Powered by Deep Web Technologies
Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

2

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

3

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

4

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

5

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

6

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

7

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

8

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

9

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

10

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

11

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

12

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

13

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

14

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

15

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

16

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

17

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

18

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

19

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

20

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-177: VMware vCenter Chargeback Manager File Upload Handling...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vendor recommends updating to version 2.5.1 Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

22

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

23

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

24

A commodity approach to aging management review of supports for license renewal  

SciTech Connect

10CFR Part 54 requires that nuclear power plant licensees who seek renewal of their operating licenses for an additional 20 years of operation (i.e., for a total operating life of 60 years) perform an Integrated Plant Assessment (IPA) on all systems, structures and components (SSCs) within the scope of license renewal. Baltimore Gas and Electric (BGE) and MPR Associates, Inc., have recently completed an aging management review of component supports for Calvert Cliffs Nuclear Power Plant (CCNPP). A commodity approach was used on the basis that component supports perform essentially the same function regardless of the system with which they are associated. This approach, i.e., treating component supports as commodities as opposed to performing the aging management review for each individual component support, resulted in a cost-effective approach for this portion of the IPA. An important feature of the aging management review of component support at CCNPP is the evaluation of the adequacy of existing programs to manage component support aging. Two major programs were included in the evaluation: the ASME Section 11 In-Service Inspection (ISI) Program, and CCNPP`s Seismic Verification Project to resolve USI A-46. The key role that these programs play in the overall aging management strategy for component supports, as well as the evaluation of other on-going activities which complete the aging management approach for component supports, are discussed.

Schlaseman, C.S. [MPR Associates, Inc., Washington, DC (United States); Tilden, B.M. [Baltimore Gas and Electric Co., MD (United States)

1996-09-01T23:59:59.000Z

25

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

26

Analysis of strategic alliance management lessons from the failure of Korean and Japanese licensed games in China  

Science Journals Connector (OSTI)

The Chinese online game industry is a young knowledge-intensive service industry with huge potential. Since 2003, setting up strategic alliances with the Chinese online game operators has been chosen as the main mode by foreign game companies to enter China. With the rise of the Chinese online industry, the market shares of the foreign licensed games have been declining from their original dominant position. In this paper, instead of concerning the relationship between natural cultural difference and the foreign licensed game operation, the authors use Tung's technical competence theory to explore factors that have caused decline in the market share of foreign licensed games in China. In the findings, the lack of in-depth knowledge of market demand, the lack of appropriate product supply, the lack of effective business strategy and management teams as well as the Chinese government's local protection policies are classified as the main reasons for foreign games' market decline in China.

Qun Ren; Philip Hardwick

2009-01-01T23:59:59.000Z

27

Technology Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensing INL contractor-owned inventions are available for licensing and commercialization by U.S. and foreign companies and organizations. The INL licenses its intellectual...

28

Summary of technical information and agreements from Nuclear Management and Resources Council industry reports addressing license renewal  

SciTech Connect

In about 1990, the Nuclear Management and Resources Council (NUMARC) submitted for NRC review ten industry reports (IRs) addressing aging issues associated with specific structures and components of nuclear power plants ad one IR addressing the screening methodology for integrated plant assessment. The NRC staff had been reviewing the ten NUMARC IRs; their comments on each IR and NUMARC responses to the comments have been compiled as public documents. This report provides a brief summary of the technical information and NUMARC/NRC agreements from the ten IRs, except for the Cable License Renewal IR. The technical information and agreements documented herein represent the status of the NRC staffs review when the NRC staff and industry resources were redirected to address rule implementation issues. The NRC staff plans to incorporate appropriate technical information and agreements into the draft standard review plan for license renewal.

Regan, C.; Lee, S. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Reactor Program Management; Chopra, O.K.; Ma, D.C.; Shack, W.J. [Argonne National Lab., IL (United States)

1996-10-01T23:59:59.000Z

29

Research License Agreement Template  

NLE Websites -- All DOE Office Websites (Extended Search)

Research License Template Research License Template RESEARCH LICENSE Between Alliance for Sustainable Energy, LLC And [COMPANY or UNIVERSITY NAME] This License Agreement (hereinafter "Agreement"), which shall be effective on the date it is executed by the last Party to sign (the "Effective Date"), is between Alliance for Sustainable Energy, LLC (hereinafter "Alliance"), Management and Operating Contractor for the National Renewable Energy Laboratory (hereinafter "NREL") located at 1617 Cole Blvd., Golden, Colorado 80401 and [COMPANY or UNIVERSITY NAME], (hereinafter "Research Licensee"), a [FOR-PROFIT or NON-PROFIT] entity organized and existing under the laws of the State of [NAME of STATE] and having a principal place of business at [ADDRESS], hereinafter referred

30

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

31

Technology Licensing Contacts | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Administrative Specialist Technology Licensing radercd@ornl.gov (865) 241-0898 David Sims Commercialization Manager simsdl@ornl.gov (865) 241-3808 Biography Renae Speck Senior...

32

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

33

How to License Technologies | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Licensing Technology Licensing How To License ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Licensing Agreement Technology Innovation Program Technology Assistance Program Licensing Staff Search For Technologies Available Technologies Licensing Opportunity Announcements Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | How To License ORNL Technologies SHARE How To License ORNL Technologies Technology Evaluation The first step in the licensing process is for you to identify technologies of interest to you. As a starting point, you may wish to browse the available technologies or search using keywords and the ORNL InSpire Technology Search Engine. At any point in your search, please feel free to contact the commercialization manager identified for each technology or

34

Negotiable Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Negotiable Licensing Negotiable Licensing Negotiable Licenses LANL's significant portfolio of intellectual property (patents, copyrights, and trademarks) primarily results from federally-sponsored research and development in support of the Laboratory's national security mission. Also, we collaborate with industry to develop innovative, application-specific technology to further our partner's ultimate commercialization objectives. In each case, we develop valuable technology that provides benefit to both the public and private sectors, the majority of which is available for commercial licensing. To ensure that our partners have the necessary intellectual property advantage to successfully deploy LANL technology, we offer a variety of negotiable commercial license agreements that can be tailored to suit specific market

35

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

36

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

37

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

38

PETSc: Docs: Code Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Code Management Code Management Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site In this file we list some of the techniques that may be used to increase one's efficiency when developing PETSc application codes. We have learned to use these techniques ourselves, and they have improved our efficiency tremendously. Editing and Compiling The biggest time sink in code development is generally the cycle of EDIT-COMPILE-LINK-RUN. We often see users working in a single window with a cycle such as: Edit a file with emacs. Exit emacs. Run make and see some error messages. Start emacs and try to fix the errors; often starting emacs hides

39

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

40

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Licensing Opportunity Announcements | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Technology Licensing | Licensing Opportunity Announcements SHARE Licensing Opportunity Announcements UT-Battelle, LLC, acting under its Prime Contract No. ORNL Laboratory Director Signs New License Agreement DE-AC05-00OR22725 with the U.S. Department of Energy (DOE) for the management and operation of the Oak Ridge National Laboratory (ORNL), is posting notice of near-term license opportunities for technologies listed on this page and is requesting license applications from potential commercialization partners. ORNL will license these technologies in defined fields of use. License applications will be evaluated based on prospective partners' ability and commitment to successfully commercialize the technology, with a preference for United States-based

42

V-163: Red Hat Network Satellite Server Inter-Satellite Sync...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

43

T-564: Vulnerabilities in Citrix Licensing administration components |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Vulnerabilities in Citrix Licensing administration 4: Vulnerabilities in Citrix Licensing administration components T-564: Vulnerabilities in Citrix Licensing administration components February 24, 2011 - 7:00am Addthis PROBLEM: Vulnerabilities in Citrix Licensing administration components. PLATFORM: Citrix Licensing Administration Console, formerly known as the License Management Console. ABSTRACT: The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. reference LINKS: Citrix ID:CTX128167 SecurityTracker Alert ID:1025123 Citrix Support IMPACT ASSESSMENT: Medium Discussion: Citrix has been made aware of a number of vulnerabilities in a third-party component that is used by the Citrix Licensing administration console. These vulnerabilities could potentially allow an unauthorized user to gain

44

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

45

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

46

Technology Licensing | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Innovation Portal. SPX Heat Transfer licensed NREL's advanced direct contact condenser to boost geothermal power plant output. Licenses Since 2000, NREL has executed more...

47

LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM  

NLE Websites -- All DOE Office Websites (Extended Search)

LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM LOS ALAMOS NATIONAL LABORATORY - EXPRESS LICENSING PROGRAM NON-EXCLUSIVE PATENT LICENSE AGREEMENT This Agreement between Los Alamos National Security, LLC ("LANS"), under its United States Department of Energy ("DOE") Contract No. DE-AC52-06NA25396, to manage and operate Los Alamos National Laboratory ("LANL"), and ______________________________________, a _____________________________ corporation Company Name ("LICENSEE") (State of Incorporation) having its principal place of business at: ________________________________________________________________________________________ (Company Address) is effective on the date of execution by the last signing Party and payment of the License Issue Fee

48

TAO: License  

NLE Websites -- All DOE Office Websites (Extended Search)

Copyright 2013 , UChicago Argonne, LLC Copyright 2013 , UChicago Argonne, LLC Operator of Argonne National Laboratory All rights reserved. Toolkit for Advanced Optimization (TAO), Version 2.2.0 OPEN SOURCE LICENSE Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Software changes, modifications, or derivative works, should be noted with comments and the author and organization's name. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

49

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

50

Wave Energy Development in Oregon Licensing & Permitting Requirements  

E-Print Network (OSTI)

...............................................................................................................................................6 State Hydroelectric License

51

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peas; Richard C. Russell

2012-01-01T23:59:59.000Z

52

Solar Heating Contractor Licensing  

Energy.gov (U.S. Department of Energy (DOE))

Michigan offers a solar heating contractor specialty license to individuals who have at least three years of experience installing solar equipment under the direction of a licensed solar contractor...

53

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

54

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

55

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

56

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

57

License Iso. CM35  

Office of Legacy Management (LM)

License Iso. CM35 License Iso. CM35 hUhUll4MhiM&POlltYll7~ llolh-thRqalStract Alolan&le, vlrghla Attoatlonl w. & 0. EutahlDon Pursuant to the Atanic Energy Act of 1954 and Section 40.21 or the Code of Federal Regulations, Title 10 - Atomic Energy, Chapter 1, Part 40 - Control of Sauce Haterid, you are hereby licensed to receive possession of and title to three hundred uwi l lght the term of this liceaee for pounda of refined eource material during 880 in meueb and demlopmt aotiritim MDool.atd lfltb fual oleroat f*hrlcmtlon. You are nirthcr licensed to transfer aad deliver poaaeeslon of and title to refined ecwce material to any person licensed by the Atcmlc Energy ~~slon, VitAin the limits of his license. i f Am a condition of iemzaace of thie llcenee, you are required to maintain

58

IT Operational Oversight Committee Round #4: Software Licensing Strategies Team  

E-Print Network (OSTI)

, University Development Office Cliff Johnston* , Professor of Soil Chemistry, College of Agriculture Julie license purchasing and management. The team evaluated software purchasing and licensing information from a variety of sources that included data from central purchasing (i.e., SRM), credit card purchases (not

59

NETL Partnership and Licensing Agreements  

NLE Websites -- All DOE Office Websites (Extended Search)

Partnerships and Licensing Options Available Technologies Partnerships and Licensing Success Stories Contact Us Cooperative Research and Development Agreement (CRADA) A CRADA...

60

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

ENERGY STAR Guide for Licensed Professionals | ENERGY STAR Buildings &  

NLE Websites -- All DOE Office Websites (Extended Search)

Guide for Licensed Professionals Guide for Licensed Professionals Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and managers Existing buildings Commercial new construction Industrial energy management Small business Service providers Service and product providers Verify applications for ENERGY STAR certification Design commercial buildings Energy efficiency program administrators Commercial and industrial program sponsors Associations State and local governments Federal agencies Tools and resources Training In This Section Campaigns Commercial building design Communications resources Energy management guidance Financial resources Portfolio Manager Products and purchasing Recognition Research and reports Service and product provider (SPP) resources Success stories Target Finder

62

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

63

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

64

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

65

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

66

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

67

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

68

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

69

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

70

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

71

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

72

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

73

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

74

The B & W Owners` Group Generic License Renewal Program  

SciTech Connect

Since the late 1970s, the Babcock & Wilcox (B & W) Owners Group (BWOG) has sponsored significant activities that address technical, economic, and licensing issues to ensure that the B & W nuclear steam supply system (NSSS) power plants operate until the end of their current plant licensed life and to preserve the license renewal option. It should be no surprise that the BWOG decided in late 1992 to aggressively pursue a license renewal effort. This effort, the Generic License Renewal Program (GLRP), has over the past 18 months contributed significantly to the industry`s license renewal initiative. The GLRP was established as a project with a full-time management organization within the BWOG structure. Its primary objective was the development and demonstration of an integrated plant assessment (IPA) process that would meet the requirements of the License Renewal Rule, published by the US Nuclear Regulatory Commission (NRC) in December 1991. The BWOG consists of five utilities with plants of very similar design, operation, and age. The owners, along with technical support from B & W Nuclear Technologies, created a highly capable and effective team to address the elements of the license renewal rule. This paper presents the BWOG strategy from the beginning of the program, the accomplishments to date, and the current role of the BWOG GLRP.

Gill, R.L. Jr.

1994-12-31T23:59:59.000Z

75

Argonne superconductor technology licensed  

Science Journals Connector (OSTI)

Argonne superconductor technology licensed ... American Superconductor Corp. of Cambridge, Mass., has obtained the exclusive rights to develop and market high-temperature superconductor technology developed at the Department of Energy's Argonne National Laboratory. ... The Argonne technology produces superconducting ceramic coatings by oxidizing an appropriate metallic precursor. ...

RON DAGANI

1988-10-17T23:59:59.000Z

76

Licensing Opportunity The Problem  

E-Print Network (OSTI)

Licensing Opportunity The Problem Small scale wind and water turbines (% and noise levels significantly reduced. All in all, the new generator increases the viability of low wind for small scale wind turbines". The Opportunity A significant body of intellectual property (IP) has been

Wirosoetisno, Djoko

77

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

78

NREL: Technology Transfer - Licensing Agreements  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensing Agreements Licensing Agreements Through licensing agreements, NREL provides industry with an opportunity to commercialize NREL-developed energy technologies and products. Our licensing opportunities are available to both small and large businesses-from start-ups to Fortune 500 companies. Process The licensing agreement process basically includes seven steps. See the NREL Licensing Agreement Process flowchart. We are committed to working through these steps in a timely manner. Experience suggests that the fastest means to reach an agreement is through direct communications to create understanding and agree on actions. 1. Identify and Qualify Opportunity To identify an opportunity, a company can browse the technologies available for licensing. When an opportunity has been identified, NREL then asks the company to

79

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

80

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractor Licensing Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Swimming Pool Heaters Water Heating Program Info State California Program Type Solar/Wind Contractor Licensing Provider California Contractors State License Board The California Contractors State License Board administers contractor licenses. The C-46 Solar Contractor license covers active solar water and space heating systems, solar pool heating systems, and photovoltaic systems. C-46 requirements include four years of experience and passing the business and law exam and the trade exam. Independent license schools offer courses to prepare for license exams.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Program Info State Florida Program Type Solar/Wind Contractor Licensing Provider Florida Solar Energy Industries Association Until 1994, Florida offered limited specialty licenses for residential solar hot water and pool heating, as well a general solar contractor's license. These specialty licenses have not been issued since that time, although people holding these licenses may renew them. The new solar contractor license defines a broader scope of work. With the new license, solar contractors have the authority to install, maintain and

82

GRR/Section 3-MT-d - Land Use License Process | Open Energy Information  

Open Energy Info (EERE)

d - Land Use License Process d - Land Use License Process < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 3-MT-d - Land Use License Process 03MTDLandUseLicenseProcess (1).pdf Click to View Fullscreen Contact Agencies Montana Department of Natural Resources & Conservation Regulations & Policies Surface Management Rule 36.25.103 Triggers None specified Click "Edit With Form" above to add content 03MTDLandUseLicenseProcess (1).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range. Flowchart Narrative The land use license is intended to be used for short-term use of state-owned lands. This license may be used for casual use of the lands

83

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

84

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

85

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

86

Design change management in regulation of nuclear fleets: World nuclear association's working groups on Cooperation in Reactor Design Evaluation and Licensing (CORDEL)  

SciTech Connect

The 60 year life of a reactor means that a plant will undergo change during its life. To ensure continuing safety, changes must be made with a full understanding of the design intent. With this aim, regulators require that each operating organisation should have a formally designated entity responsible for complete design knowledge in regard to plant safety. INSAG-19 calls such an entity 'Design Authority'. This requirement is difficult to achieve, especially as the number of countries and utilities operating plants increases. Some of these operating organisations will be new, and some will be small. For Gen III plants sold on a turnkey basis, it is even more challenging for the operating company to develop and retain the full knowledge needed for this role. CORDEL's Task Force entitled 'Design Change Management' is investigating options for effective design change management with the aim to support design standardization throughout a fleet's lifetime by means of enhanced international cooperation within industry and regulators. This paper starts with considering the causes of design change and identifies reasons for the increased beneficial involvement of the plant's original vendor in the design change process. A key central theme running through the paper is the definition of responsibilities for design change. Various existing mechanisms of vendor-operator interfaces over design change and how they are managed in different organisational and regulatory environments around the world are considered, with the functionality of Owners Groups and Design Authority being central. The roles played in the design change process by vendors, utilities, regulators, owners' groups and other organisations such as WANO are considered The aerospace industry approach to Design Authority has been assessed to consider what lessons might be learned. (authors)

Swinburn, R. [CORDEL DCM Task Force, Rolls-Royce Plc (United Kingdom); Borysova, I. [CORDEL, WNA, 22a St.James Sq., London SW1Y 4JH (United Kingdom); Waddington, J. [CORDEL Group (United Kingdom); Head, J. G. [CORDEL Group, GE-Hitachi Nuclear Energy (United Kingdom); Raidis, Z. [CORDEL Group, Candu Energy (United Kingdom)

2012-07-01T23:59:59.000Z

87

Energy Department Issues Draft Request For Proposal for Nuclear Regulatory Commission Licensed Facilities Procurement  

Energy.gov (U.S. Department of Energy (DOE))

Cincinnati The U.S. Department of Energy (DOE) today issued a Draft Request for Proposal (DRFP) for the Nuclear Regulatory Commission (NRC) Licensed Facilities procurement. The NRC Licensed Facilities procurement is one of the four procurements that resulted from the Idaho Site Office of Environmental Management Post FY 2015 Acquisition Planning.

