energy ...

109

PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT  

and operate Lawrence Livermore National Laboratory ... which may be useful for human health treatment ... Licensed Service” means the use of Licensed ...

110

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Eligibility InstallerContractor Savings For Solar Buying & Making Electricity Heating & Cooling Commercial Heating & Cooling...

111

Alternative Fuels Data Center: Ethanol License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol License to Ethanol License to someone by E-mail Share Alternative Fuels Data Center: Ethanol License on Facebook Tweet about Alternative Fuels Data Center: Ethanol License on Twitter Bookmark Alternative Fuels Data Center: Ethanol License on Google Bookmark Alternative Fuels Data Center: Ethanol License on Delicious Rank Alternative Fuels Data Center: Ethanol License on Digg Find More places to share Alternative Fuels Data Center: Ethanol License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol License Anyone who imports, exports, or supplies ethanol in the state of Wyoming must obtain an annual license from the Wyoming Department of Transportation. The fee for each license is $25. (Reference Wyoming

112

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

113

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

114

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

115

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

116

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

117

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

118

Exclusive License: AGMT-XXXX  

NLE Websites -- All DOE Office Websites (Extended Search)

5.20.2011 UU.S. DEPARTMENT OF ENERGY UNATIONAL ENERGY TECHNOLOGY LABORATORY UEXCLUSIVE PATENT LICENSE AGREEMENT This Agreement is by and between the United States Department of...

119

Office of Information Technology University of Minnesota 1 Software Licenses  

E-Print Network (OSTI)

, visit the Change Management website. Scheduled Maintenance The schedule of OIT maintenance windows is published on the System Status page. Should maintenance be required outside of the scheduled maintenanceSoftwareLicenseServer. If the maintenance window extends beyond anticipated end time, the System Status page will be updated accordingly

Amin, S. Massoud

120

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Water Heating Commercial Heating & Cooling Heating Program Info State Arizona Program Type Solar/Wind Contractor Licensing Provider Registrar of Contractors The Arizona Registrar of Contractors does not offer a general solar electric contractor license, but the state's C-11/L-11 electrical license covers solar electric installations. C-11 licenses are required for electrical work on residential property and L-11 licenses apply to commercial installations. Contractors can also acquire a K-11 license to work on both residential and commercial installations. The Arizona Registrar of Contractors does have a specific plumbing license

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

122

Alternative Fuels Data Center: Alternative Fuel License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fuel Fuel License to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel License on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel License on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel License on Google Bookmark Alternative Fuels Data Center: Alternative Fuel License on Delicious Rank Alternative Fuels Data Center: Alternative Fuel License on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel License Any person acting as an alternative fuels dealer must hold a valid alternative fuel license and certificate from the Wisconsin Department of Administration. Except for alternative fuels that a dealer delivers into a

123

License Stewardship Approach to Commercial Nuclear Power Plant Decommissioning  

SciTech Connect

The paper explores both the conceptual approach to decommissioning commercial nuclear facilities using a license stewardship approach as well as the first commercial application of this approach. The license stewardship approach involves a decommissioning company taking control of a site and the 10 CFR 50 License in order to complete the work utilizing the established trust fund. In conclusion: The license stewardship approach is a novel way to approach the decommissioning of a retired nuclear power plant that offers several key advantages to all parties. For the owner and regulators, it provides assurance that the station will be decommissioned in a safe, timely manner. Ratepayers are assured that the work will be completed for the price they already have paid, with the decommissioning contractor assuming the financial risk of decommissioning. The contractor gains control of the assets and liabilities, the license, and the decommissioning fund. This enables the decommissioning contractor to control their work and eliminates redundant layers of management, while bringing more focus on achieving the desired end state - a restored site. (authors)

Daly, P.T.; Hlopak, W.J. [Commercial Services Group, EnergySolutions 1009 Commerce Park, Oak Ridge, TN (United States)

2008-07-01T23:59:59.000Z

124

U.S. Material Licenses  

E-Print Network (OSTI)

There are approximately 22,400 licenses issued for medical, academic, industrial, and general uses of radioactive materials in the United States. The United States Nuclear Regulatory Commission (NRC) and State radiation safety regulatory programs are responsible for ensuring protection of public health and safety and the environment. Currently, there are approximately 3,450 licenses issued by the NRC and 18,950 licenses issued by the 36 Agreement States. An Agreement State is any state with which the Atomic Energy Commission or the Nuclear Regulatory Commission has entered into an Agreement under subsection 274b of the Atomic Energy Act of 1954 (as amended). Definition of the National Materials Program The National Materials Program (NMP) is a term that has been used for many years, to define the broad collective framework within which both NRC and the Agreement States function in carrying out their respective radiation safety regulatory programs. This framework also includes

unknown authors

2009-01-01T23:59:59.000Z

125

NREL: Technology Transfer - Technologies Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies Available for Licensing Technologies Available for Licensing Photo of NREL scientist in the NREL Hydrogen Lab. NREL's scientists and engineers develop award-winning technologies available for licensing. NREL scientists and engineers produce breakthrough and award-winning renewable energy and energy efficiency technologies that are available for licensing. We have many licensing opportunities for NREL-developed technologies, including our featured LED technologies. To see all our technologies available for licensing, visit the EERE Innovation Portal and search for NREL. Learn about our licensing agreement process. Contact For more information about licensing NREL-developed technologies, contact Eric Payne, 303-275-3166. Ombuds NREL strives to quickly resolve any issue or concern you may have regarding

126

Sandia National Laboratories : Licensing/Technology Transfer ...  

Ready-to-Sign licenses require that R & D and substantial manufacture of the licensed product occur within the U.S. to provide benefit to the U.S. economy.

127

Alternative Fuels Data Center: Alternative Fuel License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fuel Fuel License to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel License on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel License on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel License on Google Bookmark Alternative Fuels Data Center: Alternative Fuel License on Delicious Rank Alternative Fuels Data Center: Alternative Fuel License on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel License Alternative fuel providers, bulk users, and retailers, or any person who fuels an alternative fuel vehicle from a private source that does not pay

128

Guide to Microsoft Volume Licensing June 2013 i  

E-Print Network (OSTI)

Guide to Microsoft Volume Licensing June 2013 i Guide to Microsoft Volume Licensing #12;Guide to Microsoft Volume Licensing June 2013 ii Table of Contents Chapter 1: Introduction to Microsoft Volume................................................................................................................................................................ 1 Keys to Understanding Microsoft Volume Licensing

Narasayya, Vivek

129

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

130

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

131

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

132

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

133

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

134

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

135

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

136

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

137

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

138

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

139

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

140

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

142

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

143

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

144

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

145

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

146

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

147

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

148

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

149

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

150

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

151

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

152

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

153

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

154

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

155

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

156

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

157

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

158

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

159

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

160

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

162

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

163

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

164

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

165

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

166

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

167

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

168

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

169

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

170

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

171

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

172

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

173

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

174

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

175

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

176

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

177

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

178

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

179

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

180

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

182

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

183

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

184

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

185

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

186

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

187

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

188

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

189

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

190

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

191

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

192

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

193

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

194

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

195

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

196

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

197

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

198

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

199

Vehicles and Fuels Technologies Available for Licensing ...  

Vehicles and Fuels Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have ...

200

Advanced Materials Technologies Available for Licensing ...  

Advanced Materials Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have ...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Solar Thermal Technologies Available for Licensing ...  

Solar Thermal Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have ...

202

Sandia National Laboratories Technologies Available for Licensing ...  

Wind Energy; Partners (27) Visual Patent Search; Success Stories; News; Events; Sandia National Laboratories Technologies Available for Licensing

203

Sandia National Laboratories : Licensing/Technology Transfer ...  

IP Home; Search/Browse Technology Portfolios; Licensing Overview; ... National Defense and Security; Molecular Spectroscopy; Imaging Array; Medical Imaging; Remote ...

204

Energy Storage Technologies Available for Licensing ...  

Energy Storage Technologies Available for Licensing U.S. Department of Energy laboratories and participating research institutions have energy storage ...

205

Industrial Technologies Available for Licensing - Energy ...  

Industrial Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have technologies ...

206

Biomass and Biofuels Technologies Available for Licensing ...  

Site Map; Printable Version; Share this resource. Send a link to Biomass and Biofuels Technologies Available for Licensing - Energy Innovation ...

207

Solar Photovoltaic Technologies Available for Licensing ...  

Site Map; Printable Version; Share this resource. Send a link to Solar Photovoltaic Technologies Available for Licensing - Energy Innovation Portalto ...

208

Geothermal Technologies Available for Licensing - Energy ...  

Geothermal Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating institutions research and develop ...

209

Ames Laboratory Technologies Available for Licensing - Energy ...  

Bookmark Ames Laboratory Technologies Available for Licensing - Energy Innovation Portal on Google; Bookmark Ames Laboratory Technologies Available ...

210

Sandia National Laboratories : Licensing/Technology Transfer  

Search; About Sandia; Mission Areas; Newsroom; Careers; Doing Business; Education; Contact Us; Licensing and Technology Transfer. IP Home; Search ...

211

Related to the License Renewal  

E-Print Network (OSTI)

requested that the U.S. Nuclear Regulatory Commission (NRC) renew the operating license for Ginna (license number DPR-18) for a period of 20 years beyond the current expiration of midnight, September 18, 2009. The Ginna plant is located in the Town of Ontario, in the northwest corner of Wayne County, New York, on the south shore of Lake Ontario. The NRC issued the construction permit in April 1966, followed by a provisional operating license on September 19, 1969, and a full-term operating license on December 10, 1984. The Ginna unit consists of a Westinghouse pressurized-water reactor with nuclear steam supply systems designed to operate at core power levels up to 1,520 megawatts-thermal, or approximately 490 megawatts-electric. This SER presents the status of the staff’s review of information submitted to the NRC through January 9, 2004. In its SER with open items, issued on October 9, 2003, the staff identified open and confirmatory items that required resolution before the staff could make a final determination on the application. These items are summarized in Sections 1.5 and 1.6 of this

R. E. Ginna; Nuclear Power Plant; R. E. Ginna; Nuclear Power Plant

2004-01-01T23:59:59.000Z

212

Two Approaches to Reactor Decommissioning: 10 CFR Part 50 License Termination and License Amendment, Lessons Learned from the Regulatory Perspective  

SciTech Connect

Trojan Nuclear Plant (Trojan) and Maine Yankee Nuclear Plant (Maine Yankee) were the first two power reactors to complete decommissioning under the U. S. Nuclear Regulatory Commission's (NRC's) License Termination Rule (LTR), 10 CFR Part 20, Subpart E. The respective owners' decisions to decommission the sites resulted in different approaches to both the physical aspects of the decommissioning, and the approach for obtaining approval for completing the decommissioning in accordance with regulations. Being in different States, the two single-unit pressurized water reactor sites had different State requirements and levels of public interest that impacted the decommissioning approaches. This resulted in significant differences in decommissioning planning, conduct of decommissioning operations, volumes of low- level radioactive waste disposed, and the final status survey (FSS) program. While both licensees have Independent Spent Fuel Storage Installations (ISFSIs), Trojan obtained a separate license for the ISFSI in accordance with the requirements of 10 CFR Part 72 and terminated their 10 CFR Part 50 license. Maine Yankee elected to obtain a general license under 10 CFR Part 50 for the ISFSI and reduce the physical site footprint to the ISFSI through a series of license amendments. While the NRC regulations are flexible and allow different approaches to ISFSI licensing there are separate licensing requirements that must be addressed. In 10 CFR 50.82, the NRC mandates public participation in the decommissioning process. For Maine Yankee, public input resulted in the licensee entering into an agreement with a concerned citizen group and resulted in State legislation that significantly lowered the dose limit below the NRC radiological criteria of 25 mrem (0.25 mSv) per year (yr) in 10 CFR 20.1402 for unrestricted use. The lowering of the radiological criteria resulted in a significant dose modeling effort using site-specific Derived Concentrations Guideline Levels (DCGLs) that were well below the NRC DCGL screening values. This contributed to a longer than anticipated period to obtain NRC approval of the Maine Yankee License Termination Plan (LTP). By employing the lessons learned from its first LTP submittal, which was not accepted by the NRC staff, Trojan was able to obtain approval of its revised LTP promptly. While both licensees provided final status survey reports (FSSRs) for NRC approval, the Trojan approach to decommissioning and data management allowed NRC to efficiently review FSS records and supporting documentation. Therefore, NRC was able to review Trojan's FSSR more efficiently than Maine Yankee's FSSR. This paper describes the regulatory impacts of the two different approaches to the decommissioning, the development of licensee required plans, decommissioning operations and records, the differences in licensing processes, and the lessons learned for improving the processes. (authors)

Watson, B.A.; Buckley, J.T.; Craig, C.M. [U.S. Nuclear Regulatory Commission, Office of Nuclear Materials Safety and Safeguards, Decommissioning Directorate (T7E18), Washington, D.C. 20555 (United States)

2006-07-01T23:59:59.000Z

213

Windows Server 2008 R2 Licensing Guide  

E-Print Network (OSTI)

Windows Server 2008 R2 Licensing Guide m Your Comprehensive Resource for Licensing and Pricing #12;2 Table of Contents Summary 3 Table of Windows Server 2008 R2 Core Product Offerings 3 License Terms ­ Windows Server 2008 R2 Product Line Updates 4 Edition Comparison by Server Role 5 New and Updated Features

Narasayya, Vivek

214

Review of export license applications (Strategic Trade Control...  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensing Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral...

215

Commercialization and Licensing | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Success Stories Success Stories Commercialization and Licensing Economic Development Industrial Partnerships Sponsored Research Partnerships Home | Connect with ORNL | For Industry | Partnerships | Success Stories | Commercialization and Licensing Success Stories Commercialization and Licensing 1-10 of 14 Results Prev 12 Next DNP Green Technology, Inc. Exclusively Licenses Patents Invented at Argonne National Laboratory and Oak Ridge National Laboratory March 09, 2010 - On March 9, 2010, UT-Battelle, LLC, UChicago Argonne, LLC, and DNP Green Technology, INC fully executed an exclusive license agreement for patents invented solely by Argonne National Laboratory and jointly by Oak Ridge National Laboratory (ORNL) and Argonne National Laboratory (ANL). GE-Reuter Stokes to Market SNS-Designed Electronics

216

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

217

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

218

License integration patterns: Addressing license mismatches in component-based development  

Science Conference Proceedings (OSTI)

In this paper we address the problem of combining software components with different and possibly incompatible legal licenses to create a software application that does not violate any of these licenses while potentially having its own. We call this ...

Daniel M. German; Ahmed E. Hassan

2009-05-01T23:59:59.000Z

219

PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT  

Halbach Array DC Motor/Generator Company Name 1/7 TL0_____ Date PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT This Agreement between Lawrence Livermore National ...

220

Vehicles and Fuels Technologies Available for Licensing ...  

Site Map; Printable Version; Share this resource. Send a link to Vehicles and Fuels Technologies Available for Licensing - Energy Innovation Portalto ...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Wind Energy Technologies Available for Licensing - Energy ...  

Wind Energy Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have wind energy ...

222

PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT  

Cross-Talk Free, Low-Noise Optical Amplifier Company Name 1/7 TL0_____ Date PAID-UP NONEXCLUSIVE PATENT LICENSE AGREEMENT This Agreement between ...

223

University of Colorado Technologies Available for Licensing ...  

Wind Energy; Partners (27) Visual Patent Search; Success Stories; News; Events; University of Colorado Technologies Available for Licensing The University of Colorado ...

224

Solar Thermal Technologies Available for Licensing - Energy ...  

Solar Thermal Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have concentrating solar power ...

225

Overview of the Yucca Mountain Licensing Process  

SciTech Connect

This paper presents an overview of the licensing process for a Yucca Mountain repository for high-level radioactive waste and spent nuclear fuel. The paper discusses the steps in the licensing proceeding, the roles of the participants, the licensing and hearing requirements contained in the Code of Federal Regulations. A description of the Nuclear Regulatory Commission (NRC) staff acceptance and compliance reviews of the Department of Energy (DOE) application for a construction authorization and a license to receive and possess high-level radioactive waste and spent nuclear fuel is provided. The paper also includes a detailed description of the hearing process.

M. Wisenburg

2004-05-03T23:59:59.000Z

226

NREL: Technology Transfer - Technologies Available for Licensing  

NREL scientists and engineers produce breakthrough and award-winning renewable energy and energy efficiency technologies that are available for licensing.

227

Wind Energy Technologies Available for Licensing - Energy ...  

Site Map; Printable Version; Share this resource. Send a link to Wind Energy Technologies Available for Licensing - Energy Innovation Portalto someone by E-mail

228

Energy Storage Technologies Available for Licensing - Energy ...  

Energy Storage Technologies Available for Licensing U.S. Department of Energy laboratories and participating research institutions have energy storage technologies ...

229

Startup America Technologies Available for Licensing - Energy ...  

Startup America Technologies Available for Licensing “Startup America” is a White House initiative to celebrate, inspire, and accelerate high-growth ...

230

Commercialization and Licensing | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Exclusive Patent License for ORNL Graphite Foam Technology January 28, 2010 - Light-emitting diode (LED) lamps are increasingly in demand in industrial and commercial...

231

Non-exclusive License: AGMT-XXXX  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DEPARTMENT OF ENERGY NATIONAL ENERGY TECHNOLOGY LABORATORY NON-EXCLUSIVE PATENT LICENSE AGREEMENT This Agreement is by and between the United States Department of...

232

Exclusive Patent License Agreement between Alliance and ...  

In such event, Alliance shall be free to license such rights to third parties without further obligation to Licensee. 8.5 Alliance agrees, ...

233

Three essays on licensing university inventions  

E-Print Network (OSTI)

of inventor(s), invention title, disclosure date, patent andphases: Phase 1 - Invention’s Disclosure. The invention isDiego regarding the disclosure of inventions and licensing

Munteanu, Radu

2007-01-01T23:59:59.000Z

234

Advanced Materials Technologies Available for Licensing - Energy ...  