88

Renewable Energy Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Contractor Licensing Contractor Licensing Renewable Energy Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Solar Buying & Making Electricity Home Weatherization Water Heating & Cooling Commercial Heating & Cooling Heating Water Heating Wind Program Info State Oregon Program Type Solar/Wind Contractor Licensing Provider Department of Consumer and Business Services Oregon requires trade licenses for people installing solar energy equipment, and contractor licenses for the companies that do construction. Companies with an electrical contractor license may engage in the business of making electrical installations. Similarly a plumbing contractor license allows a company to engage in the business of making plumbing

89

Technologies Available for Licensing | Partnerships | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Licensing Technology Licensing How To License ORNL Technologies Licensing Guidelines NDA(s) and MTA(s) Sample Licensing Agreement Technology Innovation Program Technology Assistance Program Licensing Staff Search For Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Licensing Opportunity Announcements Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies SHARE Available Technologies One of the primary missions of the Technology Transfer Division is to move our intellectual property from the research facility to the commercial

90

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Water Heating Commercial Heating & Cooling Heating Program Info State Nevada Program Type Solar/Wind Contractor Licensing Provider Nevada State Contractors Board - Reno Nevada law requires that solar energy system installers be licensed by the Nevada State Contractors Board. Contractors may be licensed under License Classification C-37 (solar contracting for solar water heating and space heating and air conditioning). Contractors may also perform solar work under License Classification C-1* (plumbing and heating), sub-classification (d) for solar water heating installations, or

91

Vehicles - ORNL inverter licensed ... | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Vehicles - ORNL inverter licensed ... Oak Ridge start-up New Hybrid Technologies has licensed a power conversion technology developed by Gui-Jia Su of Oak Ridge National...

92

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

93

Alternative Fuels Data Center: Ethanol License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Ethanol License to Ethanol License to someone by E-mail Share Alternative Fuels Data Center: Ethanol License on Facebook Tweet about Alternative Fuels Data Center: Ethanol License on Twitter Bookmark Alternative Fuels Data Center: Ethanol License on Google Bookmark Alternative Fuels Data Center: Ethanol License on Delicious Rank Alternative Fuels Data Center: Ethanol License on Digg Find More places to share Alternative Fuels Data Center: Ethanol License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Ethanol License Anyone who imports, exports, or supplies ethanol in the state of Wyoming must obtain an annual license from the Wyoming Department of Transportation. The fee for each license is $25. (Reference Wyoming

94

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

95

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

96

Solar Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Contractor Licensing Solar Contractor Licensing Solar Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Solar Buying & Making Electricity Heating & Cooling Swimming Pool Heaters Water Heating Commercial Heating & Cooling Heating Program Info State Arizona Program Type Solar/Wind Contractor Licensing Provider Registrar of Contractors The Arizona Registrar of Contractors does not offer a general solar electric contractor license, but the state's C-11/L-11 electrical license covers solar electric installations. C-11 licenses are required for electrical work on residential property and L-11 licenses apply to commercial installations. Contractors can also acquire a K-11 license to work on both residential and commercial installations. The Arizona Registrar of Contractors does have a specific plumbing license

97

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

98

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

99

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

100

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

102

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

103

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

104

License Stewardship Approach to Commercial Nuclear Power Plant Decommissioning  

SciTech Connect

The paper explores both the conceptual approach to decommissioning commercial nuclear facilities using a license stewardship approach as well as the first commercial application of this approach. The license stewardship approach involves a decommissioning company taking control of a site and the 10 CFR 50 License in order to complete the work utilizing the established trust fund. In conclusion: The license stewardship approach is a novel way to approach the decommissioning of a retired nuclear power plant that offers several key advantages to all parties. For the owner and regulators, it provides assurance that the station will be decommissioned in a safe, timely manner. Ratepayers are assured that the work will be completed for the price they already have paid, with the decommissioning contractor assuming the financial risk of decommissioning. The contractor gains control of the assets and liabilities, the license, and the decommissioning fund. This enables the decommissioning contractor to control their work and eliminates redundant layers of management, while bringing more focus on achieving the desired end state - a restored site. (authors)

Daly, P.T.; Hlopak, W.J. [Commercial Services Group, EnergySolutions 1009 Commerce Park, Oak Ridge, TN (United States)

2008-07-01T23:59:59.000Z

105

Alternative Fuels Data Center: Alternative Fuel License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fuel Fuel License to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel License on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel License on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel License on Google Bookmark Alternative Fuels Data Center: Alternative Fuel License on Delicious Rank Alternative Fuels Data Center: Alternative Fuel License on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel License Any person acting as an alternative fuels dealer must hold a valid alternative fuel license and certificate from the Wisconsin Department of Administration. Except for alternative fuels that a dealer delivers into a

106

NREL: Technology Transfer - Technologies Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies Available for Licensing Technologies Available for Licensing Photo of NREL scientist in the NREL Hydrogen Lab. NREL's scientists and engineers develop award-winning technologies available for licensing. NREL scientists and engineers produce breakthrough and award-winning renewable energy and energy efficiency technologies that are available for licensing. We have many licensing opportunities for NREL-developed technologies, including our featured LED technologies. To see all our technologies available for licensing, visit the EERE Innovation Portal and search for NREL. Learn about our licensing agreement process. Contact For more information about licensing NREL-developed technologies, contact Eric Payne, 303-275-3166. Ombuds NREL strives to quickly resolve any issue or concern you may have regarding

107

TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer  

E-Print Network (OSTI)

Page 1 TECHNOLOGY LICENSE APPLICATION Office of Technology Transfer UT-Battelle, LLC (UT. One of the functions of UT-BATTELLE's Office of Technology Transfer is to negotiate license agreements

Pennycook, Steve

108

Alternative Fuels Data Center: Alternative Fuel License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Fuel Fuel License to someone by E-mail Share Alternative Fuels Data Center: Alternative Fuel License on Facebook Tweet about Alternative Fuels Data Center: Alternative Fuel License on Twitter Bookmark Alternative Fuels Data Center: Alternative Fuel License on Google Bookmark Alternative Fuels Data Center: Alternative Fuel License on Delicious Rank Alternative Fuels Data Center: Alternative Fuel License on Digg Find More places to share Alternative Fuels Data Center: Alternative Fuel License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Alternative Fuel License Alternative fuel providers, bulk users, and retailers, or any person who fuels an alternative fuel vehicle from a private source that does not pay

109

Property:FERC License | Open Energy Information  

Open Energy Info (EERE)

FERC License Property Type String Retrieved from "http:en.openei.orgwindex.php?titleProperty:FERCLicense&oldid610683...

110

Commercialization and Licensing | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Success Stories Success Stories Commercialization and Licensing Economic Development Industrial Partnerships Sponsored Research Partnerships Home | Connect with ORNL | For Industry | Partnerships | Success Stories | Commercialization and Licensing Success Stories Commercialization and Licensing 1-10 of 14 Results Prev 12 Next DNP Green Technology, Inc. Exclusively Licenses Patents Invented at Argonne National Laboratory and Oak Ridge National Laboratory March 09, 2010 - On March 9, 2010, UT-Battelle, LLC, UChicago Argonne, LLC, and DNP Green Technology, INC fully executed an exclusive license agreement for patents invented solely by Argonne National Laboratory and jointly by Oak Ridge National Laboratory (ORNL) and Argonne National Laboratory (ANL). GE-Reuter Stokes to Market SNS-Designed Electronics

111

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

112

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

113

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

114

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

115

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

116

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

117

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

118

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

119

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

120

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

122

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

123

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

124

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

125

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

126

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

127

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

128

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

129

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

130

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

131

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

132

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

133

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

134

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

135

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

136

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

137

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

138

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

139

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

140

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

142

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

143

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

144

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

145

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

146

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

147

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

148

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

149

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

150

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

151

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

152

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

153

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

154

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

155

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

156

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

157

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

158

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

159

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

160

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

162

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

163

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

164

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

165

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

166

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

167

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

168

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

169

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

170

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

171

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

172

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

173

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

174

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

175

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

176

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

177

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

178

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

179

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

180

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

182

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

183

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

184

AP1000{sup R} licensing and deployment in the United States  

SciTech Connect

In recent years, both domestic and foreign utilities have turned to the standardized Westinghouse AP1000 plant design in satisfying their near - and long-term - sustainable energy needs. As direct support to these actions, licensing the AP1000 design has played a significant role by providing one of the fundamental bases in clearing regulatory hurdles leading to the start of new plant construction. Within the U.S. alone, Westinghouse AP1000 licensing activities have reached unprecedented milestones with the approvals of both AP1000 Design Certification and Southern Company's combined construction permit and operating license (COL) application directly supporting the construction of two new nuclear plants in Georgia. Further COL application approvals are immediately pending for an additional two AP1000 plants in South Carolina. And, across the U.S. nuclear industry spectrum, there are 10 other COL applications under regulatory review representing some 16 new plants at 10 sites. In total, these actions represent the first wave of new plant licensing under the regulatory approval process since 1978. Fundamental to the Nuclear Regulatory Commission's AP1000 Design Certification is the formal recognition of the AP1000 passive safety design through regulatory acceptance rulemaking. Through recognition and deployment of the AP1000 Design Certification, the utility licensee / operator of this reactor design are now offered an opportunity to use a simplified 'one-step' combined license process, thereby managing substantial back-end construction schedule risk from regulatory and intervention delays. Application of this regulatory philosophy represents both acceptance and encouragement of standardized reactor designs like the AP1000. With the recent AP1000 Design Certification and utility COL acceptances, the fundamental licensing processes of this philosophy have successfully proven the attainment of significant milestones with the next stage licensing actions directed towards deployment. AP1000 Design Certification and COL deployment, and management of the plant construction in accordance with the conditions within these approvals, remain as significant site and corporate responsibilities. These licensing-construction integrated activities must now focus on identifying and resolving 'as-built' departures from the standardized design as assessed against the certified AP1000 technical and licensing basis. Within this paper, significant aspects of the AP1000 U.S. licensing will be discussed, including identifying systems and processes used in ensuring compliance while deploying the standardized design. Critical licensing steps, licensing deployment actions as plant construction progresses and defining the road forward to a successful completion of licensing actions will be addressed. (authors)

Jordan, R. P.; Russ, P. A.; Filiak, P. P.; Castiglione, L. L. [Westinghouse Electric Company LLC, 1000 Westinghouse Drive, Cranberry Township, PA 16066 (United States)

2012-07-01T23:59:59.000Z

185

Licensing Technologies | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

at the time of execution of the license, reimbursement of patent costs, a "running royalty" payable periodically based upon product sales and a "minimum annual" royalty which...

186

SAFSTOR and License Renewal: Making Them Coexist  

SciTech Connect

The Indian Point Energy Center is located on the eastern shore of the Hudson River in the town of Buchanan, New York. It lies approximately thirty miles north of New York City, and thus, holds the distinction of being the closest nuclear facility to a major metropolitan area. Units 1 and 2 were constructed and operated by Consolidated Edison and Unit 3 was owned and operated by the New York State Power Authority. All three units are now owned and operated by Entergy Nuclear- Northeast. Indian Point Unit 1 was powered by a pressurized water reactor which operated with an authorized maximum steady state power level of 615 thermal megawatts until October 31, 1974. On June 19, 1980, the Commission issued an order revoking authority to operate the facility. Although 244 spent fuel assemblies were successfully shipped offsite to a spent fuel reprocessing facility, 160 assemblies remain in the Unit 1 spent fuel pool awaiting relocation to dry cask storage. Units 2 and 3 are also pressurized water reactors which each produce slightly in excess of 1,000 MWe. Since 1974, Unit 1 has been maintained in a Safe Store Mode (SAFSTOR). For the purposes of this document, the term 'SAFSTOR' is intended to mean 'Custodial SAFSTOR' as described in section 2.4.3 of NUREG 0586 (Final Generic Environmental Impact Statement on Decommissioning of Nuclear Facilities (GEIS) as follows: 'Custodial SAFSTOR requires a minimum cleanup and decontamination effort initially, followed by a period of continuing care with the active protection systems (principally the ventilation system) kept in service throughout the storage period. Full-time onsite surveillance by operating and security forces is required to carry out radiation monitoring, to maintain the equipment, and to prevent accidental or deliberate intrusion into the facility and the subsequent exposure to radiation or the disposal of radioactivity beyond the confines of the facility'. The decision to enter SAFSTOR was based upon the immediate proximity of Unit 1 to the operating units and the fact that a number of Unit 1 systems are shared with Unit 2. Over the past few decades, additional Unit 1 space (primarily within the turbine building) has been cleaned out and is being used to support the operating Units. The original plan to maintain Unit 1 in a SAFSTOR condition until it could be safely dismantled along with Unit 2 at the end of the Unit 2 operating license in 2012, requires some level of re-thinking now that Units 2 and 3 are applying for renewal of their licenses with the desire to continue operation until the 2033 time frame. The remainder of this paper summarizes the inspections and assessments undertaken by Entergy to investigate and document the condition of Indian Point Unit 1 and the resulting steps taken to assure that it would not pose a threat to the license extension efforts being under taken by Units 2 and 3. In conclusion: the Entergy Indian Point management team has systematically undertaken an effort to ensure the Unit 1 SAFSTOR condition and has implemented programs and procedural controls which will assure that it will continue to be safely maintained and will not impact the continued safe operation of Units 2 and 3 during their license renewal period.

Henries, William PE [TLG Services, Inc. - An Entergy Company, 148 New Milford Road East, Bridgewater, CT06752 (United States)

2008-01-15T23:59:59.000Z

187

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

188

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

189

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

190

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

191

Technologies licensed | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies licensed Technologies licensed Technologies licensed Posted: July 16, 2012 - 3:49pm | Y-12 Report | Volume 9, Issue 1 | 2012 Rendering of Y-12's Access Rate Control System Wherever threatening situations arise, in-place security measures make the most of every second. On Feb. 8, a startup firm in Knoxville, Tenn., licensed two security-related technologies from the Y-12 National Security Complex that do just that. The technologies, which delay entrance to controlled-access areas, provide a security solution for various potential markets: commercial nuclear facilities, pharmaceutical manufacturers, correctional facilities and large sporting venues, as well as for other Department of Energy sites. Sustainable Environment Technologies, LLC (SET), licensed the Access Rate

192

Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Liquefied Petroleum Liquefied Petroleum Gas (Propane) License to someone by E-mail Share Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Facebook Tweet about Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Twitter Bookmark Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Google Bookmark Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Delicious Rank Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on Digg Find More places to share Alternative Fuels Data Center: Liquefied Petroleum Gas (Propane) License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Liquefied Petroleum Gas (Propane) License

193

Solar/Wind Contractor Licensing | Open Energy Information  

Open Energy Info (EERE)

Solar/Wind Contractor Licensing Solar/Wind Contractor Licensing < Solar Jump to: navigation, search Some states have established a licensing process for solar-energy contractors and/or wind-energy contractors. These requirements are designed to ensure that contractors have the necessary knowledge and experience to install systems properly. Solar licenses typically take the form of either a separate, specialized solar contractor's license, or a specialty classification under a general electrical or plumbing license. [1] Solar/Wind Contractor Licensing Incentives CSV (rows 1 - 24) Incentive Incentive Type Place Applicable Sector Eligible Technologies Active Alternative Energy System Contracting (Virginia) Solar/Wind Contractor Licensing Virginia Installer/Contractor Photovoltaics No

194

UDOT - Statewide Utility License Agreements | Open Energy Information  

Open Energy Info (EERE)

License Agreements Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: UDOT - Statewide Utility License Agreements Abstract This website links to UDOT...

195

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

196

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

197

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

198

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

199

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

200

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

202

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

203

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

204

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

205

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

206

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

207

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

208

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

209

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

210

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

211

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

212

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

213

Technology Transfer: Success Stories: Licensed Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Licensed Technologies Licensed Technologies Here are some of our licensees and the technologies they are commercializing; see our Start-Up Company page for more of our technology licenses. Company (Licensee) Technology Life Technologies Corp. Cell lines for breast cancer research Bristol Myers Squibb; Novartis; Plexxikon Inc.; Wyeth Research; GlaxoSmithKline; Johnson & Johnson; Boehringer Ingelheim Pharmaceuticals, Inc.; Genzyme Software for automated macromolecular crystallography Shell International Exploration and Production; ConnocoPhillips Company; StatOil ASA; Schlumburger Technology Corportation; BHP Billiton Ltd.; Chevron Energy Technology Company; EniTecnologie S.p.A. Geo-Hydrophysical modeling software Microsoft Home Energy Saver software distribution Kalinex Colorimetric bioassay

214

Utah Department of Health Bureau of Health Facility Licensing, Certification and Resident Assessment  

E-Print Network (OSTI)

Utah Department of Health Bureau of Health Facility Licensing, Certification and Resident of Utah Rule R432-31 (http://health.utah.gov/hflcra/forms.php) This is a physician order sheet based be effectively managed at current setting. ___ Limited additional interventions: Includes care above. May also

Tipple, Brett

215

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EMC AutoStart Technical Info EMC Support Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code T-639:...

216

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-052:...

217

DEPARTMENT OF ENERGY NONEXCLUSIVE PATENT LICENSE APPLICATION  

Energy.gov (U.S. Department of Energy (DOE))

It is the policy of the U.S. Department of Energy (DOE) to accord licensed on DOE-owned patents applications in appropriate circumstances to applicants with satisfactory plans for development and...

218

Non -commercial License 1. INTENT/PURPOSE  

E-Print Network (OSTI)

licensee to commercialize the software or any derivative work of the software. 8. FEE/ROYALTY Licensee pays no royalty for non-commercial license Licensee and any third parties must enter a new agreement

Barthe, Loïc

219

Argument licensing and agreement in Zulu  

E-Print Network (OSTI)

In this thesis, I examine some core grammatical phenomena - case licensing, agreement, the EPP - through the lens of the Bantu language Zulu. Zulu has a number of remarkable and puzzling properties whose analysis affords ...

Halpert, Claire

2012-01-01T23:59:59.000Z

220

Consumption and meanings of team licensed merchandise  

Science Journals Connector (OSTI)

This study examined the motives driving the purchase of team licensed merchandise and the meanings embedded in those products. Data from 135 attendees at two National Football League (USA) games revealed that the primary motives for the display of team licensed merchandise were fans' desire to publicly show their affiliation with the team and to express their support for the organisation, while the need to belong in the group of team supporters was also a strong motive. Furthermore, study participants overwhelmingly attached symbolic meanings to their possessions, emphasising social relationships and connectedness as well as elements of personal history. To a lesser extent, experiential meanings were attached to team licensed products. This study makes original contributions to the relatively narrow in scope research on sport licensing by exploring the functional, experiential and symbolic meanings that create value for those products and for their owners.

Artemisia Apostolopoulou; Dimitra Papadimitriou; David Synowka; John S. Clark

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Alternative Fuels Data Center: Biodiesel Distributor License and  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Distributor Distributor License and Recordkeeping Requirements to someone by E-mail Share Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Facebook Tweet about Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Twitter Bookmark Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Google Bookmark Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Delicious Rank Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on Digg Find More places to share Alternative Fuels Data Center: Biodiesel Distributor License and Recordkeeping Requirements on AddThis.com... More in this section...

222

Solar Hot Water Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hot Water Contractor Licensing Hot Water Contractor Licensing Solar Hot Water Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Arkansas Program Type Solar/Wind Contractor Licensing Arkansas offers several limited, specialty licenses for solar thermal installers under the general plumbing license. There are three specialty classifications available for solar thermal installers: a Restricted Solar Mechanic license, a Supervising Solar Mechanic license, and a Solar Mechanic Trainee classification. Installers with a Restricted Solar Mechanic license can install and maintain systems used to heat domestic hot water, but are not allowed to perform any other plumbing work. Individuals holding a Supervising Solar Mechanic license are able to supervise, install

223

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

224

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

225

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

226

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

227

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

228

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

229

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

230

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

231

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

232

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

233

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

234

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

235

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

236

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

237

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

238

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

239

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

240

management  

National Nuclear Security Administration (NNSA)

5%2A en Management and Budget http:nnsa.energy.govaboutusouroperationsmanagementandbudget

P...

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

The Brazilian Audit Tribunal's role in improving the federal environmental licensing process  

SciTech Connect

This article describes the role played by the Brazilian Audit Tribunal (Tribunal de Contas da Uniao - TCU) in the external auditing of environmental management in Brazil, highlighting the findings of an operational audit conducted in 2007 of the federal environmental licensing process. Initially, it records the constitutional and legal framework of Brazilian environmental licensing, describing the powers and duties granted to federal, state and municipal institutions. In addition, it presents the responsibilities of the TCU in the environmental area, comparing these with those of other Supreme Audit Institutions (SAI) that are members of the International Organization of Supreme Audit Institutions (INTOSAI). It also describes the work carried out in the operational audit of the Brazilian environmental licensing process and its main conclusions and recommendations. Finally, it draws a parallel between the findings and recommendations made in Brazil with those of academic studies and audits conducted in other countries.

Lima, Luiz Henrique, E-mail: luizhlima@terra.com.b [Rio de Janeiro Federal University, Alberto Luiz Coimbra Postgraduate Institute of Engineering Research, Energy Planning Program (Brazil); Magrini, Alessandra, E-mail: ale@ppe.ufrj.b [Rio de Janeiro Federal University, Alberto Luiz Coimbra Postgraduate Institute of Engineering Research, Energy Planning Program (Brazil); Centro de Tecnologia - Bloco C Sala 211, Ilha do Fundao, 21949-900 - Rio de Janeiro, Caixa-Postal: 68565, RJ (Brazil)

2010-02-15T23:59:59.000Z

242

Alternative Fuels Data Center: Natural Gas and Propane Retailer License  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

Retailer License to someone by E-mail Retailer License to someone by E-mail Share Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Facebook Tweet about Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Twitter Bookmark Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Google Bookmark Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Delicious Rank Alternative Fuels Data Center: Natural Gas and Propane Retailer License on Digg Find More places to share Alternative Fuels Data Center: Natural Gas and Propane Retailer License on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Natural Gas and Propane Retailer License Compressed natural gas, liquefied natural gas, or liquefied petroleum gas

243

License for the Konrad Deep Geological Repository  

SciTech Connect

Deep geological disposal of long-lived radioactive waste is currently considered a major challenge. Until present, only three deep geological disposal facilities have worldwide been operated: the Asse experimental repository (1967-1978) and the Morsleben repository (1971-1998) in Germany as well as the Waste Isolation Pilot Plant (WIPP) in the USA (1999 to present). Recently, the licensing procedure for the fourth such facility, the German Konrad repository, ended with a positive ''Planfeststellung'' (plan approval). With its plan approval decision, the licensing authority, the Ministry of the Environment of the state of Lower Saxony, approved the single license needed pursuant to German law to construct, operate, and later close down this facility.

Biurrun, E.; Hartje, B.

2003-02-24T23:59:59.000Z

244

ENVIRONMENTAL ASSESSMENT FOR HYDROPOWER PILOT PROJECT LICENSE  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

FOR HYDROPOWER PILOT PROJECT LICENSE Admiralty Inlet Pilot Tidal Project-FERC Project No. 12690-005 (DOE/EA-1949) Washington Federal Energy Regulatory Commission Office of Energy Projects Division of Hydropower Licensing 888 First Street, NE Washington, DC 20426 U.S. Department of Energy Office of Energy Efficiency and Renewable Energy 1617 Cole Boulevard Golden, Colorado 80401 January 15, 2013 20130115-3035 FERC PDF (Unofficial) 01/15/2013 i TABLE OF CONTENTS LIST OF FIGURES ............................................................................................................ iv LIST OF TABLES............................................................................................................... v EXECUTIVE SUMMARY ................................................................................................

245

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

246

Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising  

Energy.gov (U.S. Department of Energy (DOE))

The number of vehicles in operation per licensed driver has risen steadily since 1950. In 1985, for the first time, there was one vehicle for every licensed driver. Since 1985, the number of...

247

Alternative Fuels Data Center: License Exemptions for Biodiesel Production  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

License Exemptions for License Exemptions for Biodiesel Production for Personal Use to someone by E-mail Share Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Facebook Tweet about Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Twitter Bookmark Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Google Bookmark Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Delicious Rank Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on Digg Find More places to share Alternative Fuels Data Center: License Exemptions for Biodiesel Production for Personal Use on AddThis.com...

248

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

249

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

250

NASA Partners License Nanotube Technology for Commercial Use...  

NLE Websites -- All DOE Office Websites (Extended Search)

prnewswire.comnews-releasesnasa-partners-license-nanotube-technology-for-commercial-use-149724205.html Submitted: Monday, April 3...

251

Total System Performance Assessment - License Application Methods and Approach  

SciTech Connect

''Total System Performance Assessment-License Application (TSPA-LA) Methods and Approach'' provides the top-level method and approach for conducting the TSPA-LA model development and analyses. The method and approach is responsive to the criteria set forth in Total System Performance Assessment Integration (TSPAI) Key Technical Issues (KTIs) identified in agreements with the U.S. Nuclear Regulatory Commission, the ''Yucca Mountain Review Plan'' (YMRP), ''Final Report'' (NRC 2003 [163274]), and the NRC final rule 10 CFR Part 63 (NRC 2002 [156605]). This introductory section provides an overview of the TSPA-LA, the projected TSPA-LA documentation structure, and the goals of the document. It also provides a brief discussion of the regulatory framework, the approach to risk management of the development and analysis of the model, and the overall organization of the document. The section closes with some important conventions that are used in this document.

J. McNeish

2003-12-08T23:59:59.000Z

252

44 CAB International 2011. Urban Pest Management: An Environmental Perspective (ed. P. Dhang)  

E-Print Network (OSTI)

environmental impact than pesticide driven programmes. This chapter discusses the use of `low- impact' tools and methods. Also, a community-wide programme for effective bed bug management in society is explained apartment complexes occupied by low-income people in New Jersey found that 5% of all of the housing units

Wang, Changlu

253

Software License Agreement | Scientific and Technical Information Program  

Office of Scientific and Technical Information (OSTI)

License Agreement License Agreement Print page Print page Email page Email page U.S. Department of Energy Office of Scientific and Technical Information Energy Science and Technology Software Center As the Office of Scientific and Technical Information's (OSTI) Energy Science and Technology Software Center (ESTSC), we are authorized to license and distribute this software to you. Upon receipt of license fee and execution of this license, the herein identified computer software package (software and accompanying documentation) is licensed, on a non-exclusive basis, to the UNDERSIGNED for use ONLY at the site designated herein below, and is to be used in accordance with this license and with the special restrictions identified below or on the software package. DOE-funded modifications, enhancements, or conversions of this

254

TO :Lyall E. Johnson, Chief Licensing Branch  

Office of Legacy Management (LM)

Lyall E. Johnson, Chief Lyall E. Johnson, Chief Licensing Branch ,,,_ i-.. FROM :Clifford K. Beck, Chief q q+. ., ,,/,j !i-/ I, v' Hazards Evaluation Branch ,: s~~p:~LLItma0~7c ~HEI-IICAL wows We have reviewed the letter of December 10, 1958, from Mallinckrodt Chemical Works, requesting amendment of License No. SNM-33 to permit pelleting operations on uranium enriched to 5% U-235 in a new facility at Hematite, Missouri. Batch sizes throughout the operations will not exceed limited safe masses as specified in Report K-1019, Part 4 (Deleted). Neither the diameter nor capacity of the storage hopper located above the feed hopper of the pelleting press is given. Either the diameter should be not over the limited safe dimension or positive means should be in effect to insure against more than a limited safe m&s in the

255

DOE NETL Intellectual Property Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

18.12 18.12 DOE NETL Intellectual Property Available for Licensing Complete marketing summaries of the following technologies will be posted on the NETL Available Technologies page shortly. For additional information or to submit a license application, please contact techtransfer@netl.doe.gov. Technology Title and Brief Description Intellectual Property Status Metal oxide promoters for improving the reactivity and capacity of oxygen carriers for the chemical looping combustion process This invention provides an oxygen carrier comprised of a plurality of metal oxide particles in contact with a plurality of MgO promoter particles. The MgO promoter particles increase the reaction rate and oxygen utilization of the metal oxide when contacting with a gaseous hydrocarbon at a temperature greater than

256

Licensing : BioEnergy Science Center  

NLE Websites -- All DOE Office Websites (Extended Search)

Available for Licensing Available for Licensing As new inventions are disclosed from BESC researchers, we will post information about the inventions on this webpage. Use the search engine below to match your technology needs with BESC disclosures or view all technologies in a particular category by clicking on the category below. View all inventions Enter keywords in the box. Separate the words with a comma (,) for multiple keywords. GO Advanced Biofuels (1 Inventions) Bioconversion (2 Inventions) Biomass Grasses (7 Inventions) Trees (1 Inventions) Genetic Tools (9 Inventions) Biotechnology (9 Inventions) Imaging (2 Inventions) PreTreatment (2 Inventions) Adams, Michael A (2 Inventions) Albersheim, Ivana G. (1 Invention) Backe, Jason (1 Invention) Bar-Peled, Maor (1 Invention) Bhave, Ramesh R (2 Inventions)

257

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

258

License Application Design Selection Report, REV 01. August 1999  

SciTech Connect

In December 1998, the U.S. Department of Energy (DOE) published the ''Viability Assessment of a Repository at Yucca Mountain'' (DOE 1998b). The Viability Assessment described a preliminary design of a potential repository at Yucca Mountain, Nevada, for disposal of spent nuclear fuel and high-level radioactive waste, and assessed the probable behavior of that repository design in the Yucca Mountain geologic setting. The report concluded that 'Yucca Mountain remains a promising site for a geologic repository and that work should proceed to support a decision in 2001 on whether to recommend the site to the President for development as a repository'. It also concluded that 'uncertainties remain about key natural processes, the preliminary design, and how the site and design would interact'. Recognizing that the design that was evaluated will be refined before a license application could be submitted, the Viability Aassesment notes that 'DOE is evaluating several design options and alternatives that could reduce existing uncertainty and improve the performance of the repository system'. During the preparation of the Viability Assessment, DOE asked the contractor for the Civilian Radioactive Waste Management Program to study alternative design concepts for a potential geologic repository for high-level radioactive waste at Yucca Mountain. The License Application Design Selection (LADS) project was initiated to conduct that study. The goal of the project was to develop and evaluate a diverse range of conceptual repository designs that work well in concert with the Yucca Mountain site and to recommend an initial design concept for the possible Site Recommendation and License Apllication. This report presents the results of the LADS project. The design process consisted of two phases. In Phase I, a series of basic design concepts (design alternatives) and components (design features) were analyzed for their potential value as elements of a repository design. In Phase II, these enhanced design alternatives were refined, screened for accepatable postclosure performance, and evaluated against a set of criteria addressing four broad aspects of the repository: performance demonstrability; flexibility; construction, operations and maintenance; and cost. Based on this evaluation, a conceptual design was recommended to DOE and could be characterized as a low thermal impact design. Included in the report is more in depth information regarding the basis of the recommendation, performance issues, benefits related to reduced uncertainties, construction/operational benefits, technical and programmatic flexibilty and cost impacts.

Hastings, C.R.