Advanced Materials Technologies Available for Licensing U.S. Department of Energy (DOE) laboratories and participating research institutions have advanced materials ...

235

Geothermal Technologies Available for Licensing - Energy ...  

Site Map; Printable Version; Share this resource. Send a link to Geothermal Technologies Available for Licensing - Energy Innovation Portalto someone by E-mail

236

License  

E-Print Network (OSTI)

This report documents the program and the outcomes of Dagstuhl Seminar 11181 “Organic Computing – Design of Self-Organizing Systems”.

Kirstie Bellman; Andreas Herkersdorf; Michael G. Hinchey; Tu München De; Andreas Herkersdorf; Mike Hinchey; Christian Müller-schloer; Hartmut Schmeck; Rolf Würtz; Kirstie Bellman; Andreas Herkersdorf; Mike Hinchey; Christian Müller-schloer; Hartmut Schmeck; Rolf Würtz

2011-01-01T23:59:59.000Z

237

License  

E-Print Network (OSTI)

EWF is short for Expert Witness Compression Format, according to [ASR02]. It is a file type used to store media images for forensic purposes. It is currently widely used in the field of computer forensics in proprietary tooling like EnCase en FTK. The original specification of the format is provided by ASRDATA, for the SMART application. This document is intended as a working document for the EWF specification. Which should allow existing Open Source forensic tooling to be able to process this file type. page iDocument information Author(s):

Joachim Metz; Joachim Metz

2006-01-01T23:59:59.000Z

238

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

239

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

240

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

242

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

243

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

244

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

245

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

246

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

247

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

248

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

249

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

250

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

251

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

252

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

253

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

254

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

255

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

256

NSNFP Activities in Support of Repository Licensing for Disposal of DOE SNF  

Science Conference Proceedings (OSTI)

The U.S. Department of Energy (DOE) Office of Civilian Radioactive Waste Management is in the process of preparing the Yucca Mountain license application for submission to the Nuclear Regulatory Commission as the nation’s first geologic repository for spent nuclear fuel (SNF) and high-level waste. Because the DOE SNF will be part of the license application, there are various components of the license application that will require information relative to the DOE SNF. The National Spent Nuclear Fuel Program (NSNFP) is the organization that directs the research, development, and testing of treatment, shipment, and disposal technologies for all DOE SNF. This report documents the work activities conducted by the NSNFP and discusses the relationship between these NSNFP technical activities and the license application. A number of the NSNFP activities were performed to provide risk insights and understanding of DOE SNF disposal as well as to prepare for anticipated questions from the regulatory agency.

Henry H. Loo; Brett W.. Carlsen; Sheryl L. Morton; Larry L. Taylor; Gregg W. Wachs

2004-09-01T23:59:59.000Z

257

DOE - Office of Legacy Management -- Edge  

Office of Legacy Management (LM)

Mill Tailings Radiation Control Act (UMTRCA). The site transferred to the Office of Legacy Management in 2003 and is administered under the provisions of a general NRC license....

258

DOE - Office of Legacy Management -- Lbar  

Office of Legacy Management (LM)

Mill Tailings Radiation Control Act (UMTRCA). The site transferred to the Office of Legacy Management in 2003 and is administered under the provisions of a general NRC license....

259

DOE - Office of Legacy Management -- Blue  

Office of Legacy Management (LM)

Mill Tailings Radiation Control Act (UMTRCA). The site transferred to the Office of Legacy Management in 2003 and is administered under the provisions of a general NRC license....

260

DOE - Office of Legacy Management -- Shirley  

Office of Legacy Management (LM)

Mill Tailings Radiation Control Act (UMTRCA). The site transferred to the Office of Legacy Management in 2003 and is administered under the provisions of a general NRC license....

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

DOE - Office of Legacy Management -- Sherwood  

Office of Legacy Management (LM)

Mill Tailings Radiation Control Act (UMTRCA). The site transferred to the Office of Legacy Management in 2003 and is administered under the provisions of a general NRC license....

262

DOE - Office of Legacy Management -- Ship  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

263

DOE - Office of Legacy Management -- Falls  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

264

DOE - Office of Legacy Management -- AMB  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

265

DOE - Office of Legacy Management -- Maybell  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

266

DOE - Office of Legacy Management -- Riverton  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

267

DOE - Office of Legacy Management -- Burrell  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

268

DOE - Office of Legacy Management -- Canon  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

269

DOE - Office of Legacy Management -- Tuba  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

270

DOE - Office of Legacy Management -- Spook  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

271

DOE - Office of Legacy Management -- Lowman  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

272

DOE - Office of Legacy Management -- Tuba  

NLE Websites -- All DOE Office Websites (Extended Search)

site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and requires...

273

DOE - Office of Legacy Management -- Ship  

NLE Websites -- All DOE Office Websites (Extended Search)

site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and requires...

274

Technologies licensed | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies licensed Technologies licensed Technologies licensed Posted: July 16, 2012 - 3:49pm | Y-12 Report | Volume 9, Issue 1 | 2012 Rendering of Y-12's Access Rate Control System Wherever threatening situations arise, in-place security measures make the most of every second. On Feb. 8, a startup firm in Knoxville, Tenn., licensed two security-related technologies from the Y-12 National Security Complex that do just that. The technologies, which delay entrance to controlled-access areas, provide a security solution for various potential markets: commercial nuclear facilities, pharmaceutical manufacturers, correctional facilities and large sporting venues, as well as for other Department of Energy sites. Sustainable Environment Technologies, LLC (SET), licensed the Access Rate

275

Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Liquefied Petroleum Liquefied Petroleum Gas (Propane) License to someone by E-mail Share Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Facebook Tweet about Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Twitter Bookmark Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Google Bookmark Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Delicious Rank Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Digg Find More places to share Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Liquefied Petroleum Gas (Propane) License

276

Solar/Wind Contractor Licensing | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Contractor Licensing Solar/Wind Contractor Licensing < Solar Jump to: navigation, search Some states have established a licensing process for solar-energy contractors and/or wind-energy contractors. These requirements are designed to ensure that contractors have the necessary knowledge and experience to install systems properly. Solar licenses typically take the form of either a separate, specialized solar contractor's license, or a specialty classification under a general electrical or plumbing license. [1] Solar/Wind Contractor Licensing Incentives CSV (rows 1 - 24) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active Alternative Energy System Contracting (Virginia) Solar/Wind Contractor Licensing Virginia Installer/Contractor Photovoltaics No

277

READY-TO-SIGN NONEXCLUSIVE PATENT LICENSE AGREEMENT  

Bullet Detection Tracking and Stopping System Company Name 1/7 TL0_____ Date READY-TO-SIGN NONEXCLUSIVE . PATENT LICENSE AGREEMENT . This license agreement ...

278

Solar and Wind Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Heating Program Information Louisiana Program Type SolarWind Contractor Licensing All solar and wind energy installations must be performed by a contractor duly licensed by and...

279

LAWRENCE LIVERMORE NATIONAL LABORATORY OVERVIEW OF LLNL LICENSE ...  

one or more fields of use. ... c. Security and energy conservation; d. ... Number of Licenses Total Cost for All Licenses 1 $100,000

280

Ready-to-Sign Licensing Instructions - Industrial Partnerships ...  

Ready-to-Sign Licensing Instructions. Read the Notice for RTS License Agreement and complete Commercialization Information Form; Select a technology from the patents ...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Argonne TDC: Licensing Intellectual Property from Argonne National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Property from Argonne National Laboratory Argonne's licensing program provides companies with opportunities to acquire rights in Argonne inventions and copyrights. Licenses...

282

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

283

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

284

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

285

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

286

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

287

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

288

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

289

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

290

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

291

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

292

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

293

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

294

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

295

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

296

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

297

Technology Transfer: Success Stories: Licensed Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensed Technologies Licensed Technologies Here are some of our licensees and the technologies they are commercializing; see our Start-Up Company page for more of our technology licenses. Company (Licensee) Technology Life Technologies Corp. Cell lines for breast cancer research Bristol Myers Squibb; Novartis; Plexxikon Inc.; Wyeth Research; GlaxoSmithKline; Johnson & Johnson; Boehringer Ingelheim Pharmaceuticals, Inc.; Genzyme Software for automated macromolecular crystallography Shell International Exploration and Production; ConnocoPhillips Company; StatOil ASA; Schlumburger Technology Corportation; BHP Billiton Ltd.; Chevron Energy Technology Company; EniTecnologie S.p.A. Geo-Hydrophysical modeling software Microsoft Home Energy Saver software distribution Kalinex Colorimetric bioassay

298

Amendment No.: 185. Renewed Facility Operating License  

E-Print Network (OSTI)

Brief description of amendment: The amendments revise the facility operating license to delete Section 2.G.1 of the Facility Operating License, which requires reporting of violations of the requirements in Section 2, items C(1), C(3) though (33), E, F, K, and L of the Facility Operating License. The proposed amendment would also delete Section 6.6 of the Technical Specifications (TSs) regarding reportable events. Section 6.6 of the TSs are redundant to requirements that have since been embodied in the regulations and, accordingly, may be deleted from the TS.

Virgil C. Summer Nuclear Station

2011-01-01T23:59:59.000Z

299

Regulatory Reform and License Termination Planning in Decommissioning  

SciTech Connect

Decommissioning of commercial nuclear power plants (NPPs) must be safe and cost-effective and consider the needs of a wide range of stakeholders. The creative tension among these objectives has provided opportunities to reform the way these plants are regulated and managed in decommissioning. Enlightened and visionary leaders from the U.S. Nuclear Regulatory Commission (NRC) and industry are seizing these opportunities to create new paradigms for risk-informed regulation; creative stakeholder involvement; and effective, end-state focused, license termination planning.

Michael J. Meisner

2000-06-04T23:59:59.000Z

300

Argonne Software Licensing: RESTORE - ANL  

RESTORE. RESTORE is a program management tool that permits the modeling of a required complex set of steps, including time, or costs, to accomplish the repair of a ...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Inspection of the Department`s export licensing process for dual-use and munitions commodities  

Science Conference Proceedings (OSTI)

The purpose of our inspection was to review the Department of Energy`s (Energy) export licensing process for dual-use and military (munitions) commodities subject to nuclear nonproliferation controls. Specifically, we reviewed Energy`s authorities, procedures, and policies pertaining to the export licensing process and examined procedures for safeguarding data transmitted between Energy and other agencies involved in the export licensing process. We also reviewed Energy`s role as a member of the Subgroup on Nuclear Export Coordination. Our review of the sample of 60 export cases did not find evidence to lead us to believe that Energy`s recommendations for these cases were inappropriate or incorrect. We identified, however, problems regarding management systems associated with the export license review process. We found that without documentation supporting export licensing decisions by the Export Control Operations Division (ECOD), we could not determine whether ECOD analysts considered all required criteria in their review of export cases referred to Energy. For example, we found that the ECOD did not retain records documenting the bases for its advice, recommendations, or decisions regarding its reviews of export license cases or revisions to lists of controlled commodities and, therefore, was not in compliance with certain provisions of the Export Administration Act, as amended, and Energy records management directives. Additionally, we found that the degree of compliance by Energy with the export licensing review criteria contained in the Export Administration Regulations and the Nuclear Non-Proliferation Act of 1978 could not be determined because ECOD did not retain records documenting the bases for its advice and recommendations on export cases.

Not Available

1993-08-10T23:59:59.000Z

302

Monticello Lead Plant License Renewal Project Summary Report  

Science Conference Proceedings (OSTI)

This report summarizes license renewal evaluation activities from the Monticello Lead Plant License Renewal Project (MLP Project) that were conducted between October 1988 and December 1992. The lessons learned during this first plant-specific license renewal evaluation provide valuable information that utilities can use when initiating a license renewal effort.

1996-10-06T23:59:59.000Z

303

PCx END USER SOFTWARE LICENSE AGREEMENT  

PCx_lic.web.enduser. doc 7-19-06 1 PCx END USER SOFTWARE LICENSE AGREEMENT This Agreement, is made between the University of Chica go as operator of Argonne National ...

304

Invention to License: The Tech Transfer Process  

NLE Websites -- All DOE Office Websites (Extended Search)

Invention to License: The Tech Transfer Process Speaker(s): Michael Mueller Robin C. Chiang Date: November 14, 2013 - 12:00pm - 1:00pm Location: 90-3122 Seminar HostPoint of...

305

Argument licensing and agreement in Zulu  

E-Print Network (OSTI)

In this thesis, I examine some core grammatical phenomena - case licensing, agreement, the EPP - through the lens of the Bantu language Zulu. Zulu has a number of remarkable and puzzling properties whose analysis affords ...

Halpert, Claire

2012-01-01T23:59:59.000Z

306

Technologies Recently Available for Licensing - 1999  

DOE Green Energy (OSTI)

An NREL Technology Transfer fact sheet describing four technologies that are available for licensing: steel weld weakness detection, cadmium telluride solar cell enhancement, HOMER model for choosing optimal electrical systems for remote areas, and inner-flame matrix burner.

Brown, H.; Touryan, K.

1999-09-07T23:59:59.000Z

307

Alternative Fuels Data Center: Biodiesel Distributor License and  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Distributor Distributor License and Recordkeeping Requirements to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Google Bookmark Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Delicious Rank Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on AddThis.com... More in this section...

308

Solar Hot Water Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hot Water Contractor Licensing Hot Water Contractor Licensing Solar Hot Water Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Arkansas Program Type Solar/Wind Contractor Licensing Arkansas offers several limited, specialty licenses for solar thermal installers under the general plumbing license. There are three specialty classifications available for solar thermal installers: a Restricted Solar Mechanic license, a Supervising Solar Mechanic license, and a Solar Mechanic Trainee classification. Installers with a Restricted Solar Mechanic license can install and maintain systems used to heat domestic hot water, but are not allowed to perform any other plumbing work. Individuals holding a Supervising Solar Mechanic license are able to supervise, install

309

Sodium fast reactor safety and licensing research plan. Volume I.  

SciTech Connect

This report proposes potential research priorities for the Department of Energy (DOE) with the intent of improving the licensability of the Sodium Fast Reactor (SFR). In support of this project, five panels were tasked with identifying potential safety-related gaps in available information, data, and models needed to support the licensing of a SFR. The areas examined were sodium technology, accident sequences and initiators, source term characterization, codes and methods, and fuels and materials. It is the intent of this report to utilize a structured and transparent process that incorporates feedback from all interested stakeholders to suggest future funding priorities for the SFR research and development. While numerous gaps were identified, two cross-cutting gaps related to knowledge preservation were agreed upon by all panels and should be addressed in the near future. The first gap is a need to re-evaluate the current procedures for removing the Applied Technology designation from old documents. The second cross-cutting gap is the need for a robust Knowledge Management and Preservation system in all SFR research areas. Closure of these and the other identified gaps will require both a reprioritization of funding within DOE as well as a re-evaluation of existing bureaucratic procedures within the DOE associated with Applied Technology and Knowledge Management.

Sofu, Tanju (Argonne National Laboratory, Argonne, IL); LaChance, Jeffrey L.; Bari, R. (Brokhaven National Laboratory Upton, NY); Wigeland, Roald (Idaho National Laboratory, Idaho Falls, ID); Denman, Matthew R.; Flanagan, George F. (Oak Ridge National Laboratory, Oak Ridge, TN)

2012-05-01T23:59:59.000Z

310

Hydropower : A Regulatory Guide to Permitting and Licensing in Idaho, Montana, Oregon, and Washington.  

DOE Green Energy (OSTI)

The design, construction and operation of a hydropower project can result in many potential impacts. These potential impacts are of concern to a host of federal, state, and local authorities. Early consultation with land and water management, fish and wildlife resource protection, and health and human safety-oriented agencies should occur to determine specific concerns and study requirements for each proposed project. This Guide to Permitting and Licensing outlines the characteristic features of attractive hydropower sites; summarizes an array of developmental constraints; illustrates potential environmental impacts and concerns; and summarizes all federal, state, and local permitting and licensing requirements.

McCoy, Gilbert A.

1992-12-01T23:59:59.000Z

311

Hydropower: A Regulatory Guide to Permitting and Licensing in Idaho, Montana, Oregon, and Washington.  

DOE Green Energy (OSTI)

The design, construction and operation of a hydropower project can result in many potential impacts. These potential impacts are of concern to a host of federal, state, and local authorities. Early consultation with land and water management, fish and wildlife resource protection, and health and human safety-oriented agencies should occur to determine specific concerns and study requirements for each proposed project. This Guide to Permitting and Licensing outlines the characteristic features of attractive hydropower sites; summarizes an array of developmental constraints; illustrates potential environmental impacts and concerns; and summarizes all federal, state, and local permitting and licensing requirements.

McCoy, Gilbert A.

1992-12-01T23:59:59.000Z

312

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

313

Alternative Fuels Data Center: Natural Gas and Propane Retailer License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Retailer License to someone by E-mail Retailer License to someone by E-mail Share Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Facebook Tweet about Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Twitter Bookmark Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Google Bookmark Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Delicious Rank Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Digg Find More places to share Alternative Fuels Data Center: Natural Gas and Propane Retailer License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Natural Gas and Propane Retailer License Compressed natural gas, liquefied natural gas, or liquefied petroleum gas

314

The Brazilian Audit Tribunal's role in improving the federal environmental licensing process  

SciTech Connect

This article describes the role played by the Brazilian Audit Tribunal (Tribunal de Contas da Uniao - TCU) in the external auditing of environmental management in Brazil, highlighting the findings of an operational audit conducted in 2007 of the federal environmental licensing process. Initially, it records the constitutional and legal framework of Brazilian environmental licensing, describing the powers and duties granted to federal, state and municipal institutions. In addition, it presents the responsibilities of the TCU in the environmental area, comparing these with those of other Supreme Audit Institutions (SAI) that are members of the International Organization of Supreme Audit Institutions (INTOSAI). It also describes the work carried out in the operational audit of the Brazilian environmental licensing process and its main conclusions and recommendations. Finally, it draws a parallel between the findings and recommendations made in Brazil with those of academic studies and audits conducted in other countries.