1999-08-30T23:59:59.000Z

259

Nuclear Regulatory Commission Regulatory and Licensing Matters | Department  

NLE Websites -- All DOE Office Websites (Extended Search)

Regulatory Commission Regulatory and Licensing Matters Regulatory Commission Regulatory and Licensing Matters Nuclear Regulatory Commission Regulatory and Licensing Matters GC-52 provides legal advice to DOE regarding Nuclear Regulatory Commission (NRC) regulatory and licensing matters of interest to DOE, either as an NRC license applicant or in connection with related authorities and responsibilities of DOE and NRC on nuclear material, nuclear waste, and nuclear nonproliferation matters. GC-52 attorneys provide advice and support on a variety of NRC matters including regulation and licensing of DOE independent spent fuel storage facilities (ISFSIs) and a mixed-oxide fuel fabrication facility, consultation with NRC on certain DOE waste determinations, and imports and exports of nuclear materials and radioactive sealed sources.

260

Patents Licensing and Patent Waivers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Patents Licensing and Patent Waivers Patents Licensing and Patent Waivers Patents Licensing and Patent Waivers Patent Licensing The DOE Invention Licensing Program provides information on licensing of DOE-owned inventions. Patent Waivers Patent Rights - Waiver Clause: This clause makes modifications to the Patent Rights clause of 48 C.F.R. 52.227-12 and should replace that clause in the contract when an advance waiver is granted. Petition form for advance waiver (PDF) to contractor of Government's title to inventions that may be made under a Government contract [42 U.S.C. 5908] [10 C.F.R. Part 784]. Petition form for waiver (PDF) to contractor of Government's title to an identified invention already made under a Government contract [42 U.S.C. 5908] [10 C.F.R. Part 784]. Patent Waiver Decisions:

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

City of Dubuque - Solar Thermal Licensing Requirement | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

City of Dubuque - Solar Thermal Licensing Requirement City of Dubuque - Solar Thermal Licensing Requirement City of Dubuque - Solar Thermal Licensing Requirement < Back Eligibility Construction Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Iowa Program Type Solar/Wind Contractor Licensing Provider City of Dubuque The City of Dubuque requires a Solar Thermal License in order for a person to install a solar thermal project on a home or business. The requirement does not apply to solar photovoltaics. The licensing requirement can be met one of two ways. An installer may be Solar Thermal Certified by the North American Board of Certified Energy Practitioners (NABCEP) or An installer may complete the Northeast Iowa Community College Solar Thermal Training Installers are also required to obtain a permit before altering or

262

City of Madison - Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of Madison - Contractor Licensing of Madison - Contractor Licensing City of Madison - Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Water Heating Program Info State Wisconsin Program Type Solar/Wind Contractor Licensing Provider City of Madison Although the State of Wisconsin does not have any specific laws for contractors dealing with renewable energy, the City of Madison has issued rules for contractor licensing and equipment standards for solar thermal installations. In the City's Heating, Ventilating and Air Conditioning Code is a requirement for a Class A-4 license for "a person desiring to enter into the business of installing, altering or repairing active solar heating equipment" as well as fee and examination details. As a result of a

263

NEXT GENERATION NUCLEAR PLANT LICENSING BASIS EVENT SELECTION WHITE PAPER  

SciTech Connect

The Next Generation Nuclear Plant (NGNP) will be a licensed commercial high temperature gas-cooled reactor (HTGR) plant capable of producing the electricity and high temperature process heat for industrial markets supporting a range of end-user applications. The NGNP Project has adopted the 10 CFR 52 Combined License (COL) application process, as recommended in the Report to Congress, dated August 2008, as the foundation for the NGNP licensing strategy. NRC licensing of the NGNP plant utilizing this process will demonstrate the efficacy of licensing future HTGRs for commercial industrial applications. This white paper is one in a series of submittals that will address key generic issues of the COL priority licensing topics as part of the process for establishing HTGR regulatory requirements.

Mark Holbrook

2010-09-01T23:59:59.000Z

264

Pilgrim Nuclear Power Station Docket No. 50-293 License No. DPR-35 Pilgrim Nuclear Power Station (PNPS) License Renewal Application  

E-Print Network (OSTI)

information that supplemented the LRA as a result of operating experience (OE) and industry activities potentially relevant to aging management in several specific areas. This letter provides further clarification of that supplemental information to the LRA specific to the following areas which Entergy agreed to evaluate based upon communications with the NRC technical staff. 1. Aging management of neutron-absorbing materialsEntergy Nuclear Operations, Inc. Letter Number: 2.11.017 Pilgrim Nuclear Power Station Page 2 2. Inspection of buried pipe and tanks 3. Aging management of low voltage cables 4. Inspection of containment coatings 5. Metal fatigue NUREG/CR-6260 A new regulatory commitment is provided in the PNPS License Renewal Commitment List as

Stephen J. Bethay

2011-01-01T23:59:59.000Z

265

2013 Licensed Professional's Guide to the ENERGY STAR Label for Commercial Buldings  

NLE Websites -- All DOE Office Websites (Extended Search)

The Licensed Professional's Guide: Understanding the Roles and Requirements for Verifying Commercial Building Applications for ENERGY STAR Certification Contents Introduction 1 Verifying the Data Checklist 6 Verifying the Statement of Energy Performance 21 Verifying the Indoor Environmental Conditions 23 Appendix A: Sample Applications for ENERGY STAR Certification 27 Appendix B: Steps to Correct Information on the Data Checklist and Statement of Energy Performance 33 The Licensed Professional's Guide 1 Introduction Energy use in commercial buildings accounts for nearly 20 percent of U.S. greenhouse gas emissions at a cost of more than $100 billion per year. Through ENERGY STAR, the United States Environmental Protection Agency (EPA) works with owners and managers of our nation's

266

Argonne, Evigia finalize licensing agreement for next-gen RFID...  

NLE Websites -- All DOE Office Websites (Extended Search)

See related New RFID technology tracks and monitors nuclear materials Argonne, Evigia finalize licensing agreement for next-gen RFID sensor technology By Angela Hardin * July 16,...

267

LG Chem, Argonne sign licensing deal to make, commercialize advanced...  

NLE Websites -- All DOE Office Websites (Extended Search)

LG Chem, Argonne sign licensing deal to make, commercialize advanced battery material By Angela Hardin * January 6, 2011 Tweet EmailPrint Patented cathode technology will help...

268

Transformative Learning Experiences of Oklahoma Child Care Licensing Specialists.  

E-Print Network (OSTI)

??The purpose of this study was to understand and describe the transformational educational experiences of Oklahoma child care licensing workers who are currently or were (more)

Averill, Sherry Gale

2006-01-01T23:59:59.000Z

269

Vorbeck Materials Licenses Graphene-based Battery Technologies...  

NLE Websites -- All DOE Office Websites (Extended Search)

America Energy Storage Energy Storage Return to Search Vorbeck Materials Licenses Graphene-based Battery Technologies Pacific Northwest National Laboratory Testing materials in...

270

Electric Grid - Forecasting system licensed | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Electric Grid - Forecasting system licensed Location Based Technologies has signed an agreement to integrate and market an Oak Ridge National Laboratory technology that provides...

271

Sci Protek Signs Licensing Deal for Technology that Reduces Plant...  

NLE Websites -- All DOE Office Websites (Extended Search)

entered into an Inter-Institutional Agreement for licensing, patent prosecution, and royalty sharing. Based in Visalia, CA, Sci Protek, Inc. is a global leader in innovative and...

272

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

273

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

274

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

275

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

276

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

277

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

278

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers  

E-Print Network (OSTI)

Cognitive Single Carrier Systems: Joint Impact of Multiple Licensed Transceivers Kyeong Jin Kim of interference from multiple licensed transceivers on cognitive underlay single carrier systems is examined, and 3) interference power from the primary transmitters. For this cognitive underlay single carrier

Elkashlan, Maged

279

DOE Announces Yucca Mountain License Application Schedule | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Yucca Mountain License Application Schedule Yucca Mountain License Application Schedule DOE Announces Yucca Mountain License Application Schedule July 19, 2006 - 3:13pm Addthis New Director Ward Sproat Testifies on Revised Timeline WASHINGTON, DC - The Department of Energy (DOE) today announced that it will submit a license application to the Nuclear Regulatory Commission (NRC) for a nuclear waste repository at Yucca Mountain, Nevada, no later than June 30, 2008. The Department also announced that if requested legislative changes are enacted, the repository will be able to accept spent nuclear fuel and high-level waste starting in early 2017. Announcing a schedule for submitting a license application is another step in the Department's mission to provide stability, clarity and predictability in moving the Yucca Mountain Project forward as quickly as

280

Solar and Wind Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar and Wind Contractor Licensing Solar and Wind Contractor Licensing Solar and Wind Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Commercial Heating & Cooling Solar Heating Buying & Making Electricity Water Heating Wind Program Info State Connecticut Program Type Solar/Wind Contractor Licensing Provider Connecticut Department of Consumer Protection The Connecticut Department of Consumer Protection (DCP) is authorized to issue licenses for solar-thermal work, solar-electric work and wind-electric work. "Solar thermal work" is defined as "the installation, erection, repair, replacement, alteration, or maintenance of active, passive and hybrid solar systems that directly convert ambient energy into heat or convey, store or distribute such ambient energy." Solar electricity

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Los Alamos National Laboratory announces Express Licensing program  

NLE Websites -- All DOE Office Websites (Extended Search)

LANL announces Express Licensing program LANL announces Express Licensing program Los Alamos National Laboratory announces Express Licensing program With the launch of a new "Express Licensing" program, access to innovative technology invented at Los Alamos National Laboratory has gotten easier. August 1, 2013 The following sequence shows the formation of nanoFOAM technology developed at Los Alamos National Laboratory. NanoFOAMs are self-supporting nanoporous metal foams that have potential applications in oil-refining processes, filtration of liquid or airborne germs, rocket fuels or catalytic production of a range of products from ammonia to plastics. NanoFOAM is just one of many licensable technologies available at Los Alamos National Laboratory. The following sequence shows the formation of nanoFOAM technology developed

282

Successful Clean Coal Technology Licensed for Commercial Application |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Successful Clean Coal Technology Licensed for Commercial Successful Clean Coal Technology Licensed for Commercial Application Successful Clean Coal Technology Licensed for Commercial Application July 26, 2010 - 1:00pm Addthis Washington, DC - The U.S. Department of Energy (DOE) has received the first installment from a repayment agreement for the Liquid Phase Methanol (LPMEOH™) Process. A royalty license issued for the advanced methanol production system underscores the clean coal technology's presence in the commercial market. The DOE-funded LPMEOH Process, developed in collaboration with Air Products and Chemicals Inc., has been licensed to Woodland Biofuel Inc., who intends to use the technology to develop a wood-gasification process to produce methanol from wood-scrap. The first facility is planned in New York State.

283

20 - Licensing for nuclear power plant siting, construction and operation  

Science Journals Connector (OSTI)

Abstract: This chapter addresses the need for licensing of nuclear power plants, and how such licenses can be requested by an applicant and granted by a regulatory authority. The licensing process is country dependent, although based on the common principle that the applicant must demonstrate that the proposed nuclear power plant will comply with the established regulations, and that it will operate safely without undue risks to the health and safety of plant personnel, the population and the environment. During the construction and operational phases the regulatory authority ensures compliance with the the license conditions through evaluation, monitoring and inspection. The license may be a single document covering all the phases in the life of the plant, or a set of consecutive documents requested and issued for different phases, which may include design certification, site approval, design and construction, commissioning and operation, design changes during operation, life extension and, finally, decommissioning.

A. Alonso; S.K. Sharma; D.F. Torgerson

2012-01-01T23:59:59.000Z

284

Non-Power Reactor Operator Licensing Examiner Standards. Revision 1  

SciTech Connect

The Non-Power Reactor Operator Licensing Examiner Standards provide policy and guidance to NRC examiners and establish the procedures and practices for examining and licensing of applicants for NRC operator licenses pursuant to Part 55 of Title 10 of the Code of Federal Regulations (10 CFR 55). They are intended to assist NRC examiners and facility licensees to understand the examination process better and to provide for equitable and consistent administration of examinations to all applicants by NRC examiners. These standards are not a substitute for the operator licensing regulations and are subject to revision or other internal operator examination licensing policy changes. As appropriate, these standards will be revised periodically to accommodate comments and reflect new information or experience.

NONE

1995-06-01T23:59:59.000Z

285

Solar Hot Water Contractor Licensing | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Solar Hot Water Contractor Licensing Solar Hot Water Contractor Licensing Solar Hot Water Contractor Licensing < Back Eligibility Installer/Contractor Savings Category Heating & Cooling Solar Water Heating Program Info State Maine Program Type Solar/Wind Contractor Licensing In order to be eligible for Maine's solar thermal rebate program, systems must be installed by licensed plumbers who have received additional certification for solar thermal systems from the North American Board of Certified Energy Practitioners (NABCEP). The state solar thermal rebate program maintains a list of Efficiency Maine registered vendors/installers. In addition, Efficiency Maine has information for vendors interested in becoming registered and listed on the [http://www.efficiencymaine.com/at-home/registered-vendor-locator web

286

MATLAB muliplatform research license: Numeric computation, advanced graphics and visualization, and a high-level programming  

E-Print Network (OSTI)

MATLAB muliplatform research license: Numeric computation, advanced graphics and visualization license allows research and includes the following: Feature # of users MATLAB 7 Simulink 6 Control System

Dawson, Jeff W.

287

Licensing and {open_quotes}CRADA`s{close_quotes} in Oak Ridge technology transfer  

SciTech Connect

In the belief that effective technology transfer is a ``contact sport,`` Martin Marietta Energy Systems (Energy Systems), the Department of Energy`s (DOE`s) management contractor in Oak Ridge, Tennessee, encourages its research and engineering employees to directly interact with their commercial-sector counterparts. Over the years, relationships which have been initiated through such technical interactions have led to many of the patent licenses ad cooperative research and development agreements (CRADAs) which currently exist among Energy Systems, US companies, universities, and industrial consortia. The responsibility for creating and implementing Energy Systems policies and procedures to accomplish DOE`s technology transfer objectives in Oak Ridge lies with the Office of Technology Transfer (OTT). In addition, licensing executives within OTT are responsible for negotiating the terms and conditions of patent licenses and CRADAs for the commercialization of government-funded technologies and research expertise. Other technology transfer initiatives in Oak Ridge help companies in a wide range of industries overcome manufacturing obstacles, enabling them to retain existing jobs and to create new business opportunities.

Prosser, G.A.

1993-10-01T23:59:59.000Z

288

Document: P1289 Category: Computing Technologies License Status: Available for licensing Texas Industry Cluster: Information and Computer Technology  

E-Print Network (OSTI)

controls · Interactive systems, such as bio-electrical prosthetics interfaces and real-time translationalInventors Document: P1289 Category: Computing Technologies License Status: Available for licensing By rethinking the design of an analog integrator, the system allows for processing of analog signals without

Lightsey, Glenn

289

Patent Protection and Licensing Procedure | BNL Technology  

NLE Websites -- All DOE Office Websites (Extended Search)

BNL Inventors BNL Inventors Patent Protection and Licensing Procedure TCP Staff Assignment - Invention Disclosures received by Intellectual Property Legal Group (IPLG) will be given a BNL number, and assigned to a specific TCP staff member for commercial assessment. Henceforth, the assigned staff member will be responsible for all commercialization actions relating to the docket. Assessment - The TCP staff member assigned to the docket will meet with the inventor(s). Together they will discuss the invention and make a preliminary evaluation of potential applications and possible markets. Based on commercial assessment and a preliminary novelty determination, the TCP staff will make a recommendation to the IPLG whether to patent the invention. The TCP's decision and relevant documents will be circulated

290

Clean Fractionation: Technology Available for Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Clean Fractionation Clean Fractionation National Renewable Energy Laboratory 1617 Cole Boulevard, Golden, Colorado 80401-3393 303-275-3000 * www.nrel.gov NREL is a national laboratory of the U.S. Department of Energy Offi ce of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. NREL/FS-7A1-43959 * October 2008 Printed with a renewable-source ink on paper containing at least 50% wastepaper, including 10% postconsumer waste. You'll find more technologies available for licensing on the NREL Technology Transfer Web site at www.nrel.gov/technologytransfer/. National Renewable Energy Laboratory Innovation for Our Energy Future Biorefinery production costs are driven Insolubles Wash Cellulose pulp Lignocellulosic feedstock Solubles

291

Combined Construction and Operating License (COL)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3 3 Updates available at: http://www.nuclear.gov NEXT UPDATE - April 2013 Page 1 News Updates  On October 22 Dominion Resources Inc. announced that it would close and decommission its Kewaunee Power Station located in Carlton, Wis. after failing to find a buyer for the plant. The company said that the plant closure was a purely economic decision resulting from low projected wholesale electricity prices. Power production will cease in the second quarter of 2013.  On November 20, 2012, the Department of Energy announced that it had selected the Generation mPower team as a recipient for Government cost-shared funding as part of its Small Modular Reactor Licensing Technical Support program. The Department also announced plans to issue a

292

TEAM 1 Drivers License.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

I I Core Status: new users must complete 2 training sessions and pass a sample exchange exam to work independently during Core sessions (regular work hours). Flex Status: core users must complete 5 Core sessions and pass a driving test to work during Flex sessions (evening and weekend hours). All TEAM I scheduling must be coordinated through Peter Ercius at PErcius@lbl.gov. You may only be assigned two sessions per month. CORE LICENSE TEST Safety  Understand emergency shutdown procedure  Understand potential X-ray hazards of the modified instrument and shielding  Read and understand the Low Dose Machine Authorization document  Recognize high voltage hazards with the TEAM stage  Demonstrate handling of column valves  Point out where emergency contact numbers are posted

293

Become an Energy Management Professional  

Energy.gov (U.S. Department of Energy (DOE))

Professional training and certification opportunities are available for individuals who want to guide ISO 50001 and Superior Energy Performance (SEP) implementation, or verify SEP improvements in energy performance. Industrial facilities may hire a professional or develop the expertise in house. The Institute for Energy Management Professionals is the only body licensed by the American National Standards Institute to certify individuals for Certified Practitioner in Energy Management Systems, SEP Lead Auditor, and SEP Performance Verifier.

294

Property:Permit/License Buildout (MW) | Open Energy Information  

Open Energy Info (EERE)

Permit/License Buildout (MW) Permit/License Buildout (MW) Jump to: navigation, search Property Name Permit/License Buildout (MW) Property Type String Pages using the property "Permit/License Buildout (MW)" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/40MW Lewis project + 40 + MHK Projects/Algiers Light Project + 20 + MHK Projects/Anconia Point Project + 15 + MHK Projects/Ashley Point Project + 148 + MHK Projects/Avalon Tidal + 30 + MHK Projects/Avondale Bend Project + 18 + MHK Projects/BW2 Tidal + 3 + MHK Projects/Bar Field Bend + 94 + MHK Projects/Barfield Point + 114 + MHK Projects/Bayou Latenache + 50 + MHK Projects/Bondurant Chute + 152 + MHK Projects/Breeze Point + 198 + MHK Projects/Brilliant Point Project + 56 + MHK Projects/Brough Head Wave Farm + 200 +

295

Nuclear Power 2010 Program: Combined Construction and Operating License &  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Power 2010 Program: Combined Construction and Operating Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report The Nuclear Power 2010 (NP 2010) Construction and Operating License/Design Certification (COL/DC) Demonstration program together with the financial incentives provided by the Energy Policy Act of 2005 are the two primary reasons why a number of license applications for new nuclear construction are before the NRC today, and why the first new nuclear plants in over 30 years are under construction in the United States. As with all significant endeavors, there are lessons to be learned from the

296

Photovoltaics at DOE's National Renewable Energy Laboratory License  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SOLAR ROOF-TOP LICENSE AGREEMENT KEY TERMS SOLAR ROOF-TOP LICENSE AGREEMENT KEY TERMS (Non-Recordable) FOR INSTALLATION AND OPERATION OF A SOLAR ROOF-TOP ELECTRIC GENERATING SYSTEM AT THE NATIONAL RENEWABLE ENERGY LABORATORY, RESEARCH SUPPORT FACILITY United States of America Department of Energy Office of Energy Efficiency and Renewable Energy Golden Field Office THIS LICENSE AGREEMENT (License) is made as of the _____ day of August, 2009, by the UNITED STATES OF AMERICA, Department of Energy, Office of Energy Efficiency and Renewable Energy, Golden Field Office, hereinafter referred to as LICENSOR, and SunEdison Origination1, LLC, hereinafter referred to as LICENSEE. WHEREAS, the LICENSOR owns certain buildings located at the National Renewable Energy Laboratory (NREL) and in particular, [____________________] the address of which

297

Photovoltaics at DOE's National Renewable Energy Laboratory License  

NLE Websites -- All DOE Office Websites (Extended Search)

ROOF-TOP LICENSE AGREEMENT KEY TERMS ROOF-TOP LICENSE AGREEMENT KEY TERMS (Non-Recordable) FOR INSTALLATION AND OPERATION OF A SOLAR ROOF-TOP ELECTRIC GENERATING SYSTEM AT THE NATIONAL RENEWABLE ENERGY LABORATORY, RESEARCH SUPPORT FACILITY United States of America Department of Energy Office of Energy Efficiency and Renewable Energy Golden Field Office THIS LICENSE AGREEMENT (License) is made as of the _____ day of August, 2009, by the UNITED STATES OF AMERICA, Department of Energy, Office of Energy Efficiency and Renewable Energy, Golden Field Office, hereinafter referred to as LICENSOR, and SunEdison Origination1, LLC, hereinafter referred to as LICENSEE. WHEREAS, the LICENSOR owns certain buildings located at the National Renewable Energy Laboratory (NREL) and in particular, [____________________] the address of which

298

ECOdriving - Widespread Implementation for Learner Drivers and Licensed  

Open Energy Info (EERE)

ECOdriving - Widespread Implementation for Learner Drivers and Licensed ECOdriving - Widespread Implementation for Learner Drivers and Licensed Drivers (ECOWILL) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: ECOdriving - Widespread Implementation for Learner Drivers and Licensed Drivers (ECOWILL) Agency/Company /Organization: Austrian Energy Agency Focus Area: Fuels & Efficiency Topics: Best Practices Website: www.ecodrive.org/ The ECOWILL project aims to reduce carbon emissions by up to 8 Mt until 2015 by boosting the application of eco-driving across Europe. The project will roll out training programs for licensed drivers in 13 European countries. ECOWILL also promotes the education of eco-driving for learner drivers. This website provides information about eco-driving, including country-specific activities.

299

Nuclear Power 2010 Program: Combined Construction and Operating License &  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Power 2010 Program: Combined Construction and Operating Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report Nuclear Power 2010 Program: Combined Construction and Operating License & Design Certification Demonstration Projects Lessons Learned Report The Nuclear Power 2010 (NP 2010) Construction and Operating License/Design Certification (COL/DC) Demonstration program together with the financial incentives provided by the Energy Policy Act of 2005 are the two primary reasons why a number of license applications for new nuclear construction are before the NRC today, and why the first new nuclear plants in over 30 years are under construction in the United States. As with all significant endeavors, there are lessons to be learned from the

300

DOE Marks Milestone in Submitting Yucca Mountain License Application |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Marks Milestone in Submitting Yucca Mountain License Marks Milestone in Submitting Yucca Mountain License Application DOE Marks Milestone in Submitting Yucca Mountain License Application June 3, 2008 - 12:51pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced submittal of a license application (LA) to the U.S. Nuclear Regulatory Commission (NRC) seeking authorization to construct America's first repository for spent nuclear fuel and high-level radioactive waste at Yucca Mountain, Nevada. The 8,600 page application describes DOE's plan to safely isolate spent nuclear fuel and high-level radioactive waste in tunnels deep underground at Yucca Mountain, a remote ridge on federally controlled land in the Mojave Desert 90 miles northwest of Las Vegas. Currently, the waste is stored at 121 temporary locations in 39 states

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

DOE Signs Advanced Enrichment Technology License and Facility Lease |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advanced Enrichment Technology License and Facility Lease Advanced Enrichment Technology License and Facility Lease DOE Signs Advanced Enrichment Technology License and Facility Lease December 8, 2006 - 9:34am Addthis Announces Agreements with USEC Enabling Deployment of Advanced Domestic Technology for Uranium Enrichment WASHINGTON, DC - U.S. Secretary of Energy Samuel W. Bodman today announced the signing of a lease agreement with the United States Enrichment Corporation, Inc. (USEC) for their use of the Department's gas centrifuge enrichment plant (GCEP) facilities in Piketon, OH for their American Centrifuge Plant. The Department of Energy (DOE) also granted a non-exclusive patent license to USEC for use of DOE's centrifuge technology for uranium enrichment at the plant, which will initiate the first successful deployment of advanced domestic enrichment technology in the

302

ENERGY COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE  

Office of Legacy Management (LM)

COMMISSION COMMISSION APPL.lCATION FOR SOURCE MATERIAL LICENSE Pursuant to the rcgu!ations in Title 10, Code of Federal Regulations, Chapter 1, Part 40, application is hereby made for a license to receive, possess, use, transfer, deliver or import into the United Stat-, source material for the activity or activities described. 1. (check ooa) 2. NAME OF APPLICANT W. R. GRACE 6 Co. 0 (a) New Iicense 0 (b) Amendment to License No.- Davison Chemical Division STA-422 3. Q (c) Renewal of Licensr No. 0 (d) Previous License No. Pompton Plains, N. J. 4. ST,.TE THE AOORESS(ES) AT WHICH SOURCE MATERIAL WILL BE POSSESSED OR USED 868 Black Oak Ridge Road, Wayne, fi. J. a*ocY s up/'l File IF 5. BUSINESS OR OCCUPATION I 6. (a) IF APPLICANT IS AN INDIVIDUAL. STATE CITIZENSHIP

303

Nalco and Argonne reach licensing agreement covering resin wafer technology  

Science Journals Connector (OSTI)

In the USA, Nalco Co has reached a licensing agreement with the US Department of Energy's (DOE) Argonne National Laboratory, covering its resin wafer electrodeionisation (RW-EDI) technology.

2011-01-01T23:59:59.000Z

304

DEPARTMENT OF ENERGY EXCLUSIVE OR PARTIALLY EXCLUSIVE PATENT LICENSE APPLICATION  

Energy.gov (U.S. Department of Energy (DOE))

It is the policy of the U.S. Department of Energy (DOE) to accord licenses on DOE-owned patents and patent applications in appropriate circumstances to applicants with satisfactory plans for...

305

Unique Regulatory Approach for Licensing the Port Hope Remediation Project in Canada - 13315  

SciTech Connect

The Port Hope remediation project is a part of a larger initiative of the Canadian Federal Government the Port Hope Area Initiative (PHAI) which is based upon a community proposal. The Government of Canada, through Natural Resources Canada (NRCan) is investing $1.28 billion over 10 years to clean up historic low-level radioactive waste in the Port Hope Area and to provide long-term safe management of the low-level radioactive wastes in the Port Hope Area. These wastes arose from the activities of a former Federal Crown Corporation (Eldorado Nuclear) and its private sector predecessors. In Canada, historic waste are defined as low-level radioactive waste that was managed in a manner no longer considered acceptable, but for which the original producer cannot reasonably be held responsible or no longer exists and for which the Federal Government has accepted responsibility. In Canada, under the current regulatory framework, the environmental remediation is not considered as a distinct phase of the nuclear cycle. The regulatory approach for dealing with existing sites contaminated with radioactive residues is defined on the basis of risk and application of existing regulations. A unique regulatory approach was taken by the Canadian Nuclear Safety Commission (CNSC) to address the various licensing issues and to set out the requirements for licensing of the Port Hope Project within the current regulatory framework. (authors)

Kostova, M.; Howard, D.; Elder, P. [Directorate of Nuclear Cycle and Facilities Regulation, Canadian Nuclear Safety Commission, 280, Slater Street, Ottawa, Ontario K1P 5S9 (Canada)] [Directorate of Nuclear Cycle and Facilities Regulation, Canadian Nuclear Safety Commission, 280, Slater Street, Ottawa, Ontario K1P 5S9 (Canada)

2013-07-01T23:59:59.000Z

306

Office of Legacy Management  

Office of Legacy Management (LM)

Energy Energy Office of Legacy Management JUL 1 0 2008 Alonso Ramirez, Scientific Director EI Verde Research Station Institute for Tropical Ecosystem Studies University of Puerto Rico P.o. Box 21910 San Juan, PR 00931 .Subject: Regulatory Status of Study Area 4 Dear Dr. Ramirez: I want to thank you and your staff, especially John Bithom for taking time to escort us to Study Area 4 several weeks ago. While planning the visit to the EI Verde Research Station, we mentioned that the radioactive materials license for the tree in Study Area 4 was terminated. Termination was based on radiological conditions meeting criteria for protectiveness. At that time, we sent by email the application to amend the University of Puerto Rico radioactive materials license, which we

307

Department of Energy Files Motion to Withdraw Yucca Mountain License  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Files Motion to Withdraw Yucca Mountain Files Motion to Withdraw Yucca Mountain License Application Department of Energy Files Motion to Withdraw Yucca Mountain License Application March 3, 2010 - 12:00am Addthis WASHINGTON, D.C. - The U.S. Department of Energy today filed a motion with the Nuclear Regulatory Commission to withdraw the license application for a high-level nuclear waste repository at Yucca Mountain with prejudice. "President Obama is fully committed to ensuring that the Nation meets our long-term storage obligations for nuclear waste," said Department of Energy General Counsel Scott Blake Harris. "In light of the decision not to proceed with the Yucca Mountain nuclear waste repository, the President directed Secretary Chu to establish the Blue Ribbon Commission on America's

308

Air Permits, Licenses, Certifications (Maine) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) Air Permits, Licenses, Certifications (Maine) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Maine Program Type Siting and Permitting Provider Department of Environmental Protection This program regulates and limits air emissions from a variety of sources within Maine through a statewide permitting program. Separate regulations exist for limiting emissions of nitrogen oxides (NOx), sulfur dioxide

309

NETL: News Release - Successful Clean Coal Technology Licensed for  

NLE Websites -- All DOE Office Websites (Extended Search)

6, 2010 6, 2010 Successful Clean Coal Technology Licensed for Commercial Application DOE Receives First Repayment for Liquid Phase Methanol Process Development Washington, DC - The U.S. Department of Energy (DOE) has received the first installment from a repayment agreement for the Liquid Phase Methanol (LPMEOH(tm)) Process. A royalty license issued for the advanced methanol production system underscores the clean coal technology's presence in the commercial market. The DOE-funded LPMEOH Process, developed in collaboration with Air Products and Chemicals Inc., has been licensed to Woodland Biofuel Inc., who intends to use the technology to develop a wood-gasification process to produce methanol from wood-scrap. The first facility is planned in New York State.

310

Argonne licenses diamond semiconductor discoveries to AKHAN Technologies |  

NLE Websites -- All DOE Office Websites (Extended Search)

licenses diamond semiconductor discoveries to AKHAN Technologies licenses diamond semiconductor discoveries to AKHAN Technologies By Joseph Bernstein * By Jared Sagoff * March 4, 2013 Tweet EmailPrint LEMONT, Ill. - The U.S. Department of Energy's Argonne National Laboratory announced today that the laboratory has granted AKHAN Technologies exclusive diamond semiconductor application licensing rights to breakthrough low-temperature diamond deposition technology developed by Argonne's Center for Nanoscale Materials (CNM). The Argonne-developed technology allows for the deposition of nanocrystalline diamond on a variety of wafer substrate materials at temperatures as low as 400 degrees Celsius. The combination of the Argonne's low-temperature diamond technology with AKHAN's Miraj Diamond(tm) process represents the state of the art in diamond semiconductor

311

Electrical Energy Producer's License Tax (Montana) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Producer's License Tax (Montana) Energy Producer&#039;s License Tax (Montana) Electrical Energy Producer's License Tax (Montana) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Institutional Multi-Family Residential Systems Integrator Nonprofit General Public/Consumer Transportation Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Montana Program Type Fees Provider Montana Department of Revenue Each person or other organization engaged in the generation, manufacture, or production of electricity and electrical energy in the state of Montana,

312

Property:FERC License Docket Number | Open Energy Information  

Open Energy Info (EERE)

License Docket Number License Docket Number Jump to: navigation, search This is a property of type string. Pages using the property "FERC License Docket Number" Showing 25 pages using this property. (previous 25) (next 25) M MHK Projects/Admirality Inlet Tidal Energy Project + P-12690 + MHK Projects/Algiers Light Project + P-12848 + MHK Projects/Anconia Point Project + P-12928 + MHK Projects/Astoria Tidal Energy + P-12665 + MHK Projects/Avalon Tidal + P-14228 + MHK Projects/Avondale Bend Project + P-12866 + MHK Projects/BW2 Tidal + P-14222 + MHK Projects/Bar Field Bend + P-12942 + MHK Projects/Barfield Point + P-13489 + MHK Projects/Bayou Latenache + P-13542 + MHK Projects/Belair Project + P-13125 + MHK Projects/Bondurant Chute + P-13477 + MHK Projects/Breeze Point + P-13480 +

313

Radioisotope thermoelectric generator licensed hardware package and certification tests  