Lima, Luiz Henrique, E-mail: luizhlima@terra.com.b [Rio de Janeiro Federal University, Alberto Luiz Coimbra Postgraduate Institute of Engineering Research, Energy Planning Program (Brazil); Magrini, Alessandra, E-mail: ale@ppe.ufrj.b [Rio de Janeiro Federal University, Alberto Luiz Coimbra Postgraduate Institute of Engineering Research, Energy Planning Program (Brazil); Centro de Tecnologia - Bloco C Sala 211, Ilha do Fundao, 21949-900 - Rio de Janeiro, Caixa-Postal: 68565, RJ (Brazil)

2010-02-15T23:59:59.000Z

315

Total Thermal Management System for Hybrid and Full Electric Vehicles  

Total Thermal Management System for Hybrid and Full Electric Vehicles Note: The technology described above is an early stage opportunity. Licensing rights to this ...

316

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

317

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

318

DOE - Office of Legacy Management -- Rifle_New  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

319

DOE - Office of Legacy Management -- Nat_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

320

DOE - Office of Legacy Management -- Nat_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

DOE - Office of Legacy Management -- Rifle_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

322

DOE - Office of Legacy Management -- MexHat  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

323

DOE - Office of Legacy Management -- SLC_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

324

DOE - Office of Legacy Management -- Gun_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

325

DOE - Office of Legacy Management -- SLC_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

326

DOE - Office of Legacy Management -- Gun_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

327

DOE - Office of Legacy Management -- Slick_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

328

DOE - Office of Legacy Management -- MonValley  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

329

DOE - Office of Legacy Management -- Rifle_Old  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

330

DOE - Office of Legacy Management -- Slick_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

331

DOE - Office of Legacy Management -- Lake_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

332

DOE - Office of Legacy Management -- Dur_P  

Office of Legacy Management (LM)

Title I site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

333

DOE - Office of Legacy Management -- Dur_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

334

DOE - Office of Legacy Management -- GrnRiv  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

335

DOE - Office of Legacy Management -- Lake_D  

Office of Legacy Management (LM)

I disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2003 and...

336

DOE - Office of Legacy Management -- Maybell_West(2)  

Office of Legacy Management (LM)

disposal site, is licensed to DOE for long-term custody and managed by the Office of Legacy Management. The site transferred to the Office of Legacy Management in 2010 and...

337

License extension for the MIT research reactor  

Science Conference Proceedings (OSTI)

On February 8, 1995, the U.S. Nuclear Regulatory Commission (NRC) amended the operating license for the Massachusetts Institute of Technology (MIT) research reactor (MITR) by extending its expiration date from May 7, 1996, to August 8, 1999. This increase of 2.25 yr in the duration of the license was for the purpose of recapturing construction time. Extensions of this type have routinely been granted to power plants. The significance of the present action is that it is the first such extension ever granted to a research reactor. This paper describes the basis for the amendment request and the supporting safety analysis.

Bernard, J.A. [Massachusetts Institute of Technology, Cambridge, MA (United States)

1995-12-31T23:59:59.000Z

338

ENVIRONMENTAL ASSESSMENT FOR HYDROPOWER PILOT PROJECT LICENSE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR HYDROPOWER PILOT PROJECT LICENSE Admiralty Inlet Pilot Tidal Project-FERC Project No. 12690-005 (DOE/EA-1949) Washington Federal Energy Regulatory Commission Office of Energy Projects Division of Hydropower Licensing 888 First Street, NE Washington, DC 20426 U.S. Department of Energy Office of Energy Efficiency and Renewable Energy 1617 Cole Boulevard Golden, Colorado 80401 January 15, 2013 20130115-3035 FERC PDF (Unofficial) 01/15/2013 i TABLE OF CONTENTS LIST OF FIGURES ............................................................................................................ iv LIST OF TABLES............................................................................................................... v EXECUTIVE SUMMARY ................................................................................................

339

Regression analysis of oncology drug licensing deal values  

E-Print Network (OSTI)

This work is an attempt to explain wide variations in drug licensing deal value by using regression modeling to describe and predict the relationship between oncology drug deal characteristics and their licensing deal ...

Hawkins, Paul Allen

2006-01-01T23:59:59.000Z

340

Multiple clues for license plate detection and recognition  

Science Conference Proceedings (OSTI)

This paper addresses a license plate detection and recognition (LPR) task on still images of trucks. The main contribution of our LPR system is the fusion of different segmentation algorithms used to improve the license plate detection. We also compare ...

Pablo Negri; Mariano Tepper; Daniel Acevedo; Julio Jacobo; Marta Mejail

2010-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Alternative Fuels Data Center: License Exemptions for Biodiesel Production  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

License Exemptions for License Exemptions for Biodiesel Production for Personal Use to someone by E-mail Share Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Facebook Tweet about Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Twitter Bookmark Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Google Bookmark Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Delicious Rank Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Digg Find More places to share Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on AddThis.com...

342

Hydrogen and Fuel Cell Technologies Available for Licensing ...  

... Energy Innovation Portal on Google; Bookmark Hydrogen and Fuel Cell Technologies Available for Licensing - Energy Innovation Portal on Delicious ...

343

SAS4A/SASSYS-1 Commercial Software License Agreement  

Licensed Program is furnished is free of manufacturing defects and damage provided that themedia has been properly installed by Licensee.

344

Oil and Water Dispersion Technology Licensing Opportunity  

E-Print Network (OSTI)

Oil and Water Dispersion Technology Licensing Opportunity Technology Brief Professor Richard can be achieved by the process of degassing. The removal of dissolved gas, for example in oil dispersions. While laboratory scale degassing is predominantly batch processed and time consuming, Professor

345

Total System Performance Assessment - License Application Methods and Approach  

Science Conference Proceedings (OSTI)

''Total System Performance Assessment-License Application (TSPA-LA) Methods and Approach'' provides the top-level method and approach for conducting the TSPA-LA model development and analyses. The method and approach is responsive to the criteria set forth in Total System Performance Assessment Integration (TSPAI) Key Technical Issues (KTIs) identified in agreements with the U.S. Nuclear Regulatory Commission, the ''Yucca Mountain Review Plan'' (YMRP), ''Final Report'' (NRC 2003 [163274]), and the NRC final rule 10 CFR Part 63 (NRC 2002 [156605]). This introductory section provides an overview of the TSPA-LA, the projected TSPA-LA documentation structure, and the goals of the document. It also provides a brief discussion of the regulatory framework, the approach to risk management of the development and analysis of the model, and the overall organization of the document. The section closes with some important conventions that are used in this document.

J. McNeish

2003-12-08T23:59:59.000Z

346

Total System Performance Assessment-License Application Methods and Approach  

SciTech Connect

''Total System Performance Assessment-License Application (TSPA-LA) Methods and Approach'' provides the top-level method and approach for conducting the TSPA-LA model development and analyses. The method and approach is responsive to the criteria set forth in Total System Performance Assessment Integration (TSPAI) Key Technical Issue (KTI) agreements, the ''Yucca Mountain Review Plan'' (CNWRA 2002 [158449]), and 10 CFR Part 63. This introductory section provides an overview of the TSPA-LA, the projected TSPA-LA documentation structure, and the goals of the document. It also provides a brief discussion of the regulatory framework, the approach to risk management of the development and analysis of the model, and the overall organization of the document. The section closes with some important conventions that are utilized in this document.

J. McNeish

2002-09-13T23:59:59.000Z

347

Software License Agreement | Scientific and Technical Information Program  

Office of Scientific and Technical Information (OSTI)

License Agreement License Agreement Print page Print page Email page Email page U.S. Department of Energy Office of Scientific and Technical Information Energy Science and Technology Software Center As the Office of Scientific and Technical Information's (OSTI) Energy Science and Technology Software Center (ESTSC), we are authorized to license and distribute this software to you. Upon receipt of license fee and execution of this license, the herein identified computer software package (software and accompanying documentation) is licensed, on a non-exclusive basis, to the UNDERSIGNED for use ONLY at the site designated herein below, and is to be used in accordance with this license and with the special restrictions identified below or on the software package. DOE-funded modifications, enhancements, or conversions of this

348

Licensing an assured isolation facility for low-level radioactive waste. Volume 1: Licensing strategy and issues  

Science Conference Proceedings (OSTI)

This report provides a detailed set of proposed criteria and guidance for the preparation of a license application for an assured isolation facility (AIF). The report is intended to provide a detailed planning basis upon which a prospective applicant may begin pre-licensing discussions with the Nuclear Regulatory Commission and initiate development of a license application. The report may also be useful to the NRC or to state regulatory agencies that may be asked to review such an application. Volume 1 of this report provides background information, and describes the licensing approach and methodology. Volume 2 identifies specific information that is recommended for inclusion in a license application.

Silverman, D.J.; Bauser, M.A. [Morgan, Lewis and Bockius, Washington, DC (United States); Baird, R.D. [Rogers and Associates Engineering Corp., Salt Lake City, UT (United States)

1998-07-01T23:59:59.000Z

349

Low-Voltage Environmentally-Qualified Cable License Renewal Industry Report -- Revision 1  

Science Conference Proceedings (OSTI)

Low-voltage environmentally-qualified cable components have been evaluated relative to the effects of age-related degradation mechanisms; the capability of current design limits, inservice examination, testing, repair, refurbishment, and other programs to manage these effects; and the assurance that these cable components can continue to perform their intended safety functions in the license renewal term. This industry report (IR), one of a series of ten, provides a generic technical basis for evaluation...

1994-07-01T23:59:59.000Z

350

DOE NETL Intellectual Property Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

18.12 18.12 DOE NETL Intellectual Property Available for Licensing Complete marketing summaries of the following technologies will be posted on the NETL Available Technologies page shortly. For additional information or to submit a license application, please contact techtransfer@netl.doe.gov. Technology Title and Brief Description Intellectual Property Status Metal oxide promoters for improving the reactivity and capacity of oxygen carriers for the chemical looping combustion process This invention provides an oxygen carrier comprised of a plurality of metal oxide particles in contact with a plurality of MgO promoter particles. The MgO promoter particles increase the reaction rate and oxygen utilization of the metal oxide when contacting with a gaseous hydrocarbon at a temperature greater than

351

TO :Lyall E. Johnson, Chief Licensing Branch  

Office of Legacy Management (LM)

Lyall E. Johnson, Chief Lyall E. Johnson, Chief Licensing Branch ,,,_ i-.. FROM :Clifford K. Beck, Chief q q+. ., ,,/,j !i-/ I, v' Hazards Evaluation Branch ,: s~~p:~LLItma0~7c ~HEI-IICAL wows We have reviewed the letter of December 10, 1958, from Mallinckrodt Chemical Works, requesting amendment of License No. SNM-33 to permit pelleting operations on uranium enriched to 5% U-235 in a new facility at Hematite, Missouri. Batch sizes throughout the operations will not exceed limited safe masses as specified in Report K-1019, Part 4 (Deleted). Neither the diameter nor capacity of the storage hopper located above the feed hopper of the pelleting press is given. Either the diameter should be not over the limited safe dimension or positive means should be in effect to insure against more than a limited safe m&s in the

352

Transmittal of Additional Information For License  

E-Print Network (OSTI)

By letter dated June 5, 2001 Southern Nuclear Operating Company (SNC) formally transmitted the collected responses to eighteen open items contained in the draft license renewal Safety Evaluation Report to NRC. Since that time additional information has been developed on several open items, and Appendix B, the FSAR Supplement, and various application sections have been revised. This letter formally transmits all additional information related to the Hatch license renewal application and the related open items, and is intended to complete the documentation necessary to allow the open items to be closed by the NRC. If you have any questions concerning this information, please contact this office. Respectfully submitted, HLS/JAM H. L. Sumner, Jr. Enclosures:

Lewis Sumner; Edwin I. Hatch; Nuclear Plant

2001-01-01T23:59:59.000Z

353

NRC antitrust licensing actions, 1978--1996  

Science Conference Proceedings (OSTI)

NUREG-0447, Antitrust Review of Nuclear Power Plants, was published in May 1978 and includes a compilation and discussion of U.S. Nuclear Regulatory Commission (NRC) proceedings and activity involving the NRC`s competitive review program through February 1978, NUREG-0447 is an update of an earlier discussion of the NRC`s antitrust review of nuclear power plants, NR-AIG-001, The US Nuclear Regulatory Commission`s Antitrust Review of Nuclear Power Plants: The Conditioning of Licenses, which reviewed the Commission`s antitrust review function from its inception in December 1970 through April 1976. This report summarizes the support provided to NRC staff in updating the compilation of the NRC`s antitrust licensing review activities for commercial nuclear power plants that have occurred since February 1978. 4 refs., 4 tabs.

Mayer, S.J.; Simpson, J.J.

1997-09-01T23:59:59.000Z

354

Licensing : BioEnergy Science Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Available for Licensing Available for Licensing As new inventions are disclosed from BESC researchers, we will post information about the inventions on this webpage. Use the search engine below to match your technology needs with BESC disclosures or view all technologies in a particular category by clicking on the category below. View all inventions Enter keywords in the box. Separate the words with a comma (,) for multiple keywords. GO Advanced Biofuels (1 Inventions) Bioconversion (2 Inventions) Biomass Grasses (7 Inventions) Trees (1 Inventions) Genetic Tools (9 Inventions) Biotechnology (9 Inventions) Imaging (2 Inventions) PreTreatment (2 Inventions) Adams, Michael A (2 Inventions) Albersheim, Ivana G. (1 Invention) Backe, Jason (1 Invention) Bar-Peled, Maor (1 Invention) Bhave, Ramesh R (2 Inventions)

355

The Atomic Safety and Licensing Board Panel  

SciTech Connect

Through the Atomic Energy Act, Congress made is possible for the public to get a full and fair hearing on civilian nuclear matters. Individuals who are directly affected by any licensing action involving a facility producing or utilizing nuclear materials may participate in a formal hearing, on the record, before independent judges on the Atomic Safety and Licensing Board Panel (ASLBP or Panel). Frequently, in deciding whether a license, permit, amendment, or extension should be granted to a particular applicant, the Panel members must be more than mere umpires. If appropriate, they are authorized to go beyond the issues the parties place before them in order to identify, explore, and resolve significant questions involving threats to the public health and safety that come to a board`s attention during the proceedings. This brochure explains the purpose of the panel. Also addressed are: type of hearing handled; method of public participation; formality of hearings; high-level waste; other panel responsibilities and litigation technology.

NONE

1998-03-01T23:59:59.000Z

356

License Application Design Selection Report, REV 01. August 1999  

Science Conference Proceedings (OSTI)

In December 1998, the U.S. Department of Energy (DOE) published the ''Viability Assessment of a Repository at Yucca Mountain'' (DOE 1998b). The Viability Assessment described a preliminary design of a potential repository at Yucca Mountain, Nevada, for disposal of spent nuclear fuel and high-level radioactive waste, and assessed the probable behavior of that repository design in the Yucca Mountain geologic setting. The report concluded that 'Yucca Mountain remains a promising site for a geologic repository and that work should proceed to support a decision in 2001 on whether to recommend the site to the President for development as a repository'. It also concluded that 'uncertainties remain about key natural processes, the preliminary design, and how the site and design would interact'. Recognizing that the design that was evaluated will be refined before a license application could be submitted, the Viability Aassesment notes that 'DOE is evaluating several design options and alternatives that could reduce existing uncertainty and improve the performance of the repository system'. During the preparation of the Viability Assessment, DOE asked the contractor for the Civilian Radioactive Waste Management Program to study alternative design concepts for a potential geologic repository for high-level radioactive waste at Yucca Mountain. The License Application Design Selection (LADS) project was initiated to conduct that study. The goal of the project was to develop and evaluate a diverse range of conceptual repository designs that work well in concert with the Yucca Mountain site and to recommend an initial design concept for the possible Site Recommendation and License Apllication. This report presents the results of the LADS project. The design process consisted of two phases. In Phase I, a series of basic design concepts (design alternatives) and components (design features) were analyzed for their potential value as elements of a repository design. In Phase II, these enhanced design alternatives were refined, screened for accepatable postclosure performance, and evaluated against a set of criteria addressing four broad aspects of the repository: performance demonstrability; flexibility; construction, operations and maintenance; and cost. Based on this evaluation, a conceptual design was recommended to DOE and could be characterized as a low thermal impact design. Included in the report is more in depth information regarding the basis of the recommendation, performance issues, benefits related to reduced uncertainties, construction/operational benefits, technical and programmatic flexibilty and cost impacts.

Hastings, C.R.

1999-08-30T23:59:59.000Z

357

Materials Reliability Program: Strategies for Managing Aging Effects in PWR Vessel Internals - Interim Update (MRP-99)  

Science Conference Proceedings (OSTI)

This report updates the previous EPRI report on developing strategies for managing aging effects in pressurized water reactor (PWR) internals during the license renewal term.