SciTech Connect

This paper presents the Licensed Hardware package and the Certification Test portions of the Radioisitope Themoelectric Generator Transportation System. This package has been designed to meet those portions of the {ital Code} {ital of} {ital Federal} {ital Regulations} (10 CFR 71) relating to ``Type B`` shipments of radioactive materials. The licensed hardware is now in the U. S. Department of Energy licensing process that certifies the packaging`s integrity under accident conditions. The detailed information for the anticipated license is presented in the safety analysis report for packaging, which is now in process and undergoing necessary reviews. As part of the licensing process, a full-size Certification Test Article unit, which has modifications slightly different than the Licensed Hardware or production shipping units, is used for testing. Dimensional checks of the Certification Test Article were made at the manufacturing facility. Leak testing and drop testing were done at the 300 Area of the U.S. Department of Energy`s Hanford Site near Richland, Washington. The hardware includes independent double containments to prevent the environmental spread of {sup 238}Pu, impact limiting devices to protect portions of the package from impacts, and thermal insulation to protect the seal areas from excess heat during accident conditions. The package also features electronic feed-throughs to monitor the Radioisotope Thermoelectric Generator`s temperature inside the containment during the shipment cycle. This package is designed to safely dissipate the typical 4,500 thermal watts produced in the largest Radioisotope Thermoelectric Generators. The package also contains provisions to ensure leak tightness when radioactive materials, such as a Radioisotope Thermoelectric Generator for the Cassini Mission, planned for 1997 by the National Aeronautics and Space Administration, are being prepared for shipment. (Abstract Truncated)

Goldmann, L.H.; Averette, H.S. [Westinghouse Hanford Company, P.O. Box 1970, M/S R3-86 or N1-32, Richland, Washington 99352 (United States)

1995-01-20T23:59:59.000Z

314

Cleanup of Nuclear Licensed Facility 57  

SciTech Connect

This summary describes the operations to clean up the equipment of the Nuclear Licensed Facility 57 (NLF 57). Due to the diversity of the research and development work carried out on the reprocessing of spent fuel in it, this installation is emblematic of many of the technical and organizational issues liable to be encountered in the final closure of nuclear facilities. The French atomic energy commission's center at Fontenay aux Roses (CEA-FAR) was created in 1946 to house pile ZOE. Laboratories for fuel cycle research were installed in existing buildings at the site. Work was later concentrated on spent fuel reprocessing, in a pilot workshop referred to as the 'Usine Pu'. In the early sixties, after the dismantling of these first generation facilities, a radiochemistry laboratory dedicated to research and development work on reprocessing was constructed, designated Building 18. During the same decade, more buildings were added: Building 54, storehouses and offices, Building 91, a hall and laboratories for chemical engineering research on natural and depleted uranium. Together, these three building constitute NLF 57. Building 18 architecture featured four similar modules. Each module had three levels: a sub-level consisting of technical galleries and rooms for the liquid effluent tanks, a ground floor and roof space in which the ventilation was installed. Offices, change rooms, four laboratories and a hall were situated on the ground floor. The shielded lines were installed in the laboratories and the halls. Construction of the building took place between 1959 and 1962, and its commissioning began in 1961. The research and development programs performed in NLF 57 related to studies of the reprocessing of spent fuel, including dry methods and the Purex process, techniques for the treatment of waste (vitrification, alpha waste decontamination, etc.) as well as studies and production of transuranic elements for industry and research. In addition to this work, the necessary methods of analysis for monitoring it were also developed. The research and development program finally ended on 30 June 1995. The NLF 57 cleanup program was intended to reduce the nuclear and conventional hazards and minimize the quantities of HLW and MLW during the subsequent dismantling work. To facilitate the organization of the cleanup work, it was divided into categories by type: - treatment and removal of nuclear material, - removal of radioactive sources, - treatment and removal of aqueous liquid waste, - treatment and removal of organic effluents, - treatment and removal of solid waste, - pumping out of the PETRUS tank, - flushing and decontamination of the tanks, - cleanup of Buildings 18 and 91/54. To estimate the cost of the operations and to monitor the progress of the work, an indicator system was put in place based on work units representative of the operation. The values of the work units were periodically updated on the basis of experience feedback. The cleanup progress is now 92% complete (06/12/31): - treatment and removal of nuclear material: 100%, - removal of radioactive sources: 100%, - treatment and removal of aqueous liquid waste: 64%, - treatment and removal of organic effluents: 87%, - treatment and removal of solid waste: 99%, - pumping out of the PETRUS tank: 69%, - flushing and decontamination of tank: 75%, - section cleaning of Buildings 18 and 91/: 90%. The DRSN/SAFAR is the delegated Project Owner for cleanup and dismantling operations. It is also the prime contractor for the cleanup and dismantling operations. SAFAR itself is responsible for operations relating to the CEA activity and those with technical risks (Removal of nuclear materials, Removal of radioactive sources, Pumping out plutonium and transuranic contaminated solvent and Flushing and decontamination of tanks and pipes). All other operations are sub-contracted to specialist companies. The NLF57 cleanup program as executed is capable of attaining activity levels compatible with a future dismantling operation using known and mastered techniques and producing a

Jeanjacques, Michel; Bremond, Marie Pierre; Marchand, Carole; Poyau, Cecile; Viallefont, Cecile; Gautier, Laurent; Masure, Frederic [Commissariat a l'Energie Atomique, Direction de l'Energie Nucleaire, Direction deleguee des Activites Nucleaires de Saclay, Departement des Reacteurs et des Services Nucleaires, Service d'Assainissement de Fontenay Aux Roses: 18, route du Panorama, BP6, 92265 Fontenay aux Roses Cedex (France)

2008-01-15T23:59:59.000Z

315

Aging management guideline for commercial nuclear power plants - heat exchangers  

SciTech Connect

This Aging Management Guideline (AMG) describes recommended methods for effective detection and mitigation of age-related degradation mechanisms in commercial nuclear power plant heat exchangers important to license renewal. The intent of this AMG is to assist plant maintenance and operations personnel in maximizing the safe, useful life of these components. It also supports the documentation of effective aging management programs required under the License Renewal Rule 10 CFR 54. This AMG is presented in a manner that allows personnel responsible for performance analysis and maintenance to compare their plant-specific aging mechanisms (expected or already experienced) and aging management program activities to the more generic results and recommendations presented herein.

Booker, S.; Lehnert, D.; Daavettila, N.; Palop, E.

1994-06-01T23:59:59.000Z

316

The use for frequency-consequence curves in future reactor licensing  

E-Print Network (OSTI)

The licensing of nuclear power plants has focused until now on Light Water Reactors and has not incorporated systematically insights and benefits from Probabilistic Risk Assessment (PRA). With the goal of making the licensing ...

Debesse, Laurne

2007-01-01T23:59:59.000Z

317

Fact #761: January 7, 2013 Smaller Share of Teenagers Have a Driver's License in 2010  

Energy.gov (U.S. Department of Energy (DOE))

In the 1980's, more than half of all teenagers 15 to 19 years old had a driver's license. But that has changed. Since 1995, less than half of that age group has a driver's license. In 2010, the...

318

Licensing sentence-internal readings in english: an experimental study  

Science Journals Connector (OSTI)

Adjectives of comparison (AOCs) like same, different and similar can compare two elements sentence-internally, i.e., without referring to any previously introduced element. This reading is licensed only if a semantically plural NP ... Keywords: Bayesian statistics, acceptability judgments, adjectives of comparison, distributivity, pluralities

Adrian Brasoveanu; Jakub Dotla?il

2011-12-01T23:59:59.000Z

319

LICENSE HISTORY MO.8 Petrolite Corporation, St. Louis  

Office of Legacy Management (LM)

30-051175, 081379. Loose H-3, I-131, P-32. l 24-10452-1, 103064. K66 R. R. Annand et al Multiple. . 70-621, 12-15-61, SNM license for 0.5 kg. of U-235, 93% enriched as a fuel...

320

Decision fusion for improved automatic license plate recognition  

Science Journals Connector (OSTI)

Automatic license plate recognition (ALPR) is a pattern recognition application of great importance for access, traffic surveillance and law enforcement. Therefore many studies are concentrated on creating new algorithms or improving their performance. ... Keywords: ALPR, decision fusion, licence plate, neural networks, pattern recognition, skeleton features

Cristian Molder; Mircea Boscoianu; Iulian C. Vizitiu; Mihai I. Stanciu

2009-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Nuclear knowledge portal for supporting licensing and controlling nuclear activities in the Brazilian Nuclear Energy Commission  

Science Journals Connector (OSTI)

The knowledge economy is pivotal for moving the wealth and development of traditional industrial sectors ?? abundant in manual labour, raw materials and capital ?? to areas whose products, processes and services are rich in technology and knowledge. Even in research areas such as nuclear energy, where goods are based on high technology, the ability to transform information into knowledge, and knowledge into decisions and actions, is extremely important. Therefore, the value of products from these areas depends more and more on the degree of innovation, technology and intelligence incorporated by them. Thus, it has become increasingly important and relevant to acquire strategic knowledge and make it available to the organisation. Therefore, the objective of this paper is to present the construction of a Nuclear Knowledge Portal for aiding and streamlining the Licensing and Management activities of the CNEN.

E. Gomes; F. Braga

2005-01-01T23:59:59.000Z

322

Guidelines for preparing and reviewing applications for the licensing of non-power reactors: Standard review plan and acceptance criteria. NUREG - 1537, Part 2  

SciTech Connect

NUREG - 1537, Part 2 gives guidance on the conduct of licensing action reviews to NRC staff who review non-power reactor licensing applications. These licensing actions include construction permits and initial operating licenses, license renewals, amendments, conversions from highly enriched uranium to low-enriched uranium, decommissioning, and license termination.

NONE

1996-02-01T23:59:59.000Z

323

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

324

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

325

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cdric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Herv Darbon

2001-10-02T23:59:59.000Z

326

Procurement and Property Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Traffic Management Services Plum Island Constructed 1827 Traffic Management Services Plum Island Constructed 1827 Shipping and Receiving Supervisor: M. White Phone: 631-344-2300 Email: mwhite@bnl.gov Traffic Management Services include the following: Transportation Services. Provide guidance on methods of shipment, carrier availability, and discount programs for moving freight for the account of the U. S. Government. Employee Relocation Program. Coordinate the movement of household goods for BNL employees. Receipt and Inspection of goods. Provide the services necessary to ensure that goods are received, inspected, and delivered on time. Ensure that damages are noted at time of delivery and establish claims as necessary. Import/Export Services. Provide guidance on the requirements for shipments made by the Laboratory to destinations outside the continental United States. Obtain Export Licenses as needed.

327

Spectrum Management of Cognitive Radio Using Multi-agent Reinforcement Learning  

E-Print Network (OSTI)

Spectrum Management of Cognitive Radio Using Multi-agent Reinforcement Learning Cheng Wu spectrum management can signif- icantly reduce the interference to the licensed users, while maintaining: Spectrum Management of Cognitive Radio Using Multi-agent Reinforcement Learning, C. Wu, K. Chowdhury, M. D

Meleis, Waleed

328

Rice Insect Management.  

E-Print Network (OSTI)

and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug... and vegetative grov. ) , Variety selection is important, not only because of response to nitrogen in relation to larval rice water we---.) damage, but also because certain varieties show some resistan ce/tolerance to rice water weevil and rice stink bug...

Drees, Bastiaan M.

1983-01-01T23:59:59.000Z

329

Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed  

NLE Websites -- All DOE Office Websites (Extended Search)

4: June 8, 2009 4: June 8, 2009 Vehicles per Licensed Driver Rising to someone by E-mail Share Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Facebook Tweet about Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Twitter Bookmark Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Google Bookmark Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Delicious Rank Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on Digg Find More places to share Vehicle Technologies Office: Fact #574: June 8, 2009 Vehicles per Licensed Driver Rising on AddThis.com... Fact #574: June 8, 2009

330

Completion of decommissioning: Monitoring for site release and license termination  

SciTech Connect

To request termination of a license upon completion of dismantling or decommissioning activities, documenting any residual radioactivity to show that the levels are environmentally acceptable will be necessary. When the regulators approve the decommissioning plan, they establish what the release criteria for the decommissioned site will be at the time of the site release and license termination. The criteria are numeric guidelines for direct radiation in soils and on surfaces. If the regulatory body finds that the measured on-site values are below the guidelines, the site will be acceptable for unrestricted release (no radiological controls or future use). If areas are found above those values, more decontamination or cleanup of these areas may be required unless the regulatory body grants an exemption.

Boing, L.E.

1997-08-01T23:59:59.000Z

331

Management Plan Management Plan  

E-Print Network (OSTI)

; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

332

Safeguards management inspection procedures  

SciTech Connect

The objective of this inspection module is to independently assess the contributions of licensee management to overall safeguards systems performance. The inspector accomplishes this objective by comparing the licensee's safeguards management to both the 10 CFR, parts 70 and 73, requirements and to generally accepted management practices. The vehicle by which this comparison is to be made consists of assessment questions and key issues which point the inspector to areas of primary concern to the NRC and which raise additional issues for the purpose of exposing management ineffectiveness. Further insight into management effectiveness is obtained through those assessment questions specifically directed toward the licensee's safeguards system performance. If the quality of the safeguards is poor, then the inspector should strongly suspect that management's role is ineffective and should attempt to determine management's influence (or lack thereof) on the underlying safeguards deficiencies. (The converse is not necessarily true, however.) The assessment questions in essence provide an opportunity for the inspector to identify, to single out, and to probe further, questionable management practices. Specific issues, circumstances, and concerns which point to questionable or inappropriate practices should be explicitly identified and referenced against the CFR and the assessment questions. The inspection report should also explain why the inspector feels certain management practices are poor, counter to the CFR, and/or point to ineffecive management. Concurrent with documenting the inspection results, the inspector should provide recommendations for alleviating observed management practices that are detrimental to effective safeguards. The recommendations could include: specific changes in the practices of the licensee, followup procedures on the part of NRC, and proposed license changes.

Barth, M.J.; Dunn, D.R.

1984-08-01T23:59:59.000Z

333

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

334

Managing Insects and Mite Pests of Texas Sorghum  

E-Print Network (OSTI)

Chinch bug .....................................................................16 Corn earworm and fall armyworm (whorlworms) .......17 Banks grass mite ...........................................................18 GRAIN HEAD INSECT PESTS... .......................................................19 Sorghum midge ............................................................19 Corn earworm and fall armyworm (headworms) ........22 Sorghum webworm ........................................................24 Grain head-feeding bugs...

Cronholm, Gregory B.; Knutson, Allen E.; Parker, Roy D.; Pendleton, Bonnie

2007-06-20T23:59:59.000Z

335

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant August 15, 2008 - 3:15pm Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) today delivered to Congress the Next Generation Nuclear Plant (NGNP) Licensing Strategy Report which describes the licensing approach, the analytical tools, the research and development activities and the estimated resources required to license an advanced reactor design by 2017 and begin operation by 2021. The NGNP represents a new concept for nuclear energy utilization, in which a gas-cooled reactor provides process heat for any number of industrial applications including electricity production, hydrogen production, coal-to-liquids, shale oil

336

GRR/Section 12-HI-a - Habitat Conservation Plan and Incidental Take License  

Open Energy Info (EERE)

2-HI-a - Habitat Conservation Plan and Incidental Take License 2-HI-a - Habitat Conservation Plan and Incidental Take License < GRR Jump to: navigation, search GRR-logo.png GEOTHERMAL REGULATORY ROADMAP Roadmap Home Roadmap Help List of Sections Section 12-HI-a - Habitat Conservation Plan and Incidental Take License 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf Click to View Fullscreen Contact Agencies Hawaii Department of Land and Natural Resources Division of Forestry and Wildlife Regulations & Policies Hawaii Revised Statutes 195D-21 Triggers None specified Click "Edit With Form" above to add content 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf 12HIAHabitatConservationPlanAndIncidentalTakeLicense (3).pdf Error creating thumbnail: Page number not in range. Error creating thumbnail: Page number not in range.

337

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant DOE, NRC Issue Licensing Roadmap For Next-Generation Nuclear Plant August 15, 2008 - 3:15pm Addthis WASHINGTON, DC -The U.S. Department of Energy (DOE) and the U.S. Nuclear Regulatory Commission (NRC) today delivered to Congress the Next Generation Nuclear Plant (NGNP) Licensing Strategy Report which describes the licensing approach, the analytical tools, the research and development activities and the estimated resources required to license an advanced reactor design by 2017 and begin operation by 2021. The NGNP represents a new concept for nuclear energy utilization, in which a gas-cooled reactor provides process heat for any number of industrial applications including electricity production, hydrogen production, coal-to-liquids, shale oil

338

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

339

The Debate over Re-Licensing the Vermont Yankee Nuclear Power Plant  

Science Journals Connector (OSTI)

In 2009, the NRC's Atomic Safety and Licensing Board approved a 20-year license extension for the Vermont Yankee Nuclear Power plant. Less than seven months later, the Vermont State Senate voted 26-4 to block the required certificate for public good. How did a plant seen as likely to be re-licensed become the first in 20 years to be rejected in a public vote?

Richard Watts; Paul Hines; Jonathan Dowds

2010-01-01T23:59:59.000Z

340

The debate over re-licensing the Vermont Yankee nuclear power plant  

SciTech Connect

In 2009, the NRC's Atomic Safety and Licensing Board approved a 20-year license extension for the Vermont Yankee Nuclear Power plant. Less than seven months later, the Vermont State Senate voted 26-4 to block the required certificate for public good. How did a plant seen as likely to be re-licensed become the first in 20 years to be rejected in a public vote? (author)

Watts, Richard; Hines, Paul; Dowds, Jonathan

2010-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Atomic Safety and Licensing Board Panel annual report, Fiscal year 1992  

SciTech Connect

In Fiscal Year 1992, the Atomic Safety and Licensing Board Panel (``the Panel``) handled 38 proceedings. The cases addressed issues in the construction, operation, and maintenance of commercial nuclear power reactors and other activities requiring a license from the Nuclear Regulatory Commission. This reports sets out the Panel`s caseload during the year and summarizes, highlights, and analyzes how the wide-ranging issues raised in those proceedings were addressed by the Panel`s judges and licensing boards.

Not Available

1993-09-01T23:59:59.000Z

342

E-Print Network 3.0 - ag license number Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

Note: If both crab... , this vessel may not receive this license by transfer. Enter the name, ADF&G vessel registration number, USCG... documentation number, and the...

343

Step-Wise Repository Licensing-Implementing the Scientific and Legislative Vision for the Next Phase of the Yucca Mountain Project  

SciTech Connect

International scientific consensus backing geologic disposal as the preferred method of long term management of used nuclear fuel and defense high level radioactive waste has existed since the 1950s. Furthermore, many believe that geologic disposal programs should be implemented in a staged or 'step-wise' approach. These principles have also been at the root of US waste management policy for which a regulatory framework for site selection, and the licensing of a site once selected, is set forth in a series of legislation. The US program has now matured to the point where these regulatory components are now in place. Sufficient data has also been gathered and evaluated to support a site recommendation decision. This decision--on whether or not to proceed with a repository site at Yucca Mountain, Nevada - is about to be put before the US President and Congress. If made in the affirmative, the decision would initiate the next phase in the US disposal process as originally envisioned by Congress--a three-step repository licensing process (Construction, Operation, & Closure). This paper explores the many facets of the licensing process that may lie ahead. Approaches that could be deployed to effectively implement this process are discussed and opportunities to optimize the process, by capitalizing on its evolutionary nature to assure that the best available science is always applied to the protection of public health and safety, are identified. Focus is also placed on a key prerequisite to the accomplishment of this goal--the definition of the level to which post closure repository performance must be addressed at each stage of the licensing process.

McCullum, R.; Kessler, J. H.; Eyre, M. L.

2002-02-27T23:59:59.000Z

344

Security & Defense Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Available Technologies Analytical Instrumentation Chemicals Detectors and Sensors Energy and Utilities Healthcare and Biology Information Technology and Communications Manufacturing Materials Security and Defense Transportation Partnerships Home | Connect with ORNL | For Industry | Partnerships | Technology Licensing | Available Technologies | Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614 Robust Low-Frequency Spread-Spectrum Navigation System (Related ID # 200601627) 200501640 Secure Identification of Textiles and Other Consumer Products 200701980 Cyberspace Security Econometrics System 200701995 An Intrusion Detection System Using Quantum-mechanical

345

Procurement of a fully licensed radioisotope thermoelectric generator transportation system  

SciTech Connect

A fully licensed transportation system for Radioisotope Thermoelectric Generators and Light-Weight Radioisotope Heater Units is currently being designed and built. The system will comply with all applicable U.S. Department of Transportation regulations without the use of a DOE Alternative.'' The U.S. Department of Transportation has special double containment'' requirements for plutonium. The system packaging uses a doubly contained bell jar'' concept. A refrigerated trailer is used for cooling the high-heat payloads. The same packaging is used for both high- and low-heat payloads. The system is scheduled to be available for use by mid-1992.

Adkins, H.E.; Bearden, T.E. (Westinghouse Hanford Company, P.O. Box 1970, N1-42, Richland, Washington 99352 (US))

1991-01-01T23:59:59.000Z

346

Procurement of a fully licensed radioisotope thermoelectric generator transportation system  

SciTech Connect

A fully licensed transportation system for Radioisotope Thermoelectric Generators and Light-Weight Radioisotope Heater Units is currently being designed and built. The system will comply with all applicable US Department of Transportation regulations without the use of a DOE Alternative.'' The US Department of Transportation has special double containment'' requirements for plutonium. The system packaging uses a doubly contained bell jar'' concept. A refrigerated trailer is used for cooling the high-heat payloads. The same packaging is used for both high- and low-heat payloads. The system is scheduled to be available for use by mid-1992. 4 refs., 4 figs., 2 tabs.

Adkins, H.E.; Bearden, T.E.

1990-10-01T23:59:59.000Z

347

California cotton growers utilize integrated pest management  

E-Print Network (OSTI)

economic thresholds in cotton. In: Frisbie RE, Adkission,the Good Bugs in Cotton: Field Guide to Predators, ParasitesInsect and Mite Pests of Cotton. Texas Agricultural

Brodt, Sonja; Goodell, Peter B.; Krebill-Prather, Rose L.; Vargas, Ron N.

2007-01-01T23:59:59.000Z

348

Hospitality Management Hospitality Management  

E-Print Network (OSTI)

of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

McConnell, Terry

349

Licensing A Geologic Repository At Yucca Mountain, Nevada  

SciTech Connect

After completing more than twenty years of intensive scientific and engineering investigations at the Yucca Mountain site in Nevada, the U.S. Department of Energy (DOE) has determined that the site is suitable for development of a geologic repository for disposal of the Nation's spent nuclear fuel and high-level radioactive waste. Following this determination, the site was recommended to the President for repository development. The President approved the recommendation and forwarded it to the U.S. Congress for site designation. The Governor of Nevada vetoed the recommendation with a notice of disapproval to the U.S. Congress. Congress subsequently over-rode the Governor's veto with a joint resolution which the President signed into law. With site designation in effect, DOE is now focusing its work on the development of a license application for repository construction. This paper will summarize the work that had been done to support site recommendation, work that is currently being done for license application, and the necessary next steps that may be required to allow repository operations to begin in 2010.

Dyer, R. J.

2003-02-24T23:59:59.000Z

350

ON LICENSING AND DIFFUSION OF CLEAN TECHNOLOGIES IN Idrissa G.-O. SIBAILLY  

E-Print Network (OSTI)

ON LICENSING AND DIFFUSION OF CLEAN TECHNOLOGIES IN OLIGOPOLY Idrissa G.-O. SIBAILLY November 2013:chantal.poujouly@polytechnique.edu hal-00911453,version1-16Dec2013 #12;On licensing and diffusion of clean technologies in oligopoly Idrissa G.-O. SIBAILLY This version: November 30, 2013. Abstract Clean technologies implemented

Boyer, Edmond

351

Comparative analysis of LMFBR licensing in the United States and other countries - notably France. Final report  

SciTech Connect

This report presents an analysis of LMFBR licensing in the United States. It approaches this question broadly, examining first the system in the United States with the various sectors of the nuclear power economy, and the experience of that system in LWR licensing. It then examines the nature of LMFBR safety licensing questions - to the degree that they differ from those of LWR's - and surveys the experience of the United States and other countries in LMFBR safety licensing. Special attention is devoted to the case of France because of the technical leadership which the French program has provided, and because of the apparent efficiency with which French licensing is performed. The French licensing system and LWR licensing experience are examined, and conclusions drawn regarding the reasons for their effectiveness. Finally, a general comparison of the United States and foreign licensing systems is performed, proposals offered during the recent past for changes in the United States system are examined, and possibilities for future changes are suggested.

Golay, M.W.; Castillo, M.

1981-09-30T23:59:59.000Z

352

Albert Einstein College of Medicine Amendment to Non-human Use of Radioactive Material License  

E-Print Network (OSTI)

RSO-2 Rev.0 Albert Einstein College of Medicine Amendment to Non-human Use of Radioactive Material License INSTRUCTIONS: If you wish to make changes to your license to use radioactive material please exposure; Glove box: Mechanical pipettes: Fume hood: Absorbent liner & Tray Shielding: Lead: Lucite: GM

Emmons, Scott

353

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization March 23, 2011 - 1:00pm Addthis Washington, DC - Two new patented sorbents used for carbon dioxide (CO2) capture from coal-based power plants have moved closer to commercialization as a result of a licensing agreement between the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) and ADA Environmental Solutions (ADA-ES). The nonexclusive agreement facilitates negotiations on intellectual property rights, protects proprietary information, and grants non-exclusive licensing of the new technology. Under federal regulations, NETL is authorized to obtain, maintain, and own patent protection for its

354

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization Licensing Agreement Moves Two NETL-Patented Carbon Capture Sorbents Closer to Commercialization March 23, 2011 - 1:00pm Addthis Washington, DC - Two new patented sorbents used for carbon dioxide (CO2) capture from coal-based power plants have moved closer to commercialization as a result of a licensing agreement between the Office of Fossil Energy's (FE) National Energy Technology Laboratory (NETL) and ADA Environmental Solutions (ADA-ES). The nonexclusive agreement facilitates negotiations on intellectual property rights, protects proprietary information, and grants non-exclusive licensing of the new technology. Under federal regulations, NETL is authorized to obtain, maintain, and own patent protection for its

355

UNITED STATES OF AMERICA ATOMIC ENERGY COMMISSION APPLICATION FORAEC LICENSE TO  

Office of Legacy Management (LM)

OF AMERICA OF AMERICA ATOMIC ENERGY COMMISSION APPLICATION FORAEC LICENSE TO TRANSFER,DELIVER,EXPORT,OR RECEIVE URANIUM ORTHORIUM SOURCE MATERIAL Pursuant to Code of Federal Regulations. Title II- Atomic Energy. Part IO-Control of Source Material Form approved Budget Bureau No. 3%RO02.2. 2. PREVIOUS AEC LICENSE NUMBER, IF ANY. R-103 _..._............_.~_~~......~~~.....~.. INSTRUCTIONS File two (2) copies of this application with the U. S. Atomic Energy Commission, P. 0. Box 30, Ansonia Station, New York 23, N. Y. This application may be used for an original license or for the renewal of a license. In the case of a rrnewal, this application should be received by the Commission on or before 30 days before the expiration of the previous license. Complete blocks 1, 2, 3, 9. and if

356

Licensing the ACR in the USA - A Status Report  

SciTech Connect

The ACR-700 (ACR) is an evolutionary reactor design, which incorporates the inherent safety features of the Candu products, as well as the successful operating experience of the current Candu 6 reactors. The improvements to the ACR from Candu 6 result in significant reductions in capital and operating costs as well as enhanced safety. AECL Technologies (AECLT, a wholly owned US subsidiary of Atomic Energy of Canada Limited) is the proponent for the ongoing pre-application review of the ACR with the US Nuclear Regulatory Commission (NRC) in the United States. This pre-application review will be completed shortly and will support an application to the USNRC for Standard Design Certification (SDC). AECL Technologies' overall objective for the pre-application review of the ACR is to obtain an understanding of the scope, cost, and the schedule to obtain a Standard Design Certification for the ACR. The pre-application review will address licensing issues associated with the Candu reactor technologies in ACR that depart from the light water reactor, pressure-vessel based regulatory framework in the USA. Therefore, during the course of the ACR pre-application review, major USNRC issues with the ACR design will be identified early and the scope of the work required to address these concerns, along with associated completion schedules, will be formulated and ultimately agreed upon with the USNRC. AECLT has been informed by the NRC staff that the results of their pre-application review will be documented in a Safety Assessment Report (SAR), which will state whether there are any major impediments to licensing the ACR in the United States. In particular, the SAR should provide confirmation of the licensing criteria applicable to the ACR, provide an assessment of the completeness of AECL's Research and Development (R and D) programs that exist or are planned in support of the ACR, provide an assessment of the suitability for purpose of the computer codes used in the safety analysis of the ACR, and provide estimates of the cost and schedule for the remaining scope of the USNRC's efforts on the identified focus topics in preparation for a Design Certification review. This paper will discuss the status of the pre-application review for ACR. (authors)

Snell, Victor; Langman, Vince; Ion, Robert; Reid, Calvin [2251 Speakman Drive, Mississauga, Ontario, L5K 1B2 (Canada)

2004-07-01T23:59:59.000Z

357

Carbonaceous Chemistry for Computational Modeling Licensing and Partnership Opportunity  

NLE Websites -- All DOE Office Websites (Extended Search)

Chemistry for Computational Modeling Chemistry for Computational Modeling Opportunity The Department of Energy's National Energy Technology Laboratory (NETL) has developed a software platform entitled Carbonaceous Chemistry for Computational Modeling (C3M) that is used to access a variety of kinetic processes and reaction mechanisms typically found in coal gasification, gas clean-up, and carbon capture processes. This unique software provides the user the ability to conduct virtual kinetic experiments using leading kinetic packages and available experimental data to evaluate kinetic predictions as a function of fuel and sorbent type and/or operating conditions. A Patent Cooperation Treaty application was filed in June 2008. NETL is seeking non-exclusive licensing partners interested in implementing

358

Rules and Regulations Pertaining to the Management of Wastes (Nebraska) |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Pertaining to the Management of Wastes Pertaining to the Management of Wastes (Nebraska) Rules and Regulations Pertaining to the Management of Wastes (Nebraska) < Back Eligibility Agricultural Commercial Construction Fed. Government Fuel Distributor General Public/Consumer Industrial Installer/Contractor Institutional Investor-Owned Utility Local Government Low-Income Residential Multi-Family Residential Municipal/Public Utility Nonprofit Residential Retail Supplier Rural Electric Cooperative Schools State/Provincial Govt Systems Integrator Transportation Tribal Government Utility Program Info State Nebraska Program Type Siting and Permitting Provider Environmental Quality These regulations, promulgated by the Department of Environmental Quality, contain provisions pertaining to waste management permits and licenses,

359

DOE - Office of Legacy Management -- Nuclear Metals Inc - MA 09  

Office of Legacy Management (LM)

Metals Inc - MA 09 Metals Inc - MA 09 FUSRAP Considered Sites Site: NUCLEAR METALS, INC. (MA.09) Eliminated from consideration under FUSRAP - Licensed facility - included in NRC action plan (Site Decommissioning Management Plan) in 1990 for cleanup Designated Name: Not Designated Alternate Name: None Location: 1555 Massachusetts Ave. , Cambridge , Massachusetts MA.09-2 Evaluation Year: 1987 MA.09-1 Site Operations: Produced natural uranium tubes for Savannah River reactor program and fabricated power reactor fuel elements under AEC/NRC license. MA.09-4 MA.09-3 Site Disposition: Eliminated - No Authority under FUSRAP - AEC licensed operation MA.09-1 Radioactive Materials Handled: Yes Primary Radioactive Materials Handled: Uranium, Thorium MA.09-1 Radiological Survey(s): None Indicated

360

Atomic Safety and Licensing Board Panel Biennial Report, Fiscal Years 1993--1994. Volume 6  

SciTech Connect

In Fiscal Year 1993, the Atomic Safety and Licensing Board Panel (``the Panel``) handled 30 proceedings. In Fiscal Year 1994, the Panel handled 36 proceedings. The cases addressed issues in the construction, operation, and maintenance of commercial nuclear power reactors and other activities requiring a license form the Nuclear Regulatory Commission. This report sets out the Panel`s caseload during the year and summarizes, highlight, and analyzes how the wide- ranging issues raised in those proceedings were addressed by the Panel`s judges and licensing boards.

NONE

1995-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Environmental Standard Review Plan for the review of license renewal applications for nuclear power plants  

SciTech Connect

The Environmental Standard Review Plan for the Review of License Applications for Nuclear Power Plants (ESRP-LR) is to be used by the NRC staff when performing environmental reviews of applications for the renewal of power reactor licenses. The use of the ESRP-LR provides a framework for the staff to determine whether or not environmental issues important to license renewal have been identified and the impacts evaluated and provides acceptance standards to help the reviewers comply with the National Environmental Policy Act.

O'Brien, J.; Kim, T.J.; Reynolds, S.