2003-12-04T23:59:59.000Z

358

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

359

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

360

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

362

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

363

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

364

City of Dubuque - Solar Thermal Licensing Requirement | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Dubuque - Solar Thermal Licensing Requirement City of Dubuque - Solar Thermal Licensing Requirement City of Dubuque - Solar Thermal Licensing Requirement < Back Eligibility Construction Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Iowa Program Type Solar/Wind Contractor Licensing Provider City of Dubuque The City of Dubuque requires a Solar Thermal License in order for a person to install a solar thermal project on a home or business. The requirement does not apply to solar photovoltaics. The licensing requirement can be met one of two ways. An installer may be Solar Thermal Certified by the North American Board of Certified Energy Practitioners (NABCEP) or An installer may complete the Northeast Iowa Community College Solar Thermal Training Installers are also required to obtain a permit before altering or

365

City of Madison - Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Madison - Contractor Licensing of Madison - Contractor Licensing City of Madison - Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Water Heating Program Info State Wisconsin Program Type Solar/Wind Contractor Licensing Provider City of Madison Although the State of Wisconsin does not have any specific laws for contractors dealing with renewable energy, the City of Madison has issued rules for contractor licensing and equipment standards for solar thermal installations. In the City's Heating, Ventilating and Air Conditioning Code is a requirement for a Class A-4 license for "a person desiring to enter into the business of installing, altering or repairing active solar heating equipment" as well as fee and examination details. As a result of a

366

Nuclear Regulatory Commission Regulatory and Licensing Matters | Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Regulatory Commission Regulatory and Licensing Matters Regulatory Commission Regulatory and Licensing Matters Nuclear Regulatory Commission Regulatory and Licensing Matters GC-52 provides legal advice to DOE regarding Nuclear Regulatory Commission (NRC) regulatory and licensing matters of interest to DOE, either as an NRC license applicant or in connection with related authorities and responsibilities of DOE and NRC on nuclear material, nuclear waste, and nuclear nonproliferation matters. GC-52 attorneys provide advice and support on a variety of NRC matters including regulation and licensing of DOE independent spent fuel storage facilities (ISFSIs) and a mixed-oxide fuel fabrication facility, consultation with NRC on certain DOE waste determinations, and imports and exports of nuclear materials and radioactive sealed sources.

367

Patents Licensing and Patent Waivers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Patents Licensing and Patent Waivers Patents Licensing and Patent Waivers Patents Licensing and Patent Waivers Patent Licensing The DOE Invention Licensing Program provides information on licensing of DOE-owned inventions. Patent Waivers Patent Rights - Waiver Clause: This clause makes modifications to the Patent Rights clause of 48 C.F.R. 52.227-12 and should replace that clause in the contract when an advance waiver is granted. Petition form for advance waiver (PDF) to contractor of Government's title to inventions that may be made under a Government contract [42 U.S.C. 5908] [10 C.F.R. Part 784]. Petition form for waiver (PDF) to contractor of Government's title to an identified invention already made under a Government contract [42 U.S.C. 5908] [10 C.F.R. Part 784]. Patent Waiver Decisions:

368

NEXT GENERATION NUCLEAR PLANT LICENSING BASIS EVENT SELECTION WHITE PAPER  

SciTech Connect

The Next Generation Nuclear Plant (NGNP) will be a licensed commercial high temperature gas-cooled reactor (HTGR) plant capable of producing the electricity and high temperature process heat for industrial markets supporting a range of end-user applications. The NGNP Project has adopted the 10 CFR 52 Combined License (COL) application process, as recommended in the Report to Congress, dated August 2008, as the foundation for the NGNP licensing strategy. NRC licensing of the NGNP plant utilizing this process will demonstrate the efficacy of licensing future HTGRs for commercial industrial applications. This white paper is one in a series of submittals that will address key generic issues of the COL priority licensing topics as part of the process for establishing HTGR regulatory requirements.

Mark Holbrook

2010-09-01T23:59:59.000Z

369

Vorbeck Materials Licenses Graphene-based Battery Technologies ...  

Vorbeck Materials Licenses Graphene-based Battery Technologies Vorbeck Materials Corp of Jessup, MD participated in the America’s Next Top Energy Innovator program ...

370

LED North America Receives Exclusive Patent License for ORNL...  

NLE Websites -- All DOE Office Websites (Extended Search)

Highlights Success Stories Contact Us Index Home | ORNL | Success Stories SHARE LED North America Receives Exclusive Patent License for ORNL Technology June 19, 2013 Views...

371

Property:FERC License Issuance Date | Open Energy Information  

Open Energy Info (EERE)

Issuance Date Jump to: navigation, search Property Name FERC License Issuance Date Property Type String Retrieved from "http:en.openei.orgwindex.php?titleProperty:FERCLicense...

372

Property:FERC License Application Date | Open Energy Information  

Open Energy Info (EERE)

Property Name FERC License Application Date Property Type String Retrieved from "http:en.openei.orgwindex.php?titleProperty:FERCLicenseApplicationDate&oldid610687...

373

Get listed in the Directory of Licensed Professionals | ENERGY...  

NLE Websites -- All DOE Office Websites (Extended Search)

or Province(s) in which you are a licensed Professional Engineer or Registered Architect Whether you hold a Green Building Engineer certification from the Association of...

374

Glass Furnace Model (GFM) Six-Month Trial License  

Licensed Program is furnished is free of manufacturing defects and damage provided that the media has been properly installed by Licensee.

375

Non-exclusive patent license agreement between Alliance and ...  

DRAFT – FOR DISCUSSION PURPOSES ONLY Page 1 of 19 NON-EXCLUSIVE PATENT LICENSE AGREEMENT Between Alliance for Sustainable Energy, LLC And

376

NOTICE OF INTENT TO GRANT PARTIALLY EXCLUSIVE LICENSE NATIONAL ...  

Gasification Combined Cycle (IGCC) Operator Training System (OTS) Software. The software license will include source and executable copies of the IGCC Dynamic Model ...

377

LALP-05-111 Licensable Novel Zeolite Synthesis Technologies Method ...  

An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA www.lanl.gov/partnerships/license/technologies/ Summary Zeolites and molecular

378

City of Madison - Contractor Licensing (Wisconsin) | Open Energy...  

Open Energy Info (EERE)

the City of Madison has issued rules for contractor licensing and equipment standards for solar thermal installations. In the City's Heating, Ventilating and Air Conditioning Code...

379

City of Madison - Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the City of Madison has issued rules for contractor licensing and equipment standards for solar thermal installations. In the City's Heating, Ventilating and Air Conditioning Code...

380

Sandia National Laboratories : Licensing/Technology Transfer News  

Search; About Sandia; Mission Areas; Newsroom; Careers; Doing Business; Education; Contact Us; News. IP Home; Search/Browse Technology Portfolios; Licensing Overview ...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

NETL: News Release - DOE Licenses Mercury Control Patent to Help...  

NLE Websites -- All DOE Office Websites (Extended Search)

4, 2007 DOE Licenses Mercury Control Patent to Help Meet Clean Air Regulations Research Aims at Trace Element Reduction from Power Generation Facilities by 2010 Washington, DC - A...

382

MC2, Version 3.0, Software License Agreement  

Licensed Program is furnished is free of manufacturing defects and damage provided that the media has been properly installed by Licensee.

383

NETL: News Release - Licensing Agreement Moves Two NETL-Patented...  

NLE Websites -- All DOE Office Websites (Extended Search)

March 23, 2011 Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization Washington, D.C. - Two new patented sorbents used for carbon dioxide...

384

Argonne, Evigia finalize licensing agreement for next-gen RFID...  

NLE Websites -- All DOE Office Websites (Extended Search)

See related New RFID technology tracks and monitors nuclear materials Argonne, Evigia finalize licensing agreement for next-gen RFID sensor technology By Angela Hardin * July 16,...

385

U.S. Department of Energy Technologies Available for Licensing ...  

U.S. Department of Energy Technologies Available for Licensing Our Mission. The mission of the Energy Department is to ensure America’s security and prosperity by ...

386

NRC Licensing Strategy Development for the NGNP  

DOE Green Energy (OSTI)

The Next Generation Nuclear Plant (NGNP) project will provide the basis for commercialization of a new generation of advanced nuclear plants that utilize hightemperature gas-cooled reactor (HTGR) technology. The inherently safe HTGR design characteristics can be utilized to supply high-temperature process heat, co-generated electricity, and/or hydrogen for a number of industrial applications (e.g., petrochemical processes). Completion of the NGNP will result in a facility that demonstrates the safety and economics of the design, the commercial industrial potential of the technology, and the viability of the licensing strategy.

Mark R. Holbrook; Trevor Cook

2008-09-01T23:59:59.000Z

387

2013 Licensed Professional's Guide to the ENERGY STAR Label for Commercial Buldings  

NLE Websites -- All DOE Office Websites (Extended Search)

The Licensed Professional's Guide: Understanding the Roles and Requirements for Verifying Commercial Building Applications for ENERGY STAR Certification Contents Introduction 1 Verifying the Data Checklist 6 Verifying the Statement of Energy Performance 21 Verifying the Indoor Environmental Conditions 23 Appendix A: Sample Applications for ENERGY STAR Certification 27 Appendix B: Steps to Correct Information on the Data Checklist and Statement of Energy Performance 33 The Licensed Professional's Guide 1 Introduction Energy use in commercial buildings accounts for nearly 20 percent of U.S. greenhouse gas emissions at a cost of more than $100 billion per year. Through ENERGY STAR, the United States Environmental Protection Agency (EPA) works with owners and managers of our nation's

388

Pilgrim Nuclear Power Station Docket No. 50-293 License No. DPR-35 Pilgrim Nuclear Power Station (PNPS) License Renewal Application  

E-Print Network (OSTI)

information that supplemented the LRA as a result of operating experience (OE) and industry activities potentially relevant to aging management in several specific areas. This letter provides further clarification of that supplemental information to the LRA specific to the following areas which Entergy agreed to evaluate based upon communications with the NRC technical staff. 1. Aging management of neutron-absorbing materialsEntergy Nuclear Operations, Inc. Letter Number: 2.11.017 Pilgrim Nuclear Power Station Page 2 2. Inspection of buried pipe and tanks 3. Aging management of low voltage cables 4. Inspection of containment coatings 5. Metal fatigue NUREG/CR-6260 A new regulatory commitment is provided in the PNPS License Renewal Commitment List as

Stephen J. Bethay

2011-01-01T23:59:59.000Z

389

Successful Clean Coal Technology Licensed for Commercial Application |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful Clean Coal Technology Licensed for Commercial Successful Clean Coal Technology Licensed for Commercial Application Successful Clean Coal Technology Licensed for Commercial Application July 26, 2010 - 1:00pm Addthis Washington, DC - The U.S. Department of Energy (DOE) has received the first installment from a repayment agreement for the Liquid Phase Methanol (LPMEOH™) Process. A royalty license issued for the advanced methanol production system underscores the clean coal technology's presence in the commercial market. The DOE-funded LPMEOH Process, developed in collaboration with Air Products and Chemicals Inc., has been licensed to Woodland Biofuel Inc., who intends to use the technology to develop a wood-gasification process to produce methanol from wood-scrap. The first facility is planned in New York State.

390

DOE Announces Yucca Mountain License Application Schedule | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Yucca Mountain License Application Schedule Yucca Mountain License Application Schedule DOE Announces Yucca Mountain License Application Schedule July 19, 2006 - 3:13pm Addthis New Director Ward Sproat Testifies on Revised Timeline WASHINGTON, DC - The Department of Energy (DOE) today announced that it will submit a license application to the Nuclear Regulatory Commission (NRC) for a nuclear waste repository at Yucca Mountain, Nevada, no later than June 30, 2008. The Department also announced that if requested legislative changes are enacted, the repository will be able to accept spent nuclear fuel and high-level waste starting in early 2017. Announcing a schedule for submitting a license application is another step in the Department's mission to provide stability, clarity and predictability in moving the Yucca Mountain Project forward as quickly as

391

Solar and Wind Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar and Wind Contractor Licensing Solar and Wind Contractor Licensing Solar and Wind Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Wind Program Info State Connecticut Program Type Solar/Wind Contractor Licensing Provider Connecticut Department of Consumer Protection The Connecticut Department of Consumer Protection (DCP) is authorized to issue licenses for solar-thermal work, solar-electric work and wind-electric work. "Solar thermal work" is defined as "the installation, erection, repair, replacement, alteration, or maintenance of active, passive and hybrid solar systems that directly convert ambient energy into heat or convey, store or distribute such ambient energy." Solar electricity

392

Los Alamos National Laboratory announces Express Licensing program  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL announces Express Licensing program LANL announces Express Licensing program Los Alamos National Laboratory announces Express Licensing program With the launch of a new "Express Licensing" program, access to innovative technology invented at Los Alamos National Laboratory has gotten easier. August 1, 2013 The following sequence shows the formation of nanoFOAM technology developed at Los Alamos National Laboratory. NanoFOAMs are self-supporting nanoporous metal foams that have potential applications in oil-refining processes, filtration of liquid or airborne germs, rocket fuels or catalytic production of a range of products from ammonia to plastics. NanoFOAM is just one of many licensable technologies available at Los Alamos National Laboratory. The following sequence shows the formation of nanoFOAM technology developed

393

Non-Power Reactor Operator Licensing Examiner Standards. Revision 1  

SciTech Connect

The Non-Power Reactor Operator Licensing Examiner Standards provide policy and guidance to NRC examiners and establish the procedures and practices for examining and licensing of applicants for NRC operator licenses pursuant to Part 55 of Title 10 of the Code of Federal Regulations (10 CFR 55). They are intended to assist NRC examiners and facility licensees to understand the examination process better and to provide for equitable and consistent administration of examinations to all applicants by NRC examiners. These standards are not a substitute for the operator licensing regulations and are subject to revision or other internal operator examination licensing policy changes. As appropriate, these standards will be revised periodically to accommodate comments and reflect new information or experience.

NONE

1995-06-01T23:59:59.000Z

394

Solar Hot Water Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Hot Water Contractor Licensing Solar Hot Water Contractor Licensing Solar Hot Water Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Maine Program Type Solar/Wind Contractor Licensing In order to be eligible for Maine's solar thermal rebate program, systems must be installed by licensed plumbers who have received additional certification for solar thermal systems from the North American Board of Certified Energy Practitioners (NABCEP). The state solar thermal rebate program maintains a list of Efficiency Maine registered vendors/installers. In addition, Efficiency Maine has information for vendors interested in becoming registered and listed on the [http://www.efficiencymaine.com/at-home/registered-vendor-locator web

395

Domestic Export Licensing | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

396

Combined Construction and Operating License (COL)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 Updates available at: http://www.nuclear.gov NEXT UPDATE - April 2013 Page 1 News Updates  On October 22 Dominion Resources Inc. announced that it would close and decommission its Kewaunee Power Station located in Carlton, Wis. after failing to find a buyer for the plant. The company said that the plant closure was a purely economic decision resulting from low projected wholesale electricity prices. Power production will cease in the second quarter of 2013.  On November 20, 2012, the Department of Energy announced that it had selected the Generation mPower team as a recipient for Government cost-shared funding as part of its Small Modular Reactor Licensing Technical Support program. The Department also announced plans to issue a

397

TEAM 1 Drivers License.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

I I Core Status: new users must complete 2 training sessions and pass a sample exchange exam to work independently during Core sessions (regular work hours). Flex Status: core users must complete 5 Core sessions and pass a driving test to work during Flex sessions (evening and weekend hours). All TEAM I scheduling must be coordinated through Peter Ercius at PErcius@lbl.gov. You may only be assigned two sessions per month. CORE LICENSE TEST Safety  Understand emergency shutdown procedure  Understand potential X-ray hazards of the modified instrument and shielding  Read and understand the Low Dose Machine Authorization document  Recognize high voltage hazards with the TEAM stage  Demonstrate handling of column valves  Point out where emergency contact numbers are posted

398

Patent Protection and Licensing Procedure | BNL Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Inventors BNL Inventors Patent Protection and Licensing Procedure TCP Staff Assignment - Invention Disclosures received by Intellectual Property Legal Group (IPLG) will be given a BNL number, and assigned to a specific TCP staff member for commercial assessment. Henceforth, the assigned staff member will be responsible for all commercialization actions relating to the docket. Assessment - The TCP staff member assigned to the docket will meet with the inventor(s). Together they will discuss the invention and make a preliminary evaluation of potential applications and possible markets. Based on commercial assessment and a preliminary novelty determination, the TCP staff will make a recommendation to the IPLG whether to patent the invention. The TCP's decision and relevant documents will be circulated

399

Clean Fractionation: Technology Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Clean Fractionation Clean Fractionation National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Offi ce of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. NREL/FS-7A1-43959 * October 2008 Printed with a renewable-source ink on paper containing at least 50% wastepaper, including 10% postconsumer waste. You'll find more technologies available for licensing on the NREL Technology Transfer Web site at www.nrel.gov/technologytransfer/. National Renewable Energy Laboratory Innovation for Our Energy Future Biorefinery production costs are driven Insolubles Wash Cellulose pulp Lignocellulosic feedstock Solubles

400

Licensing and {open_quotes}CRADA`s{close_quotes} in Oak Ridge technology transfer  

SciTech Connect

In the belief that effective technology transfer is a ``contact sport,`` Martin Marietta Energy Systems (Energy Systems), the Department of Energy`s (DOE`s) management contractor in Oak Ridge, Tennessee, encourages its research and engineering employees to directly interact with their commercial-sector counterparts. Over the years, relationships which have been initiated through such technical interactions have led to many of the patent licenses ad cooperative research and development agreements (CRADAs) which currently exist among Energy Systems, US companies, universities, and industrial consortia. The responsibility for creating and implementing Energy Systems policies and procedures to accomplish DOE`s technology transfer objectives in Oak Ridge lies with the Office of Technology Transfer (OTT). In addition, licensing executives within OTT are responsible for negotiating the terms and conditions of patent licenses and CRADAs for the commercialization of government-funded technologies and research expertise. Other technology transfer initiatives in Oak Ridge help companies in a wide range of industries overcome manufacturing obstacles, enabling them to retain existing jobs and to create new business opportunities.

Prosser, G.A.

1993-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Management  

E-Print Network (OSTI)

Research has indicated that, depending upon driver and passenger characteristics, passengers can have either a positive or negative influence upon driver behaviour. In conclusion to a recent study investigating the roles that passengers can play to influence, positively and negatively, driver behaviour, Regan and Mitsopoulos (2001) recommended, among other things, that the principles of Crew Resource Management (CRM) training may increase passengers ’ ability to positively influence driver behaviour and also drivers ’ ability to accept constructive feedback. The present study investigated the potential application of CRM training within young driver training in the Australian Capital Territory (ACT). This involved a literature review, an analysis of the differences between the driving and aviation domains, an analysis of the team-based activities and the knowledge, skills and attitudes required during driving to perform those activities, consultation with CRM experts from the aviation and medicine domains and the conduct of six focus groups involving young learner drivers, provisional licence drivers and course teachers. The findings indicate that CRM training as part of young driver training in the ACT is a viable concept to pursue. The application of CRM training within young driver training has potential to significantly enhance the positive and reduce the negative effects of passengers on young driver behaviour, and thus the safety of young drivers and passengers alike. The outcomes of this study formed the basis for a set of recommendations for the development of a young driver CRM training program in the ACT.

Young Drivers; Eve Mitsopoulos; Michael Regan; Janet Anderson; Paul Salmon; Jessica Edquist; Ii Report Documentation Page

2005-01-01T23:59:59.000Z

402

IT & Communications Licenses Available | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

and Classification 201002432 Environment for Access Control Policy Analysis and Management of Sensors 201002470 USB Architecture for Removable Media 201002481 Scenario Driven...

403

State of California BOARD OF EQUALIZATION CIGARETTE AND TOBACCO PRODUCTS LICENSING ACT REGULATIONS  

E-Print Network (OSTI)

A new license shall not be issued to an applicant when any of the following apply: (1) a license subject to civil or criminal citation has been issued for the same location; (2) a license for the same location is suspended; (3) a license for the same location has been revoked any time within the preceding five years; or (4) any person

Regulation Denial; Of License

2006-01-01T23:59:59.000Z

404

Nuclear Power 2010 Program: Combined Construction and Operating License &  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Power 2010 Program: Combined Construction and Operating Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report The Nuclear Power 2010 (NP 2010) Construction and Operating License/Design Certification (COL/DC) Demonstration program together with the financial incentives provided by the Energy Policy Act of 2005 are the two primary reasons why a number of license applications for new nuclear construction are before the NRC today, and why the first new nuclear plants in over 30 years are under construction in the United States. As with all significant endeavors, there are lessons to be learned from the

405

DOE Marks Milestone in Submitting Yucca Mountain License Application |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Marks Milestone in Submitting Yucca Mountain License Marks Milestone in Submitting Yucca Mountain License Application DOE Marks Milestone in Submitting Yucca Mountain License Application June 3, 2008 - 12:51pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced submittal of a license application (LA) to the U.S. Nuclear Regulatory Commission (NRC) seeking authorization to construct America's first repository for spent nuclear fuel and high-level radioactive waste at Yucca Mountain, Nevada. The 8,600 page application describes DOE's plan to safely isolate spent nuclear fuel and high-level radioactive waste in tunnels deep underground at Yucca Mountain, a remote ridge on federally controlled land in the Mojave Desert 90 miles northwest of Las Vegas. Currently, the waste is stored at 121 temporary locations in 39 states

406

DOE Signs Advanced Enrichment Technology License and Facility Lease |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advanced Enrichment Technology License and Facility Lease Advanced Enrichment Technology License and Facility Lease DOE Signs Advanced Enrichment Technology License and Facility Lease December 8, 2006 - 9:34am Addthis Announces Agreements with USEC Enabling Deployment of Advanced Domestic Technology for Uranium Enrichment WASHINGTON, DC - U.S. Secretary of Energy Samuel W. Bodman today announced the signing of a lease agreement with the United States Enrichment Corporation, Inc. (USEC) for their use of the Department's gas centrifuge enrichment plant (GCEP) facilities in Piketon, OH for their American Centrifuge Plant. The Department of Energy (DOE) also granted a non-exclusive patent license to USEC for use of DOE's centrifuge technology for uranium enrichment at the plant, which will initiate the first successful deployment of advanced domestic enrichment technology in the

407

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

408

Property:Permit/License Buildout (MW) | Open Energy Information  

Open Energy Info (EERE)

Permit/License Buildout (MW) Permit/License Buildout (MW) Jump to: navigation, search Property Name Permit/License Buildout (MW) Property Type String Pages using the property "Permit/License Buildout (MW)" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 40 + MHK Projects/Algiers Light Project + 20 + MHK Projects/Anconia Point Project + 15 + MHK Projects/Ashley Point Project + 148 + MHK Projects/Avalon Tidal + 30 + MHK Projects/Avondale Bend Project + 18 + MHK Projects/BW2 Tidal + 3 + MHK Projects/Bar Field Bend + 94 + MHK Projects/Barfield Point + 114 + MHK Projects/Bayou Latenache + 50 + MHK Projects/Bondurant Chute + 152 + MHK Projects/Breeze Point + 198 + MHK Projects/Brilliant Point Project + 56 + MHK Projects/Brough Head Wave Farm + 200 +

409

Nuclear Power 2010 Program: Combined Construction and Operating License &  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Power 2010 Program: Combined Construction and Operating Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report The Nuclear Power 2010 (NP 2010) Construction and Operating License/Design Certification (COL/DC) Demonstration program together with the financial incentives provided by the Energy Policy Act of 2005 are the two primary reasons why a number of license applications for new nuclear construction are before the NRC today, and why the first new nuclear plants in over 30 years are under construction in the United States. As with all significant endeavors, there are lessons to be learned from the

410

Photovoltaics at DOE's National Renewable Energy Laboratory License  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SOLAR ROOF-TOP LICENSE AGREEMENT KEY TERMS SOLAR ROOF-TOP LICENSE AGREEMENT KEY TERMS (Non-Recordable) FOR INSTALLATION AND OPERATION OF A SOLAR ROOF-TOP ELECTRIC GENERATING SYSTEM AT THE NATIONAL RENEWABLE ENERGY LABORATORY, RESEARCH SUPPORT FACILITY United States of America Department of Energy Office of Energy Efficiency and Renewable Energy Golden Field Office THIS LICENSE AGREEMENT (License) is made as of the _____ day of August, 2009, by the UNITED STATES OF AMERICA, Department of Energy, Office of Energy Efficiency and Renewable Energy, Golden Field Office, hereinafter referred to as LICENSOR, and SunEdison Origination1, LLC, hereinafter referred to as LICENSEE. WHEREAS, the LICENSOR owns certain buildings located at the National Renewable Energy Laboratory (NREL) and in particular, [____________________] the address of which

411

Photovoltaics at DOE's National Renewable Energy Laboratory License  

NLE Websites -- All DOE Office Websites (Extended Search)

ROOF-TOP LICENSE AGREEMENT KEY TERMS ROOF-TOP LICENSE AGREEMENT KEY TERMS (Non-Recordable) FOR INSTALLATION AND OPERATION OF A SOLAR ROOF-TOP ELECTRIC GENERATING SYSTEM AT THE NATIONAL RENEWABLE ENERGY LABORATORY, RESEARCH SUPPORT FACILITY United States of America Department of Energy Office of Energy Efficiency and Renewable Energy Golden Field Office THIS LICENSE AGREEMENT (License) is made as of the _____ day of August, 2009, by the UNITED STATES OF AMERICA, Department of Energy, Office of Energy Efficiency and Renewable Energy, Golden Field Office, hereinafter referred to as LICENSOR, and SunEdison Origination1, LLC, hereinafter referred to as LICENSEE. WHEREAS, the LICENSOR owns certain buildings located at the National Renewable Energy Laboratory (NREL) and in particular, [____________________] the address of which

412

ECOdriving - Widespread Implementation for Learner Drivers and Licensed  

Open Energy Info (EERE)

ECOdriving - Widespread Implementation for Learner Drivers and Licensed ECOdriving - Widespread Implementation for Learner Drivers and Licensed Drivers (ECOWILL) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: ECOdriving - Widespread Implementation for Learner Drivers and Licensed Drivers (ECOWILL) Agency/Company /Organization: Austrian Energy Agency Focus Area: Fuels & Efficiency Topics: Best Practices Website: www.ecodrive.org/ The ECOWILL project aims to reduce carbon emissions by up to 8 Mt until 2015 by boosting the application of eco-driving across Europe. The project will roll out training programs for licensed drivers in 13 European countries. ECOWILL also promotes the education of eco-driving for learner drivers. This website provides information about eco-driving, including country-specific activities.

413

NATIONAL ENERGY TECHNOLOGY LABORATORY (NETL) LICENSE ON FEDERALLY ...  

The facts set forth in this request for license are within the knowledge of the requestor and are submitted with the intention that the Director of the NETL rely on ...

414

Licensing arrangements and the development of the solar energy industry  

SciTech Connect

The process by which technology and information related to technology are transferred within industry is explored. Property rights in technology are part of the broader field of intellectual property. The general contours of legal protection for knowledge are explored. The four basic forms of intellectual property - patents, trade secrets (or know-how), trademarks, and copyrights - are covered in varying degrees of depth, depending on their relative applicability to the development of the solar industry. Once this background has been established, the legal aspects of licensing are examined. A license is a legal arrangement whereby a party (licensor) who controls the right to use an idea, invention, etc. shares the right to use the particular intellectual property with someone else (licensee). The advantages and disadvantages of licensing are described from the point of view of potential licensees and licensors. Barriers to licensing are discussed.

Green, M.

1979-06-01T23:59:59.000Z

415

Argonne Software Licensing: SAS4A/SASSYS-1  

BatPro software licensing ... SAS4A/SASSYS-1. The SAS4A/SASSYS-1 safety analysis code system is a simulation tool to perform deterministic transient safety analysis ...

416

Y-12 cleaning technology licensed by local engineering firm ...  

NLE Websites -- All DOE Office Websites (Extended Search)

cleaning technology ... Y-12 cleaning technology licensed by local engineering firm Posted: October 31, 2012 - 10:00am MK Technologies CEO and founder Mike Carroll and director of...

417

Idaho National Engineering and Environmental Laboratory Licensing Qualification Issues  

E-Print Network (OSTI)

Idaho National Engineering and Environmental Laboratory Licensing Qualification Issues Subcommittee Meeting Oct. 28, 2002 Livermore, CA #12;Idaho National Engineering and Environmental Laboratory · Approach to Regulatory Approval · Nuclear Design Codes · Summary #12;Idaho National Engineering

418

DOCKET NO. 40-9027 LICENSE NO. LICENSEE: SUBJECT:  

E-Print Network (OSTI)

License SMC-1562, covering storage of radioactive materials at both its Revere and Reading sites in Pennsylvania. Former ore processing at the Revere facility generated waste slag contaminated with uranium and thorium. In 1988, Cabot began onsite decommissioning

unknown authors

2001-01-01T23:59:59.000Z

419

ORNL, Da Vinci Sign Licensing Agreement | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Da Vinci Sign Licensing Agreement April 12, 2012 Seated are (l to r) ORNL Partnerships Director Tom Ballard and Da Vinci CEO Kent Froelund. Standing are (l to r) Johney Green, ORNL...

420

Software Development and Licensing at the Berkeley Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

explain software licensing and distribution options available for LBNL software and how Tech Transfer can help get the job done. If you are a software developer, or you supervise...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

For The Calvert Cliffs Combined License Application  

E-Print Network (OSTI)

The purpose of this letter is to respond to the requests for additional information (RAIs) identified in the NRC letter to UniStar dated February 3, 2009 (Reference 1). The RAIs address figures needed to publish the environmental impact statement (EIS) and information necessary for completion of regulatory reviews. UniStar Regulatory Affairs staff, UniStar vendors for the Calvert Cliffs Nuclear Power Plant Unit 3 (CCNPP3) project, NRC headquarters staff, and NRC contractors supporting review of the CCNPP3 Combined License Application (COLA) environmental report discussed the scope of the RAIs (Reference 1) during four telephone conferences on February 13, 18, 19, and 24. The discussions focused on how UniStar can provide the NRC with graphics needed to develop the CCNPP3 Draft EIS and necessary additional details of environmental reviews performed by UniStar. The telephone conferences resulted in a common understanding of the NRC requests and how UniStar can provide the needed information (Reference 2).UN#09-1140 Page 2 of 2 The NRC staff agreed that certain information regarding alternate sites is available in the

unknown authors

2009-01-01T23:59:59.000Z

422

BIOLOGICAL ASSESSMENT FOR BALD EAGLES FOR LICENSE RENEWAL  

E-Print Network (OSTI)

The Nuclear Regulatory Commission (NRC) is evaluating an application submitted by Virginia Electric and Power Company (VEPCo) for the renewal of the operating licenses for an additional 20 years for its Surry Power Station (SPS), Units 1 and 2. The SPS is located on the Gravel Neck Peninsula in Surry County, Virginia. The current license for Unit 1 will expire on May 25, 2012, and for Unit 2 on January 29, 2013. License renewal will extend the operating license for each unit an additional 20 years past the above dates. The proposed action would include the continued operation and maintenance of the existing facilities at the SPS site and the transmission corridor that connects the SPS, Units 1 and 2, to the regional electrical grid. The proposed action will not include any new construction or onsite disturbance. The NRC is preparing a supplement to its 1996?Generic Environmental Impact Statement for License Renewal of Nuclear Plants ” (NUREG-1437) for this proposed license renewal. As part of the renewal review, we evaluate potential impacts to Federally listed, proposed, or candidate species, as well as designated or proposed critical habitat. In a letter to the Virginia Field Office of the U.S. Fish and Wildlife Service (FWS) dated January 24, 2002, the NRC staff requested a list of Federally protected species and any critical

John P. Wolflin; U. S. Fish; Wildlife Service

2002-01-01T23:59:59.000Z

423

REVIEWS FOR IN SITU LEACH URANIUM EXTRACTION LICENSE APPLICATIONS  

E-Print Network (OSTI)

Review Plan (NUREG–1569) which provides guidance for staff reviews of applications to develop and operate uranium in situ leach facilities. Under the provisions of Title 10 of the Code of Federal Regulations, Part 40 (10 CFR Part 40), Domestic Licensing of Source Material, an NRC Materials License is required to conduct uranium recovery by in situ leach extraction techniques. Applicants for a new license and operators seeking an amendment or renewal of an existing license are required to provided detailed information on the facilities, equipment, and procedures used in the proposed activities. In addition, the applicant for a new license also provides an Environmental Report that discusses the effects of proposed operations on the health and safety of the public and assesses impacts to the environment. For amendment or renewal of an existing license, the original Environmental Report is supplemented, as necessary. This information is used by the NRC staff to determine whether the proposed activities will be protective of public health and safety and the environment and to fulfill NRC responsibilities under the National Environmental Policy Act (NEPA). The purpose of the Standard Review Plan (NUREG–1569) is to provide the NRC staff with guidance on performing reviews of information provided by the applicant, and to ensure a consistent quality and

In Situ; Leach Uranium; In Situ; Leach Uranium; J. Lusher

2003-01-01T23:59:59.000Z

424

Summary of Utility License Termination Documents and Lessons Learned: Summary of License Termination Plan Submittals by Three Nuclear Power Plants  

Science Conference Proceedings (OSTI)

The U.S. Nuclear Regulatory Commission's (NRC's) 1996 revised decommissioning regulations specify that the operator of a nuclear plant must submit a "License Termination Plan" (LTP) two years prior to termination of the plant license. The LTP explicitly defines the elements that the plant operator must address in the decommissioning plan. This report focuses on the approaches and experience gained by three of the leading plants in the preparation and submittal of their LTP submittals under the 1996 regul...

2002-10-28T23:59:59.000Z

425

Department of Energy Files Motion to Withdraw Yucca Mountain License  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Files Motion to Withdraw Yucca Mountain Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 - 12:00am Addthis WASHINGTON, D.C. - The U.S. Department of Energy today filed a motion with the Nuclear Regulatory Commission to withdraw the license application for a high-level nuclear waste repository at Yucca Mountain with prejudice. "President Obama is fully committed to ensuring that the Nation meets our long-term storage obligations for nuclear waste," said Department of Energy General Counsel Scott Blake Harris. "In light of the decision not to proceed with the Yucca Mountain nuclear waste repository, the President directed Secretary Chu to establish the Blue Ribbon Commission on America's

426

Air Permits, Licenses, Certifications (Maine) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Maine Program Type Siting and Permitting Provider Department of Environmental Protection This program regulates and limits air emissions from a variety of sources within Maine through a statewide permitting program. Separate regulations exist for limiting emissions of nitrogen oxides (NOx), sulfur dioxide

427

NETL: News Release - Successful Clean Coal Technology Licensed for  

NLE Websites -- All DOE Office Websites (Extended Search)

6, 2010 6, 2010 Successful Clean Coal Technology Licensed for Commercial Application DOE Receives First Repayment for Liquid Phase Methanol Process Development Washington, DC - The U.S. Department of Energy (DOE) has received the first installment from a repayment agreement for the Liquid Phase Methanol (LPMEOH(tm)) Process. A royalty license issued for the advanced methanol production system underscores the clean coal technology's presence in the commercial market. The DOE-funded LPMEOH Process, developed in collaboration with Air Products and Chemicals Inc., has been licensed to Woodland Biofuel Inc., who intends to use the technology to develop a wood-gasification process to produce methanol from wood-scrap. The first facility is planned in New York State.

428

Argonne licenses diamond semiconductor discoveries to AKHAN Technologies |  

NLE Websites -- All DOE Office Websites (Extended Search)

licenses diamond semiconductor discoveries to AKHAN Technologies licenses diamond semiconductor discoveries to AKHAN Technologies By Joseph Bernstein * By Jared Sagoff * March 4, 2013 Tweet EmailPrint LEMONT, Ill. - The U.S. Department of Energy's Argonne National Laboratory announced today that the laboratory has granted AKHAN Technologies exclusive diamond semiconductor application licensing rights to breakthrough low-temperature diamond deposition technology developed by Argonne's Center for Nanoscale Materials (CNM). The Argonne-developed technology allows for the deposition of nanocrystalline diamond on a variety of wafer substrate materials at temperatures as low as 400 degrees Celsius. The combination of the Argonne's low-temperature diamond technology with AKHAN's Miraj Diamond(tm) process represents the state of the art in diamond semiconductor

429

Electrical Energy Producer's License Tax (Montana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Producer's License Tax (Montana) Energy Producer&#039;s License Tax (Montana) Electrical Energy Producer's License Tax (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Institutional Multi-Family Residential Systems Integrator Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Fees Provider Montana Department of Revenue Each person or other organization engaged in the generation, manufacture, or production of electricity and electrical energy in the state of Montana,

430

Property:FERC License Docket Number | Open Energy Information  

Open Energy Info (EERE)

License Docket Number License Docket Number Jump to: navigation, search This is a property of type string. Pages using the property "FERC License Docket Number" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/Admirality Inlet Tidal Energy Project + P-12690 + MHK Projects/Algiers Light Project + P-12848 + MHK Projects/Anconia Point Project + P-12928 + MHK Projects/Astoria Tidal Energy + P-12665 + MHK Projects/Avalon Tidal + P-14228 + MHK Projects/Avondale Bend Project + P-12866 + MHK Projects/BW2 Tidal + P-14222 + MHK Projects/Bar Field Bend + P-12942 + MHK Projects/Barfield Point + P-13489 + MHK Projects/Bayou Latenache + P-13542 + MHK Projects/Belair Project + P-13125 + MHK Projects/Bondurant Chute + P-13477 + MHK Projects/Breeze Point + P-13480 +

431

Licensed reactor nuclear safety criteria applicable to DOE reactors  

SciTech Connect

This document is a compilation and source list of nuclear safety criteria that the Nuclear Regulatory Commission (NRC) applies to licensed reactors; it can be used by DOE and DOE contractors to identify NRC criteria to be evaluated for application to the DOE reactors under their cognizance. The criteria listed are those that are applied to the areas of nuclear safety addressed in the safety analysis report of a licensed reactor. They are derived from federal regulations, USNRC regulatory guides, Standard Review Plan (SRP) branch technical positions and appendices, and industry codes and standards.

Not Available

1993-11-01T23:59:59.000Z

432

The use for frequency-consequence curves in future reactor licensing  

E-Print Network (OSTI)

The licensing of nuclear power plants has focused until now on Light Water Reactors and has not incorporated systematically insights and benefits from Probabilistic Risk Assessment (PRA). With the goal of making the licensing ...

Debesse, Laurène

2007-01-01T23:59:59.000Z

433

Licensing sentence-internal readings in english: an experimental study  

Science Conference Proceedings (OSTI)

Adjectives of comparison (AOCs) like same, different and similar can compare two elements sentence-internally, i.e., without referring to any previously introduced element. This reading is licensed only if a semantically plural NP ... Keywords: Bayesian statistics, acceptability judgments, adjectives of comparison, distributivity, pluralities

Adrian Brasoveanu; Jakub Dotla?il

2011-12-01T23:59:59.000Z

434

Radiation Protection and Licensing FNAL Radiation Physics Team  

E-Print Network (OSTI)

/replace philosophy 8. Remote Handling capabilities 9. Alignment and Stability 10. Radioactive off-gas (especially shielded repair cells · Need remote handling capability · Problems during lifting and moving are difficult. January 13, 2012 Radiation Protection and Licensing #12;11 Repair Cell and Remote Handling capabilities

McDonald, Kirk

435

Revised Industry Steam Generator Program Generic License Change Package  

E-Print Network (OSTI)

License Change Package for NRC review and endorsement. Industry events during the subsequent months have delayed the NRC review and presented an opportunity for the industry to improve the submittal. A summary of the major changes from the February submittal is provided in Enclosure 1. The resulting package (Enclosures 2 through 8), which supercedes the earlier version in its entirety, is enclosed for your endorsement. Although the events of the last ten months have resulted in some changes to the industry steam generator program guidance, the fundamental principles remain sound. Equally as important, the program has demonstrated its resiliency. The steam generator program guidance is designed to accommodate new knowledge and experience, and that is precisely what is occurring. The enclosed Generic License Change Package includes changes that reflect recent experience. In addition, the appropriate underlying technical documents are currently being revised or supplemental guidance is being developed as necessary to reflect new information. The industry and the NRC worked diligently to address the technical and licensing issues that ultimately resulted in the February 2000 version of the Steam Generator Program Generic License Change Package. Although these documents have been revised since the previous submittal, the differences do not represent a change in our position on the issues.

David J. Modeen; Mr. Samuel; J. Collins; U. S. Nuclear; Regulatory Commission; Xuo Mr; Samuel J. Collins

2000-01-01T23:59:59.000Z

436

Sensor network based vehicle classification and license plate identification system  

Science Conference Proceedings (OSTI)

Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, ... Keywords: acoustic vehicle classification, license plate detection, seismic, wireless sensor networks

Jan Frigo; Vinod Kulathumani; Sean Brennan; Ed Rosten; Eric Raby

2009-06-01T23:59:59.000Z

437

Interim On-Site Storage of Low Level Waste: Volume 1: Licensing and Regulatory Issues  

Science Conference Proceedings (OSTI)

This report is an all-inclusive resource guide for evaluating a utility's on-site storage licensing requirements. Specifically, the report offers an extensive review of licensing and regulatory documents related to on-site storage of low level waste as well as a methodology for evaluating on-site storage licensing issues.

1992-06-01T23:59:59.000Z

438

Objectives, characteristics and outcomes of university licensing: A survey of major U.S. universities  

E-Print Network (OSTI)

Abstract This paper describes results of our survey of licensing at 62 research universities. We consider ownership, income splits, stage of development, marketing, license policies and characteristics, goals of licensing and the role of the inventor in licensing. Based on these results we analyze the relationship between licensing outcomes and both the objectives of the TTO and the characteristics of the technologies. Patent applications grow one-to-one with disclosures, while sponsored research grows similarly with licenses executed. Royalties are typically larger the higher the quality of the faculty and the higher the fraction of licenses that are executed at latter stages of development. Sponsored research is more likely to be included in a license if the new technology is at an early stage of development or if the TTO evaluates it as important. We find that additional disclosures generate smaller percentage increases in licenses, and those increases in licenses generate smaller percentage increases in royalties. University licensing has increased dramatically since the passage of the Bayh-Dole Act in 1980, which gave universities the right to retain title to and license inventions resulting from federallysponsored

Jerry G. Thursby; Richard Jensen; Marie C. Thursby

2001-01-01T23:59:59.000Z

439

Real-time automatic license plate recognition for CCTV forensic applications  

Science Conference Proceedings (OSTI)

We propose an efficient real-time automatic license plate recognition (ALPR) framework, particularly designed to work on CCTV video footage obtained from cameras that are not dedicated to the use in ALPR. At present, in license plate detection, tracking ... Keywords: CCTV video footage, License plate recognition, Surveillance, Traffic monitoring, Video indexing

M. S. Sarfraz, A. Shahzad, Muhammad A. Elahi, M. Fraz, I. Zafar, E. A. Edirisinghe

2013-09-01T23:59:59.000Z

440

Guidelines for preparing and reviewing applications for the licensing of non-power reactors: Standard review plan and acceptance criteria. NUREG - 1537, Part 2  

SciTech Connect

NUREG - 1537, Part 2 gives guidance on the conduct of licensing action reviews to NRC staff who review non-power reactor licensing applications. These licensing actions include construction permits and initial operating licenses, license renewals, amendments, conversions from highly enriched uranium to low-enriched uranium, decommissioning, and license termination.

1996-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Office of Legacy Management  

Office of Legacy Management (LM)

Energy Energy Office of Legacy Management JUL 1 0 2008 Alonso Ramirez, Scientific Director EI Verde Research Station Institute for Tropical Ecosystem Studies University of Puerto Rico P.o. Box 21910 San Juan, PR 00931 .Subject: Regulatory Status of Study Area 4 Dear Dr. Ramirez: I want to thank you and your staff, especially John Bithom for taking time to escort us to Study Area 4 several weeks ago. While planning the visit to the EI Verde Research Station, we mentioned that the radioactive materials license for the tree in Study Area 4 was terminated. Termination was based on radiological conditions meeting criteria for protectiveness. At that time, we sent by email the application to amend the University of Puerto Rico radioactive materials license, which we

442

Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed  

NLE Websites -- All DOE Office Websites (Extended Search)

4: June 8, 2009 4: June 8, 2009 Vehicles per Licensed Driver Rising to someone by E-mail Share Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Facebook Tweet about Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Twitter Bookmark Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Google Bookmark Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Delicious Rank Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Digg Find More places to share Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on AddThis.com... Fact #574: June 8, 2009

443

Regulators Experiences in Licensing and Inspection of Dry Cask Storage Facilities  

SciTech Connect

The United States Nuclear Regulatory Commission (NRC), through the combination of a rigorous licensing and inspection program, ensures the safety and security of dry cask storage. NRC authorizes the storage of spent fuel at an independent spent fuel storage installation (ISFSI) under two licensing options: site-specific licensing and general licensing. In July 1986, the NRC issued the first site-specific license to the Surry Nuclear Power Plant in Virginia authorizing the interim storage of spent fuel in a dry storage cask configuration. Today, there are over 30 ISFSIs currently licensed by the NRC with over 700 loaded dry casks. Current projections identify over 50 ISFSIs by the year 2010. No releases of spent fuel dry storage cask contents or other significant safety problems from the storage systems in use today have been reported. This paper discusses the NRC licensing and inspection experiences. (authors)

Baggett, S.; Brach, E.W. [Spent Fuel Project Office, U.S. Nuclear Regulatory Commission, Washington, DC 20555 (United States)

2006-07-01T23:59:59.000Z

444

Non-Class 1 Mechanical Implementation Guideline and Mechanical Tools: B&W Owners Group Generic License Renewal Program, BAW-2270, Re vision 2, 1999  

Science Conference Proceedings (OSTI)

As part of the application process for license renewal, nuclear utilities must perform an evaluation to confirm that they have appropriately considered any aging effects on plant components. A management plan must be developed for all components subject to aging effects. This report presents a set of mechanical tools for utility use in determining which aging effects are applicable to Non-Class 1 mechanical components.

2000-04-06T23:59:59.000Z

445

Key Issues for the Safety and Licensing of Fusion  

SciTech Connect

Studies of the safety and environmental impacts of fusion, both of future power plants and of ITER, have shown that a good performance can be achieved. Although it is difficult to anticipate the regulatory regime in which future fusion power stations will be licensed, the areas of public and occupational safety and short and long-term environmental impact are likely to remain important. In each of these areas, the outcome of various studies have been reviewed, leading to a list of issues which should be given attention to facilitate eventual licensing of a fusion power plant. Many of these relate to reducing conservatisms and uncertainties in the analyses, but also included are improved understanding of tritium retention and of dust generation, and development of materials to provide long component lifetimes. A full appraisal is also recommended of the viability of recycling of active materials after end of plant life.

Taylor, Neill P. [Culham Science Centre (United Kingdom)

2005-05-15T23:59:59.000Z

446

Completion of decommissioning: Monitoring for site release and license termination  

SciTech Connect

To request termination of a license upon completion of dismantling or decommissioning activities, documenting any residual radioactivity to show that the levels are environmentally acceptable will be necessary. When the regulators approve the decommissioning plan, they establish what the release criteria for the decommissioned site will be at the time of the site release and license termination. The criteria are numeric guidelines for direct radiation in soils and on surfaces. If the regulatory body finds that the measured on-site values are below the guidelines, the site will be acceptable for unrestricted release (no radiological controls or future use). If areas are found above those values, more decontamination or cleanup of these areas may be required unless the regulatory body grants an exemption.

Boing, L.E.

1997-08-01T23:59:59.000Z

447

Investing in the Energy Future: An Industry Guide to Licensing Technologies at the National Renewable Energy Laboratory (NREL) (Brochure)  

Science Conference Proceedings (OSTI)

Provides an overview of NREL's licensing opportunities and processes, and commercialization programs.

Not Available

2010-09-01T23:59:59.000Z

448

Greece licensing round to focus on western sedimentary basins  

SciTech Connect

New opportunities for international oil companies to explore for hydrocarbons in Greece will emerge shortly. Parliament ratified a new petroleum law in January 1995, and DEP-EKY SA will undertake an international licensing round for offshore-onshore areas mainly in western Greece during second half 1995. The paper describes the fold and thrust belt of western Greece; the Katakolon oil field; the tertiary basins of eastern Greece; the Prinos and Prinos North oil fields; and the Epanomi gas field.

Roussos, N.; Marnelis, F. (Public Petroleum Corp. of Greece, Athens (Greece))

1995-03-06T23:59:59.000Z

449

Licensed reactor nuclear safety criteria applicable to DOE reactors  

SciTech Connect

The Department of Energy (DOE) Order DOE 5480.6, Safety of Department of Energy-Owned Nuclear Reactors, establishes reactor safety requirements to assure that reactors are sited, designed, constructed, modified, operated, maintained, and decommissioned in a manner that adequately protects health and safety and is in accordance with uniform standards, guides, and codes which are consistent with those applied to comparable licensed reactors. This document identifies nuclear safety criteria applied to NRC (Nuclear Regulatory Commission) licensed reactors. The titles of the chapters and sections of USNRC Regulatory Guide 1.70, Standard Format and Content of Safety Analysis Reports for Nuclear Power Plants, Rev. 3, are used as the format for compiling the NRC criteria applied to the various areas of nuclear safety addressed in a safety analysis report for a nuclear reactor. In each section the criteria are compiled in four groups: (1) Code of Federal Regulations, (2) US NRC Regulatory Guides, SRP Branch Technical Positions and Appendices, (3) Codes and Standards, and (4) Supplemental Information. The degree of application of these criteria to a DOE-owned reactor, consistent with their application to comparable licensed reactors, must be determined by the DOE and DOE contractor.

Not Available

1991-04-01T23:59:59.000Z

450

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

451

Aging Management Guidelines for Commercial Nuclear Power Plants -- Electrical and Mechanical Penetrations  

Science Conference Proceedings (OSTI)

As part of the application process for license renewal, nuclear utilities must perform an evaluation to confirm that they have appropriately considered aging effects on plant components within the scope of the License Renewal Rule. This report provides guidelines for managing relevant degradation mechanisms applicable to electrical and mechanical penetrations in nuclear power plants. Use of these guidelines will provide utilities with a basis for verifying that effective methods for managing age-related ...

2002-04-25T23:59:59.000Z

452

Albert R Meyer February 13, 2012 This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License.  

E-Print Network (OSTI)

2/11/12 1 Lec 2M.1 Albert R Meyer February 13, 2012 This work is licensed under a Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License. Mathematics for Computer Science MIT 6.042J/18.062J The Well Ordering Principle, III Lec 2M.2 Albert R Meyer February 13, 2012 Geometric sums

453

Nuclear power. Volume 2: nuclear power project management  

Science Conference Proceedings (OSTI)

The following topics are discussed: review of nuclear power plants; licensing procedures; safety analysis; project professional services; quality assurance and project organization; construction, scheduling and operation; construction, scheduling and operation; nuclear fuel handling and fuel management; and plant cost management. 116 references, 115 figures, 33 tables.

Not Available

1980-01-01T23:59:59.000Z

454

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant August 15, 2008 - 3:15pm Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) today delivered to Congress the Next Generation Nuclear Plant (NGNP) Licensing Strategy Report which describes the licensing approach, the analytical tools, the research and development activities and the estimated resources required to license an advanced reactor design by 2017 and begin operation by 2021. The NGNP represents a new concept for nuclear energy utilization, in which a gas-cooled reactor provides process heat for any number of industrial applications including electricity production, hydrogen production, coal-to-liquids, shale oil

455

GRR/Section 12-HI-a - Habitat Conservation Plan and Incidental Take License  

Open Energy Info (EERE)

2-HI-a - Habitat Conservation Plan and Incidental Take License 2-HI-a - Habitat Conservation Plan and Incidental Take License < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 12-HI-a - Habitat Conservation Plan and Incidental Take License 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf Click to View Fullscreen Contact Agencies Hawaii Department of Land and Natural Resources Division of Forestry and Wildlife Regulations & Policies Hawaii Revised Statutes 195D-21 Triggers None specified Click "Edit With Form" above to add content 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range.

456

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant August 15, 2008 - 3:15pm Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) today delivered to Congress the Next Generation Nuclear Plant (NGNP) Licensing Strategy Report which describes the licensing approach, the analytical tools, the research and development activities and the estimated resources required to license an advanced reactor design by 2017 and begin operation by 2021. The NGNP represents a new concept for nuclear energy utilization, in which a gas-cooled reactor provides process heat for any number of industrial applications including electricity production, hydrogen production, coal-to-liquids, shale oil

457

The debate over re-licensing the Vermont Yankee nuclear power plant  

Science Conference Proceedings (OSTI)

In 2009, the NRC's Atomic Safety and Licensing Board approved a 20-year license extension for the Vermont Yankee Nuclear Power plant. Less than seven months later, the Vermont State Senate voted 26-4 to block the required certificate for public good. How did a plant seen as likely to be re-licensed become the first in 20 years to be rejected in a public vote? (author)

Watts, Richard; Hines, Paul; Dowds, Jonathan

2010-05-15T23:59:59.000Z

458

Proceedings: 2004 EPRI Topical Workshop - License Termination Plans/Final Site Release  

Science Conference Proceedings (OSTI)

One of the final challenges in plant decommissioning is that of license termination and final site release. The EPRI Decommissioning - License Termination and Final Site Release Workshop was the tenth in a series designed to aid utility personnel in decommissioning nuclear power plants. This workshop focused on specific aspects of license termination activities and final site release as they relate to decommissioning. The information presented will update utilities on developments and experience related ...

2005-09-16T23:59:59.000Z

459

Atomic Safety and Licensing Board Panel annual report, Fiscal year 1992  

SciTech Connect

In Fiscal Year 1992, the Atomic Safety and Licensing Board Panel (``the Panel``) handled 38 proceedings. The cases addressed issues in the construction, operation, and maintenance of commercial nuclear power reactors and other activities requiring a license from the Nuclear Regulatory Commission. This reports sets out the Panel`s caseload during the year and summarizes, highlights, and analyzes how the wide-ranging issues raised in those proceedings were addressed by the Panel`s judges and licensing boards.

Not Available

1993-09-01T23:59:59.000Z

460

Aging management guideline for commercial nuclear power plants - tanks and pools  

Science Conference Proceedings (OSTI)

Continued operation of nuclear power plants for periods that extend beyond their original 40-year license period is a desirable option for many U.S. utilities. U.S. Nuclear Regulatory Commission (NRC) approval of operating license renewals is necessary before continued operation becomes a reality. Effective aging management for plant components is important to reliability and safety, regardless of current plant age or extended life expectations. However, the NRC requires that aging evaluations be performed and the effectiveness of aging management programs be demonstrated for components considered within the scope of license renewal before granting approval for operation beyond 40 years. Both the NRC and the utility want assurance that plant components will be highly reliable during both the current license term and throughout the extended operating period. In addition, effective aging management must be demonstrated to support Maintenance Rule (10 CFR 50.65) activities.

Blocker, E.; Smith, S.; Philpot, L.; Conley, J.

1996-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

RADIOLOGICAL CRITERIA FOR LICENSE TERMINATION OF URANIUM RECOVERY FACILITIES  

E-Print Network (OSTI)

radiological criteria for building surfaces and radionuclides other than radium in soil, for termination of uranium recovery licenses. SUMMARY: In a Staff Requirements Memorandum (SRM) on SECY-98-084, dated August 11, 1998 (Attachment 1), the Commission indicated that it did not object to the staff's recommendation to use the radium benchmark dose in developing a final rule applicable to uranium recovery licensees. The final rule addresses radiological criteria for decommissioning land and buildings required for license termination for uranium recovery facilities, e.g., uranium mills and in situ leach facilities (ISLs). The final rule will provide a clear and consistent regulatory basis for determining the extent to which lands and structures can be considered to be decommissioned. BACKGROUND: On August 22, 1994 (59 FR 43200), the U.S. Nuclear Regulatory Commission (NRC) published a proposed rule for comment in the Federal Register, to amend 10 CFR Part 20, "Standards for Protection Against Radiation, " to include radiological criteria for decommissioning as subpart E. The proposed rule applied to uranium mill facilities and other NRC licensees, but did not apply to mill tailings disposal or to soil radium cleanup at mills because the radiological criteria for these activities are regulated under 10 CFR Part 40, Appendix A. Some commenters recommended that the rule exempt conventional thorium and uranium mill facilities and ISLs. In SECY-97-046A, dated March 28, 1997, entitled "Final Rule on Radiological Criteria for License Termination, " the staff recommended that the final rule indicate that for uranium and thorium mill facilities the cleanup of radionuclides other than radium from soil and buildings must result in a dose no greater than the dose resulting from the cleanup of radium-contaminated soil (benchmark

William D. Travers /s

1999-01-01T23:59:59.000Z

462

TransForum v8n2 - DeNOX Catalyst License  

NLE Websites -- All DOE Office Websites (Extended Search)

Integrated Fuel Technologies Gets Worldwide License for Argonne-developed Diesel DeNOX Catalyst Argonne chemist Chris Marshall (front) displays a container of the catalyst while...

463

LA-UR-08-0123a Licensable Explosives Ordnance Disposal Using ...  

An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA www.lanl.gov/partnerships/license/technologies/ Summary:

464

LALP-08-045 Licensable Lead-Free Super-Thermite Electric Matches  

Licensable Technologies Lead-Free Super-Thermite Electric Matches An Equal Opportunity Employer / Operated by Los Alamos National Security LLC for DOE/NNSA

465

SAS4A/SASSYS-1 Educational/Nonprofit Software License Agreement  

1 SAS4A/SASSYS-1 EDUCATIONAL/NON-PROFIT SOFTWARE LICENSE AGREEMENT. This Agreement, is made between the UChicago Argonne, LLC asoperator of Argonne ...

466

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

467

Safety and licensing for small and medium power reactors  

SciTech Connect

Proposed new concepts for small and medium power reactors differ substantially from traditional Light Water Reactors (LWRs). Although designers have a large base of experience in safety and licensing, much of it is not relevant to new concepts. It can be a disadvantage if regulators apply LWR rules directly. A fresh start is appropriate. The extensive interactions between industry, regulators, and the public complicates but may enhance safety. It is basic to recognize the features that distinguish nuclear energy safety from that for other industries. These features include: nuclear reactivity, fission product radiation, and radioactive decay heat. Small and medium power reactors offer potential advantages over LWRs, particularly for reactivity and decay heat.

Trauger, D.B.

1987-01-01T23:59:59.000Z

468

NRC Consent to Indirect License Transfer/Threshold Determination- Merger  

E-Print Network (OSTI)

Company ("CY"), and Yankee Atomic Electric Company ("YR") (each a "Yankee Company," and together, "the Yankee Companies"), hereby respond to the Nuclear Regulatory Commission ("NRC") Third Request for Additional Information for Application for NRC Consent to Indirect License Transfer/Threshold Determination (TAC Nos. L24496, L24497, and L24498) ("RAI 3") received by the Yankee Companies on August 5, 2011. If you have questions or require additional information, please contact me or Joe Fay at (207) 350-0300. Sincerely, Wayne Norton

The Yankee Companies

2011-01-01T23:59:59.000Z

469

Guidelines for preparing and reviewing applications for the licensing of non-power reactors: Format and Content. NUREG-1537, Part 1  

Science Conference Proceedings (OSTI)

NUREG - 1537, Part 1 gives guidance to non-power reactor licensees and applicants on the format and content of applications to the Nuclear Regulatory Commission for licensing actions. These licensing actions include construction permits and initial operating licenses, license renewals, amendments, conversions from highly enriched uranium to low-enriched uranium, decommissioning, and license termination.

NONE

1996-02-01T23:59:59.000Z

470

Web-Based Training on Reviewing Dose Modeling Aspects of NRC Decommissioning and License Termination Plans  

SciTech Connect

NRC licensees at decommissioning nuclear facilities submit License Termination Plans (LTP) or Decommissioning Plans (DP) to NRC for review and approval. To facilitate a uniform and consistent review of these plans, the NRC developed training for its staff. A live classroom course was first developed in 2005, which targeted specific aspects of the LTP and DP review process related to dose-based compliance demonstrations or modeling. A web-based training (WBT) course was developed in 2006 and 2007 to replace the classroom-based course. The advantage of the WBT is that it will allow for staff training or refreshers at any time, while the advantage of a classroom-based course is that it provides a forum for lively discussion and the sharing of experience of classroom participants. The objective of this course is to train NRC headquarters and regional office staff on how to review sections of a licensee's DP or LTP that pertain to dose modeling. The DP generally refers to the decommissioning of non-reactor facilities, while the LTP refers specifically to the decommissioning of reactors. This review is part of the NRC's licensing process, in which the NRC determines if a licensee has provided a suitable technical basis to support derived concentration guideline levels (DCGLs)1 or dose modeling analyses performed to demonstrate compliance with dose-based license termination rule criteria. This type of training is one component of an organizational management system. These systems 'use a range of practices to identify, create, represent, and distribute knowledge for reuse, awareness and learning'. This is especially important in an organization undergoing rapid change or staff turnover to retain organizational information and processes. NRC is committed to maintaining a dynamic program of training, development, and knowledge transfer to ensure that the NRC acquires and maintains the competencies needed to accomplish its mission. This paper discusses one specific project related to training, developing, and transferring knowledge to NRC staff on how to review dose-modeling portions of licensee-submitted DPs and LTPs. This project identified specific cases and examples, created easily updateable educational modules, represented material in an engaging format through animations, video, and graphics, and distributed information on how to perform these reviews in an accessible, web-based format. WBT promotes consistency in reviews and has the advantage of being able to be used as a resource to staff at any time. The WBT will provide reviewers with knowledge needed to perform risk-informed analyses (e.g., information related to development of realistic scenarios and use of probabilistic analysis). WBT on review of LTP or DP dose modeling will promote staff development, efficiency, and effectiveness in performing risk-informed, performance-based reviews of decommissioning activities at NRC-licensed facilities. One of the key advantages of this type of web-based training is that it can be loaded on-demand and can be reused indefinitely. In addition to the benefits of on-demand training, the modules can also be used for reference. The presentations are hosted on a web server that can be accessed by registered users at any time. Staff can return to a particular module to review the material long after they have completed the course.

LePoire, D.; Cheng, J.J.; Kamboj, S.; Arnish, J.; Richmond, P.; Chen, S.Y. [Argonne National Laboratory, 9700 S. Cass Ave., Argonne, IL 60439 (United States); Barr, C.; McKenney, C. [U.S. Nuclear Regulatory Commission, 11555 Rockville Pike, Rockville, MD 20852 (United States)

2008-01-15T23:59:59.000Z

471

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Traffic Management Services Plum Island Constructed 1827 Traffic Management Services Plum Island Constructed 1827 Shipping and Receiving Supervisor: M. White Phone: 631-344-2300 Email: mwhite@bnl.gov Traffic Management Services include the following: Transportation Services. Provide guidance on methods of shipment, carrier availability, and discount programs for moving freight for the account of the U. S. Government. Employee Relocation Program. Coordinate the movement of household goods for BNL employees. Receipt and Inspection of goods. Provide the services necessary to ensure that goods are received, inspected, and delivered on time. Ensure that damages are noted at time of delivery and establish claims as necessary. Import/Export Services. Provide guidance on the requirements for shipments made by the Laboratory to destinations outside the continental United States. Obtain Export Licenses as needed.

472

Gas reactor international cooperative program interim report: United States/Federal Republic of Germany nuclear licensing comparison  

SciTech Connect

In order to compare US and FRG Nuclear Licensing, a summary description of United States Nuclear Licensing is provided as a basis. This is followed by detailed information on the participants in the Nuclear Licensing process in the Federal Republic of Germany (FRG). FRG licensing procedures are described and the rules and regulations imposed are summarized. The status of gas reactor licensing in both the U.S. and the FRG is outlined and overall conclusions are drawn as to the major licensing differences. An appendix describes the most important technical differences between US and FRG criteria.

1978-09-01T23:59:59.000Z

473

Oconee Electrical Component Integrated Plant Assessment and Time Limited Aging Analyses for License Renewal: Revision 1  

Science Conference Proceedings (OSTI)

Duke Power Co. and Baltimore Gas and Electric Co. were the first two utilities to apply for and obtain license renewal for their nuclear units. This report is one in a series of EPRI reports providing the technical basis for the Oconee and Calvert Cliffs License Renewal Applications.

2000-08-10T23:59:59.000Z

474

ORNL's alumina-forming austenitic alloy family licensed to Carpenter Technology Corp.  

E-Print Network (OSTI)

ORNL's alumina-forming austenitic alloy family licensed to Carpenter Technology Corp. Carpenter Technology Corp. has licensed an alumina-forming austenitic (AFA) stainless steel alloy developed under technology from the initial conception and alloy design stage to the first successful prototype alloy

475

Summary report on safety and licensing strategy support for the ABR prototype.  

SciTech Connect

Argonne National Laboratory is providing support to the US Department of Energy in the Global Nuclear Energy Partnership (GNEP) in certification of an advanced, sodium-cooled fast reactor. The reactor is to be constructed as a prototype for future commercial power reactors that will produce electricity while consuming actinides recovered from light water reactor spent fuel. This prototype reactor has been called the Advanced Burner Reactor, or ABR, and is now often referred to as the advanced recycle reactor. As part of its activities, Argonne is providing technical services to assist definition of a safety and licensing strategy for the ABR prototype, and to further implementation of the strategy. In FY06, an organizational meeting was held for DOE and its laboratory contractors to discuss licensing alternatives and review previous licensing experience for the Fast Flux Test Facility (FFTF) and the Clinch River Breeder Reactor Plant (CRBRP). Near the end of FY06, a report summarizing the discussions and conclusions was written. One of the top-level conclusions recorded in the report was a recommendation to follow a licensing strategy that included the US Nuclear Regulatory Commission (NRC) as the regulatory review and licensing authority. In FY07, activities ar Argonne to support safety and licensing progress have continued. These activities have focused on further evaluation of licensing alternatives; assessment of design, analysis, and documentation implications of licensing paths; and initial technical interactions with the Nuclear Regulatory Commission. This report summarizes FY07 activities.

Cahalan, J. E.; Nuclear Engineering Division

2007-09-18T23:59:59.000Z

476

Who Is Selling the Ivory Tower? Sources of Growth in University Licensing  

Science Conference Proceedings (OSTI)

Historically, commercial use of university research has been viewed in terms of spillovers. Recently, there has been a dramatic increase in technology transfer through licensing as universities attempt to appropriate the returns from faculty research. ... Keywords: Entrepreneurial activity, Invention disclosures, Patents, University licensing

Jerry G. Thursby; Marie C. Thursby

2002-01-01T23:59:59.000Z

477

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization March 23, 2011 - 1:00pm Addthis Washington, DC - Two new patented sorbents used for carbon dioxide (CO2) capture from coal-based power plants have moved closer to commercialization as a result of a licensing agreement between the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) and ADA Environmental Solutions (ADA-ES). The nonexclusive agreement facilitates negotiations on intellectual property rights, protects proprietary information, and grants non-exclusive licensing of the new technology. Under federal regulations, NETL is authorized to obtain, maintain, and own patent protection for its

478

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization March 23, 2011 - 1:00pm Addthis Washington, DC - Two new patented sorbents used for carbon dioxide (CO2) capture from coal-based power plants have moved closer to commercialization as a result of a licensing agreement between the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) and ADA Environmental Solutions (ADA-ES). The nonexclusive agreement facilitates negotiations on intellectual property rights, protects proprietary information, and grants non-exclusive licensing of the new technology. Under federal regulations, NETL is authorized to obtain, maintain, and own patent protection for its

479

UNITED STATES OF AMERICA ATOMIC ENERGY COMMISSION APPLICATION FORAEC LICENSE TO  

Office of Legacy Management (LM)

OF AMERICA OF AMERICA ATOMIC ENERGY COMMISSION APPLICATION FORAEC LICENSE TO TRANSFER,DELIVER,EXPORT,OR RECEIVE URANIUM ORTHORIUM SOURCE MATERIAL Pursuant to Code of Federal Regulations. Title II- Atomic Energy. Part IO-Control of Source Material Form approved Budget Bureau No. 3%RO02.2. 2. PREVIOUS AEC LICENSE NUMBER, IF ANY. R-103 _..._............_.~_~~......~~~.....~.. INSTRUCTIONS File two (2) copies of this application with the U. S. Atomic Energy Commission, P. 0. Box 30, Ansonia Station, New York 23, N. Y. This application may be used for an original license or for the renewal of a license. In the case of a rrnewal, this application should be received by the Commission on or before 30 days before the expiration of the previous license. Complete blocks 1, 2, 3, 9. and if

480

License or copyright restrictions may apply to redistribution; see http://www.ams.org/journal-terms-of-use License or copyright restrictions may apply to redistribution; see http://www.ams.org/journal-terms-of-use  

E-Print Network (OSTI)

License or copyright restrictions may apply to redistribution; see http://www.ams.org/journal-terms-of-use #12;License or copyright restrictions may apply to redistribution; see http://www.ams.org/journal-terms-of-use #12;License or copyright restrictions may apply to redistribution; see http://www.ams.org/journal-terms

Flicker, Yuval

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Carbonaceous Chemistry for Computational Modeling Licensing and Partnership Opportunity  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry for Computational Modeling Chemistry for Computational Modeling Opportunity The Department of Energy's National Energy Technology Laboratory (NETL) has developed a software platform entitled Carbonaceous Chemistry for Computational Modeling (C3M) that is used to access a variety of kinetic processes and reaction mechanisms typically found in coal gasification, gas clean-up, and carbon capture processes. This unique software provides the user the ability to conduct virtual kinetic experiments using leading kinetic packages and available experimental data to evaluate kinetic predictions as a function of fuel and sorbent type and/or operating conditions. A Patent Cooperation Treaty application was filed in June 2008. NETL is seeking non-exclusive licensing partners interested in implementing

482

Sensor network based vehicle classification and license plate identification system  

Science Conference Proceedings (OSTI)

Typically, for energy efficiency and scalability purposes, sensor networks have been used in the context of environmental and traffic monitoring applications in which operations at the sensor level are not computationally intensive. But increasingly, sensor network applications require data and compute intensive sensors such video cameras and microphones. In this paper, we describe the design and implementation of two such systems: a vehicle classifier based on acoustic signals and a license plate identification system using a camera. The systems are implemented in an energy-efficient manner to the extent possible using commercially available hardware, the Mica motes and the Stargate platform. Our experience in designing these systems leads us to consider an alternate more flexible, modular, low-power mote architecture that uses a combination of FPGAs, specialized embedded processing units and sensor data acquisition systems.

Frigo, Janette Rose [Los Alamos National Laboratory; Brennan, Sean M [Los Alamos National Laboratory; Rosten, Edward J [Los Alamos National Laboratory; Raby, Eric Y [Los Alamos National Laboratory; Kulathumani, Vinod K [WEST VIRGINIA UNIV.

2009-01-01T23:59:59.000Z

483

UPDATE TO THE YUCCA MOUNTAIN REPOSITORY LICENSE APPLICATION  

E-Print Network (OSTI)

The purpose of this letter is to transmit the U.S. Department of Energy's (DOE) first update to the Yucca Mountain Repository LA, which meets the requirements of 10 CFR § 63.22(c) to update the application on notification of the appointment of an Atomic Safety and Licensing Board. DOE initially transmitted its LA for construction authorization to the U.S. Nuclear Regulatory Commission (NRC) on June 3, 2008. In accordance with 10 CFR § 63.22(e), DOE certifies that this revision reflects the updated LA as of October 16, 2008. Changes made to this revision were determined not to be significant and did not impact the conclusions of the LA. The update was initiated soon after the docketing of the LA by the NRC in anticipation of notification of the appointment of an Atomic Safety and Licensing Board. Due to the lengthy process required to maintain configuration control between the paper version and the electronic version, and the time required to print the paper version, DOE is submitting the update prepared as of that time. Enclosed are optical storage media which contain: 1) the first update of the LA, with revised sections clearly identified as Revision 1, and text and figure changes noted with marginal change bars; and 2) updates to the primary reference documents to the LA, affecting 36 of the original 196 references. In addition, enclosed in paper format are: 1) a detailed listing of the contents of the optical storage media submitted with this letter; 2) a summary of the specific LA changes that have been made, including the sections revised and a description of each change; and 3) copies of the individual LA pages affected by changes since the June 3, 2008, submittal. The updates to the primary reference

Michael F. Weber

2009-01-01T23:59:59.000Z

484

Materials Reliability Program: San Onofre Nuclear Generating Station Reactor Vessel Internals Management Engineering Program (MRP-303)  

Science Conference Proceedings (OSTI)

All operating pressurized water reactors must have a reactor vessel internals aging management document in place by December 2011 according to the mandatory requirement under Nuclear Energy Institute (NEI) 03-08. This program should be developed to meet the guidance provided by Materials Reliability Program (MRP) -227, Rev. 0, Pressurized Water Reactor Internals Inspection and Evaluation Guidelines. For non-license renewal plants, the requirements are valid within the current license period, and the Elec...

2011-02-28T23:59:59.000Z

485

Radon-222 emissions and control practices for licensed uranium mills and their associated tailings piles. Final report  

SciTech Connect

The report is organized into five main sections. The conclusions of the effort are summarized in Chapter 2. A general description of current milling and tailings management practices and a summary of the site-specific characteristics of operating and standby uranium mills are contained in Chapter-3. The sources and emission rates of radon-222 at licensed mills and their associated tailings piles are contained in Chapter 4 along with the results of an effort to develop generic procedures to estimate radon-222 emissions for milling operations and tailings disposal. Control practices that are being or could be applied to the milling operation and tailings disposal areas and their estimated cost and effectiveness in reducing radon-222 emissions are presented in Chapter 5. The appendices contain detailed information on mill site data and emission estimates.

Not Available

1985-06-01T23:59:59.000Z

486

Licensing topical report: interpretation of general design criteria for high-temperature gas-cooled reactors  

SciTech Connect

This Licensing Topical Report presents a set of General Design Criteria (GDC) which is proposed for applicability to licensing of graphite-moderated, high-temperature gas-cooled reactors (HTGRs). Modifications as necessary to reflect HTGR characteristics and design practices have been made to the GDC derived for applicability to light-water-cooled reactors and presented in Appendix A of Part 50, Title 10, Code of Federal Regulations, including the Introduction, Definitions, and Criteria. It is concluded that the proposed set of GDC affords a better basis for design and licensing of HTGRs.

Orvis, D.D.; Raabe, P.H.

1980-01-01T23:59:59.000Z

487

Atomic Safety and Licensing Board Panel Biennial Report, Fiscal Years 1993--1994. Volume 6  

SciTech Connect

In Fiscal Year 1993, the Atomic Safety and Licensing Board Panel (``the Panel``) handled 30 proceedings. In Fiscal Year 1994, the Panel handled 36 proceedings. The cases addressed issues in the construction, operation, and maintenance of commercial nuclear power reactors and other activities requiring a license form the Nuclear Regulatory Commission. This report sets out the Panel`s caseload during the year and summarizes, highlight, and analyzes how the wide- ranging issues raised in those proceedings were addressed by the Panel`s judges and licensing boards.

NONE

1995-08-01T23:59:59.000Z

488

Model and Analytic Processes for Export License Assessments  

SciTech Connect

This paper represents the Department of Energy Office of Nonproliferation Research and Development (NA-22) Simulations, Algorithms and Modeling (SAM) Program's first effort to identify and frame analytical methods and tools to aid export control professionals in effectively predicting proliferation intent; a complex, multi-step and multi-agency process. The report focuses on analytical modeling methodologies that alone, or combined, may improve the proliferation export control license approval process. It is a follow-up to an earlier paper describing information sources and environments related to international nuclear technology transfer. This report describes the decision criteria used to evaluate modeling techniques and tools to determine which approaches will be investigated during the final 2 years of the project. The report also details the motivation for why new modeling techniques and tools are needed. The analytical modeling methodologies will enable analysts to evaluate the information environment for relevance to detecting proliferation intent, with specific focus on assessing risks associated with transferring dual-use technologies. Dual-use technologies can be used in both weapons and commercial enterprises. A decision-framework was developed to evaluate which of the different analytical modeling methodologies would be most appropriate conditional on the uniqueness of the approach, data availability, laboratory capabilities, relevance to NA-22 and Office of Arms Control and Nonproliferation (NA-24) research needs and the impact if successful. Modeling methodologies were divided into whether they could help micro-level assessments (e.g., help improve individual license assessments) or macro-level assessment. Macro-level assessment focuses on suppliers, technology, consumers, economies, and proliferation context. Macro-level assessment technologies scored higher in the area of uniqueness because less work has been done at the macro level. An approach to developing testable hypotheses for the macro-level assessment methodologies is provided. The outcome of this works suggests that we should develop a Bayes Net for micro-level analysis and continue to focus on Bayes Net, System Dynamics and Economic Input/Output models for assessing macro-level problems. Simultaneously, we need to develop metrics for assessing intent in export control, including the risks and consequences associated with all aspects of export control.

Thompson, Sandra E.; Whitney, Paul D.; Weimar, Mark R.; Wood, Thomas W.; Daly, Don S.; Brothers, Alan J.; Sanfilippo, Antonio P.; Cook, Diane; Holder, Larry

2011-09-29T23:59:59.000Z

489

Burnup Credit Approach Used in the Yucca Mountain License Application  

SciTech Connect

The United States Department of Energy has submitted a license application (LA) for construction authorization of a deep geologic repository at Yucca Mountain, Nevada. The license application is currently under review by the United States Nuclear Regulatory Commission (NRC). This paper will describe the methodology and approach used in the LA to address the issue of criticality and the role of burnup credit during the postclosure period. The most significant and effective measures for prevention of criticality in the repository include multiple redundant barriers that act to isolate fissionable material from water (which can act as a moderator, corrosive agent, and transporter of fissile material); inherent geometry of waste package internals and waste forms; presence of fixed neutron absorbers in waste package internals; and fuel burnup for commercial spent nuclear fuel. A probabilistic approach has been used to screen criticality from the total system performance assessment. Within the probabilistic approach, criticality is considered an event, and the total probability of a criticality event occurring within 10,000 years of disposal is calculated and compared against the regulatory criterion. The total probability of criticality includes contributions associated with both internal (within waste packages) and external (external to waste packages) criticality for each of the initiating events that could lead to waste package breach. The occurrence of and conditions necessary for criticality in the repository have been thoroughly evaluated using a comprehensive range of parameter distributions. A simplified design-basis modeling approach has been used to evaluate the probability of criticality by using numerous significant and conservative assumptions. Burnup credit is used only for evaluations of in-package configurations and uses a combination of conservative and bounding modeling approximations to ensure conservatism. This paper will review the NRC regulatory criteria relevant to postclosure criticality, explain the role of criticality within the overall repository performance assessment, describe the strategy for preventing criticality via design features and waste form properties, and discuss the numerous considerations relevant to criticality and burnup credit for spent nuclear fuel disposed of in a geologic repository, with emphasis on the burnup credit approach and analyses.

Scaglione, John M [ORNL; Wagner, John C [ORNL

2010-01-01T23:59:59.000Z

490

Pricing and licensing of software products and services : a study on industry trends  

E-Print Network (OSTI)

The software product business reached the $150 billion mark at the end of 2005. The pricing and licensing of new products, maintenance services, services and service maintenance have become an important strategy to deliver ...

Nayak, Shivashis

2006-01-01T23:59:59.000Z

491

Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease |  

NLE Websites -- All DOE Office Websites (Extended Search)

Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease January 06, 2011 A California based small business, Sci Proteck, Inc, has recently licensed technology developed at the Department of Energy's Oak Ridge National Laboratory (ORNL) and the University of Chicago (UChicago) to protect plants from crop diseases. Research on this new method for inducing plant pathogen resistance began in 2005 following a grant from the National Science Foundation and research support from the Office of Biological and Environmental Research of the U.S. Department of Energy. Principal developers include Timothy Tschaplinski at ORNL and Drs. Jean Greenberg and Ho Won Jung at the UChicago. ORNL and UChicago entered into an Inter-Institutional Agreement for licensing, patent prosecution, and royalty sharing.

492

Figure 72. Vehicle miles traveled per licensed driver, 1970-2040 ...  

U.S. Energy Information Administration (EIA)

Sheet3 Sheet2 Sheet1 Figure 72. Vehicle miles traveled per licensed driver, 1970-2040 (thousand miles) History Reference case 1970.00 $8.69 1971.00 $9.01

493

Sodium fast reactor safety and licensing research plan. Volume II.  

SciTech Connect

Expert panels comprised of subject matter experts identified at the U.S. National Laboratories (SNL, ANL, INL, ORNL, LBL, and BNL), universities (University of Wisconsin and Ohio State University), international agencies (IRSN, CEA, JAEA, KAERI, and JRC-IE) and private consultation companies (Radiation Effects Consulting) were assembled to perform a gap analysis for sodium fast reactor licensing. Expert-opinion elicitation was performed to qualitatively assess the current state of sodium fast reactor technologies. Five independent gap analyses were performed resulting in the following topical reports: (1) Accident Initiators and Sequences (i.e., Initiators/Sequences Technology Gap Analysis), (2) Sodium Technology Phenomena (i.e., Advanced Burner Reactor Sodium Technology Gap Analysis), (3) Fuels and Materials (i.e., Sodium Fast Reactor Fuels and Materials: Research Needs), (4) Source Term Characterization (i.e., Advanced Sodium Fast Reactor Accident Source Terms: Research Needs), and (5) Computer Codes and Models (i.e., Sodium Fast Reactor Gaps Analysis of Computer Codes and Models for Accident Analysis and Reactor Safety). Volume II of the Sodium Research Plan consolidates the five gap analysis reports produced by each expert panel, wherein the importance of the identified phenomena and necessities of further experimental research and code development were addressed. The findings from these five reports comprised the basis for the analysis in Sodium Fast Reactor Research Plan Volume I.

Ludewig, H. (Brokhaven National Laboratory, Upton, NY); Powers, D. A.; Hewson, John C.; LaChance, Jeffrey L.; Wright, A. (Argonne National Laboratory, Argonne, IL); Phillips, J.; Zeyen, R. (Institute for Energy Petten, Saint-Paul-lez-Durance, France); Clement, B. (IRSN/DPAM.SEMIC Bt 702, Saint-Paul-lez-Durance, France); Garner, Frank (Radiation Effects Consulting, Richland, WA); Walters, Leon (Advanced Reactor Concepts, Los Alamos, NM); Wright, Steve; Ott, Larry J. (Oak Ridge National Laboratory, Oak Ridge, TN); Suo-Anttila, Ahti Jorma; Denning, Richard (Ohio State University, Columbus, OH); Ohshima, Hiroyuki (Japan Atomic Energy Agency, Ibaraki, Japan); Ohno, S. (Japan Atomic Energy Agency, Ibaraki, Japan); Miyhara, S. (Japan Atomic Energy Agency, Ibaraki, Japan); Yacout, Abdellatif (Argonne National Laboratory, Argonne, IL); Farmer, M. (Argonne National Laboratory, Argonne, IL); Wade, D. (Argonne National Laboratory, Argonne, IL); Grandy, C. (Argonne National Laboratory, Argonne, IL); Schmidt, R.; Cahalen, J. (Argonne National Laboratory, Argonne, IL); Olivier, Tara Jean; Budnitz, R. (Lawrence Berkeley National Laboratory, Berkeley, CA); Tobita, Yoshiharu (Japan Atomic Energy Agency, Ibaraki, Japan); Serre, Frederic (Centre d'%C3%94etudes nucl%C3%94eaires de Cadarache, Cea, France); Natesan, Ken (Argonne National Laboratory, Argonne, IL); Carbajo, Juan J. (Oak Ridge National Laboratory, Oak Ridge, TN); Jeong, Hae-Yong (Korea Atomic Energy Research Institute, Daejeon, Korea); Wigeland, Roald (Idaho National Laboratory, Idaho Falls, ID); Corradini, Michael (University of Wisconsin-Madison, Madison, WI); Thomas, Justin (Argonne National Laboratory, Argonne, IL); Wei, Tom (Argonne National Laboratory, Argonne, IL); Sofu, Tanju (Argonne National Laboratory, Argonne, IL); Flanagan, George F. (Oak Ridge National Laboratory, Oak Ridge, TN); Bari, R. (Brokhaven National Laboratory, Upton, NY); Porter D. (Idaho National Laboratory, Idaho Falls, ID); Lambert, J. (Argonne National Laboratory, Argonne, IL); Hayes, S. (Idaho National Laboratory, Idaho Falls, ID); Sackett, J. (Idaho National Laboratory, Idaho Falls, ID); Denman, Matthew R.

2012-05-01T23:59:59.000Z

494

Proceedings: Decommissioning--License Termination Plans and Final Site Release Workshop  

SciTech Connect

This report presents the proceedings of an EPRI workshop dealing with the subject of decommissioning license termination and final site release. The workshop was the ninth in a series designed to aid utility personnel in assessing technologies for decommissioning nuclear power plants. It focused on specific aspects of license termination activities and final site release as they relate to nuclear plant decommissioning. The information presented will help utilities control decommissioning costs by selecting the best practices and technologies

None

2004-03-01T23:59:59.000Z

495

Guide to Assessing Radiological Elements for License Termination of Nuclear Power Plants  

Science Conference Proceedings (OSTI)

This report provides guidance in the preparation of a License Termination Plan (LTP) to utilities engaged in nuclear plant decommissioning. The U.S. Nuclear Regulatory Commission (NRC) requires utilities to submit the LTP document years prior to the site license termination. This report focuses on the radiological components of the LTP. It identifies and addresses the regulatory requirements of each element in a way useful to the utility end user.

2002-06-12T23:59:59.000Z

496

Proceedings: Decommissioning--License Termination Plans and Final Site Release Workshop  

Science Conference Proceedings (OSTI)

This report presents the proceedings of an EPRI workshop dealing with the subject of decommissioning license termination and final site release. The workshop was the ninth in a series designed to aid utility personnel in assessing technologies for decommissioning nuclear power plants. It focused on specific aspects of license termination activities and final site release as they relate to nuclear plant decommissioning. The information presented will help utilities control decommissioning costs by selecti...

2004-04-13T23:59:59.000Z

497

Nondestructive Evaluation: Update on License Renewal One Time Inspection and Best NDE Practices  

Science Conference Proceedings (OSTI)

As nuclear plants enter long-term operations beyond 40 years with extended licenses, nondestructive evaluation (NDE) becomes increasingly important. This is especially true for plants that are going through the license renewal process. Many of the commitments made by more than 100 plants have submitted applications that include identification of systems, structures, and components for one-time inspection (OTI) based on suitable NDE techniques. This report provides an example of such inspection and the as...

2011-11-02T23:59:59.000Z

498

Decommissioning: License Termination and Final Site Release: Proceedings of EPRI Technical Workshop, October 2001  

Science Conference Proceedings (OSTI)

This report presents the proceedings of an EPRI workshop on decommissioning license termination and final site release. The workshop was the eighth in a series designed to aid utility personnel in assessing technologies for decommissioning nuclear power plants. This workshop focused on specific aspects of license termination and final site release as they relate to nuclear plant decommissioning. The information presented will help utilities control decommissioning costs by selecting the best practices an...

2002-02-08T23:59:59.000Z

499

Department of Energy interest and involvement in nuclear plant license renewal activities  

SciTech Connect

Recognizing the importance of nuclear license renewal to the nation's energy strategy, the Department of Energy (DOE) initiated a plant lifetime improvement program during 1985 to determine the feasibility of the license renewal option for US nuclear plants. Initial activities of the DOE program focused on determining whether there were technical and economic obstacles that might preclude or limit the successful implementation of the license renewal option. To make this determination, DOE cosponsored with the Electric Power Research Institute (EPRI) pilot-plant efforts by Virginia Electric Power and Northern States Power. Both pilot-plant efforts concluded that life extension is technically and economically feasible. In parallel with the pilot-plant activities, DOE performed national economic studies that demonstrated the economic desirability of life extension. Having demonstrated the feasibility of life extension, DOE, in conjunction with EPRI, selected two lead plants to demonstrate the license renewal process. These lead plants are Yankee Atomic's Yankee Rowe facility and Northern States Power's Monticello facility. DOE also initiated activities to develop the technical and regulatory bases to support the license renewal process in the United States. DOE has recently identified nuclear plant license renewal to be an important element of its National Energy Strategy. This paper summarizes the significant results, conclusions, and ongoing activities of the DOE effort. 18 refs.

Bustard, L.D. (Sandia National Labs., Albuquerque, NM (USA)); Harrison, D.L. (USDOE Assistant Secretary for Nuclear Energy, Washington, DC (USA). Office of LWR Safety and Technology)

1991-01-01T23:59:59.000Z

500

Project licensing plan for UMTRA (Uranium Mill Tailings Remedial Action) sites  

SciTech Connect

The purpose of the Uranium Mill Tailings Remedial Action (UMTRA) Project Licensing Plan is to establish how a disposal site will be licensed, and to provide responsibilities of participatory agencies as legislated by the Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978 (Public Law 95-604). This Plan has been developed to ensure that the objectives of licensing are met by identifying the necessary institutional controls, participatory agency responsibilities, and key milestones in the licensing process. The Plan contains the legislative basis for and a description of the licensing process ( Process'') for UMTRA sites. This is followed by a discussion of agency responsibilities, and milestones in the Process. The Plan concludes with a generic timeline of this Process. As discussed in Section 2.1, a custodial maintenance and surveillance plan will constitute the basis for a site license. The details of maintenance and surveillance are discussed in the Project Maintenance and Surveillance Plan (AL-350124.0000). 5 refs., 4 figs.

Not Available

1984-07-01T23:59:59.000Z