1991-08-01T23:59:59.000Z

362

Site Management Guide (Blue Book)  

SciTech Connect

The U.S. Department of Energy (Department) Office of Legacy Management (LM), established in 2003, manages the Departments postclosure responsibilities and ensures the future protection of human health and the environment. During World War II and the Cold War, the Federal government developed and operated a vast network of industrial facilities for the research, production, and testing of nuclear weapons, as well as other scientific and engineering research. These processes left a legacy of radioactive and chemical waste, environmental contamination, and hazardous facilities and materials at well over 100 sites. Since 1989, the Department has taken an aggressive accelerated cleanup approach to reduce risks and cut costs. At most Departmental sites undergoing cleanup, some residual hazards will remain at the time cleanup is completed due to financial and technical impracticality. However, the Department still has an obligation to protect human health and the environment after cleanup is completed. LM fulfills DOEs postclosure obligation by providing long-term management of postcleanup sites which do not have continuing missions. LM is also responsible for sites under the Formerly Utilized Sites Remedial Action Program (FUSRAP). Currently, the U.S. Army Corps of Engineers (USACE) is responsible for site surveys and remediation at FUSRAP sites. Once remediation is completed, LM becomes responsible for long-term management. LM also has responsibility for uranium processing sites addressed by Title II of the Uranium Mill Tailings Radiation Control Act (UMTRCA). UMTRCA Title II sites are sites that were commercially owned and are regulated under a U.S. Nuclear Regulatory Commission (NRC) license. For license termination, the owner must conduct an NRC-approved cleanup of any on-site radioactive waste remaining from former uranium ore-processing operations. The site owner must also provide full funding for inspections and, if necessary, ongoing maintenance. Once site cleanup is complete, LM accepts title to these sites on behalf of the United States and assumes long-term management.

None

2014-03-01T23:59:59.000Z

363

A platform for effective requirements management and collaboration in nuclear compliance and licensing  

SciTech Connect

Buoyed by its promise as a cost effective and low-carbon-footprint source of electricity, the nuclear industry is in the midst of a world-wide renaissance. However, significant challenges, including responding to increased safety and regulatory mandates, making a smooth transition to next-generation reactor technology, and dealing with the adoption of digital instrumentation and control (I and C) systems that rely heavily on software must be effectively addressed to ensure the momentum continues. New technology solutions, such as those developed by IBM's Rational business unit, coupled with well codified processes, policies and best practices leveraged across the nuclear ecosystem's participants have been shown to aid in overcoming these obstacles. This paper will highlight some of the compliance and collaboration challenges facing the extended nuclear ecosystem, describe a potential solution that can aid in addressing the challenges, and present several examples of where the solution has been implemented in the nuclear space. (authors)

Fechtelkotter, P. L. [Rational IBM Software Group, IBM Corporation, Medfield, MA 02052 (United States)

2012-07-01T23:59:59.000Z

364

Model and Analytic Processes for Export License Assessments  

SciTech Connect

This paper represents the Department of Energy Office of Nonproliferation Research and Development (NA-22) Simulations, Algorithms and Modeling (SAM) Program's first effort to identify and frame analytical methods and tools to aid export control professionals in effectively predicting proliferation intent; a complex, multi-step and multi-agency process. The report focuses on analytical modeling methodologies that alone, or combined, may improve the proliferation export control license approval process. It is a follow-up to an earlier paper describing information sources and environments related to international nuclear technology transfer. This report describes the decision criteria used to evaluate modeling techniques and tools to determine which approaches will be investigated during the final 2 years of the project. The report also details the motivation for why new modeling techniques and tools are needed. The analytical modeling methodologies will enable analysts to evaluate the information environment for relevance to detecting proliferation intent, with specific focus on assessing risks associated with transferring dual-use technologies. Dual-use technologies can be used in both weapons and commercial enterprises. A decision-framework was developed to evaluate which of the different analytical modeling methodologies would be most appropriate conditional on the uniqueness of the approach, data availability, laboratory capabilities, relevance to NA-22 and Office of Arms Control and Nonproliferation (NA-24) research needs and the impact if successful. Modeling methodologies were divided into whether they could help micro-level assessments (e.g., help improve individual license assessments) or macro-level assessment. Macro-level assessment focuses on suppliers, technology, consumers, economies, and proliferation context. Macro-level assessment technologies scored higher in the area of uniqueness because less work has been done at the macro level. An approach to developing testable hypotheses for the macro-level assessment methodologies is provided. The outcome of this works suggests that we should develop a Bayes Net for micro-level analysis and continue to focus on Bayes Net, System Dynamics and Economic Input/Output models for assessing macro-level problems. Simultaneously, we need to develop metrics for assessing intent in export control, including the risks and consequences associated with all aspects of export control.

Thompson, Sandra E.; Whitney, Paul D.; Weimar, Mark R.; Wood, Thomas W.; Daly, Don S.; Brothers, Alan J.; Sanfilippo, Antonio P.; Cook, Diane; Holder, Larry

2011-09-29T23:59:59.000Z

365

STI Products Produced by Site/Facility Management Contracts | Scientific  

Office of Scientific and Technical Information (OSTI)

Site/Facility Management Contracts Site/Facility Management Contracts Print page Print page Email page Email page In general, site/facility management contracts provide for Government ownership and unlimited rights for the Government for all technical data first produced in the performance of the contract. One exception to the Government's unlimited rights is data for which the contractor has asserted copyright. For scientific and technical articles submitted to and published in journals, symposia proceedings, or similar works, the contractor can assert copyright without prior permission of DOE, but the Government is granted a nonexclusive, paid-up, irrevocable worldwide license to reproduce, prepare derivative works, distribute copies to the public, and perform publicly and display publicly, by or on behalf of the Government (broad license). The

366

Aging management guideline for commercial nuclear power plants-pumps  

SciTech Connect

This Aging Management Guideline (AMG) describes recommended methods for effective detection and mitigation of age-related degradation mechanisms in BWR and PWR commercial nuclear power plant pumps important to license renewal. The intent of this AMG is to assist plant maintenance and operations personnel in maximizing the safe, useful life of these components. It also supports the documentation of effective aging management programs required under the License Renewal Rule 10 CFR Part 54. This AMG is presented in a manner that allows personnel responsible for performance analysis and maintenance to compare their plant-specific aging mechanisms (expected or already experienced) and aging management program activities to the more generic results and recommendations presented herein.

Booker, S.; Katz, D.; Daavettila, N.; Lehnert, D. [MDC-Ogden Environmental and Energy Services, Southfield, MI (United States)

1994-03-01T23:59:59.000Z

367

Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease |  

NLE Websites -- All DOE Office Websites (Extended Search)

Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease Sci Protek Signs Licensing Deal for Technology that Reduces Plant Disease January 06, 2011 A California based small business, Sci Proteck, Inc, has recently licensed technology developed at the Department of Energy's Oak Ridge National Laboratory (ORNL) and the University of Chicago (UChicago) to protect plants from crop diseases. Research on this new method for inducing plant pathogen resistance began in 2005 following a grant from the National Science Foundation and research support from the Office of Biological and Environmental Research of the U.S. Department of Energy. Principal developers include Timothy Tschaplinski at ORNL and Drs. Jean Greenberg and Ho Won Jung at the UChicago. ORNL and UChicago entered into an Inter-Institutional Agreement for licensing, patent prosecution, and royalty sharing.

368

Better Lucky Than Rich? Welfare Analysis of Automobile License Allocations in Beijing and Shanghai  

E-Print Network (OSTI)

Better Lucky Than Rich? Welfare Analysis of Automobile License Allocations in Beijing and Shanghai externalities from automobile use than a uniform price auction, the advantage is offset by the significant automobile sales in China grew from 2.4 millio

Schweik, Charles M.

369

Atomic Energy and Radioactive Substances: Licensing and Regulation of Sites: The Nuclear Installations Regulations, 1962  

E-Print Network (OSTI)

These regulations, made by the Minister of Power and the Secretary of State for Scotland acting jointly, prescribe for the purpose of subsection (1)(b) of section one of the Nuclear Installations (Licensing and Insurance) Act, 1959, certain classes...

Wood, Richard; Maclay, John. S.

1962-01-01T23:59:59.000Z

370

Y-12 licenses Omni Jaw 5(tm) | National Nuclear Security Administratio...  

National Nuclear Security Administration (NNSA)

Y-12 National Security Complex signed a licensing agreement with start-up company Green Arc Labs (GAL) of Chattanooga for Omni Jaw 5. The hand-held tool, invented a decade...

371

Pricing and licensing of software products and services : a study on industry trends  

E-Print Network (OSTI)

The software product business reached the $150 billion mark at the end of 2005. The pricing and licensing of new products, maintenance services, services and service maintenance have become an important strategy to deliver ...

Nayak, Shivashis

2006-01-01T23:59:59.000Z

372

A hierarchical structure of neural network implemented for the recognition of automobile license plate number  

E-Print Network (OSTI)

A HIERARCHICAL STRUCTURE OF NEURAL NETWORK IMPLEMENTED FOR THE RECOGNITION OF AUTOMOBILE LICENSE PLATE NURSER A Thesis by JOONGHO CHANG Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfdlment... of the requirements for the degree of MASTER OF SCIENCE August 1994 Major Subject: Electrical Engineering A HIERARCHICAL STRUCTURE OF NEURAL NETWORK IMPLEMENTED FOR THE RECOGNITION OF AUTOMOBILE LICENSE PLATE NUMBER A Thesis by JOONGHO CHANG Submitted...

Chang, Joongho

1994-01-01T23:59:59.000Z

373

UCHC Competency Checklist: ANNUAL Position Title: Licensed Practical  

E-Print Network (OSTI)

infusion tubing Chest Drainage System PCA Pump LEVEL 3: UNIT SPECIFIC COMPETENCIES Peritoneal Dialysis Review & Audits Delirium: Risk Identification and Management (Med 4) Insulin: Continuous Infusion Falls (High Risk Meds. ­ chemotherapy, heparin infusions, insulin cont. infusions, insulin subcutaneous

Oliver, Douglas L.

374

Negotiating equity for management of DOE wastes  

SciTech Connect

One important factor frustrating optimal management of Department of Energy (DOE)-complex wastes is the inability to use licensed and permitted facilities systematically. Achieving the goal of optimal use of DOE`s waste management facilities is politically problematic for two reasons. First, no locale wants to bear a disproportionate burden from DOE wastes. Second, the burden imposed by additional wastes transported from one site to another is difficult to characterize. To develop a viable framework for equitably distributing these burdens while achieving efficient use of all DOE waste management facilities, several implementation and equity issues must be addressed and resolved. This paper discusses stakeholder and equity issues and proposes a framework for joint research and action that could facilitate equity negotiations among stakeholder and move toward a more optimal use of DOE`s waste management capabilities.

Carnes, S.A.

1994-09-01T23:59:59.000Z

375

Document: P1332 Category: Physical Sciences, Chemical/Materials License Status: Available for licensing Texas Industry Cluster: Petroleum Refining & Chemical Products  

E-Print Network (OSTI)

Protection Agency states: "Accelerating the development of fuel cells and hydrogen is one of the most. This solution offers not only reduced cost of the fuel cell catalyst but also improved performance. Benefits for licensing Texas Industry Cluster: Petroleum Refining & Chemical Products Lower-cost fuel cells Problem

Lightsey, Glenn

376

Microsoft Word - IT_Project_Management_Profile_1 9 2008.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Please note the training requirements will be updated based on new requirements for project managers to comply with FAC Please note the training requirements will be updated based on new requirements for project managers to comply with FAC P/PM (Federal Acquisition Certification for Program and Project Managers) requirements. Revised 10/18/2007 Information Technology (IT) Project Manager (PM) Profile *Must be completed *Name: _____________________________________ *Tel No: __________________*Title: _________________ *Fed/Contractor: ____________ *Program Office: ___________*Email: __________________________________ Project Cost*: ____________________________Certificates/Licenses: _____________________________ *Years PM Experience in DOE: _______ In Other Agencies: ____ In Private Sector: ______ *Aggregate costs over a 5 year period for all projects currently managed and identified on Exhibit 53s/Exhibit 300s.

377

Redesignation Order No. 00-09.01 to the Assistant Secretary for Environmental Management  

Directives, Delegations, and Requirements

Redesignation of the Assistant Secretary for Environmental Management of DOE as the authorized representative to perform as the "Authorized Representative," as that term is used in the Nuclear Regulatory Commission (NRC) regulations at 10 CFR 72.16(b) and as name holder of the NRC license under 10 CFR Part 72 of for the Idaho Spent Fuel Facility Independent Spent Fuel Storage Installation.

2006-05-12T23:59:59.000Z

378

Moving Beyond NDE to Proactive Management of Materials Degradation  

SciTech Connect

There is growing interest in life extensions to enable longer term operation (LTO) for both existing nuclear power plants (NPPs) and proposed new NPPs. In order to justify an initial license extension for the 40-60 year period, new non-destructive examination (NDE) approaches have been developed and deployed by NPP operators in their Aging Management Programs (AMPs). However, to achieve the goals of even longer term operation, and specifically for the USA in looking at methodologies to support subsequent license renewal periods (i.e., 60-80 years, and beyond), it is necessary to understand the capabilities of current NDE methods to detect, monitor and trend degradation and hence enable timely implementation of appropriate corrective actions. This paper discusses insights from past experience, the state-of-the-art, and current activities in the move towards providing a capacity for proactive management of materials degradation (PMMD) to support NPP LTO.

Bond, Leonard J.

2010-07-20T23:59:59.000Z

379

Moving Beyond Nondestructive Examination to Proactive Management of Materials Degradation  

SciTech Connect

There is growing interest in life extensions to enable longer term operation (LTO) for both existing nuclear power plants (NPPs) and proposed new NPPs. In order to justify an initial license extension for the 40-60 year period, new non-destructive examination (NDE) approaches have been developed and deployed by NPP operators in their Aging Management Programs (AMPs). However, to achieve the goals of even longer term operation, and specifically for the USA in looking at methodologies to support subsequent license renewal periods (i.e., 60-80 years, and beyond), it is necessary to understand the capabilities of current NDE methods to detect, monitor and trend degradation and hence enable timely implementation of appropriate corrective actions. This paper discusses insights from past experience, the state-of-the-art, and current activities in the move towards providing a capacity for proactive management of materials degradation (PMMD) to support NPP LTO.

Bond, Leonard J.

2010-07-01T23:59:59.000Z

380

New Licensing Agreement Opens Energy Patents to NGOs, Non-Profits |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Licensing Agreement Opens Energy Patents to NGOs, Non-Profits Licensing Agreement Opens Energy Patents to NGOs, Non-Profits New Licensing Agreement Opens Energy Patents to NGOs, Non-Profits February 17, 2012 - 11:20am Addthis To reduce the amount of firewood Darfur refugees need, Berkeley Lab scientist Ashok Gadgil and colleagues modified an existing cookstove design to create one that is 75 percent more energy-efficient than the three-stone stove traditionally used in Darfur, and is appropriate to the environmental conditions and food preferences of the local inhabitants. | Photo courtesy of Lawrence Berkeley National Laboratory. To reduce the amount of firewood Darfur refugees need, Berkeley Lab scientist Ashok Gadgil and colleagues modified an existing cookstove design to create one that is 75 percent more energy-efficient than the three-stone

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Program Managers  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Managers Program Managers Enabling remarkable discoveries and tools that transform our understanding of energy and matter and advance national, economic, and energy...

382

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

383

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

in saving lives, poor sanitation, unclean water (Photo2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

384

Smart Radio Spectrum Management for Cognitive Radio  

E-Print Network (OSTI)

Today's wireless networks are characterized by fixed spectrum assignment policy. The limited available spectrum and the inefficiency in the spectrum usage necessitate a new communication paradigm to exploit the existing wireless spectrum opportunistically. Cognitive radio is a paradigm for wireless communication in which either a network or a wireless node changes its transmission or reception parameters to communicate efficiently avoiding interference with licensed or unlicensed users. In this work, a fuzzy logic based system for spectrum management is proposed where the radio can share unused spectrum depending on some parameters like distance, signal strength, node velocity and availability of unused spectrum. The system is simulated and is found to give satisfactory results.

Bhattacharya, Partha Pratim; Gera, Rishita; Agarwal, Anjali

2011-01-01T23:59:59.000Z

385

Preparing to Submit a License Application for Yucca Mountain  

SciTech Connect

In 1982, the U.S. Congress passed the Nuclear Waste Policy Act, a Federal law that established U.S. policy for the permanent disposal of spent nuclear fuel and high-level radioactive waste. Congress amended the Act in 1987, directing the Department of Energy to study only Yucca Mountain, Nevada as the site for a permanent geologic repository. As the law mandated, the Department evaluated Yucca Mountain to determine its suitability as the site for a permanent geologic repository. Decades of scientific studies demonstrated that Yucca Mountain would protect workers, the public, and the environment during the time that a repository would be operating and for tens of thousands of years after closure of the repository. A repository at this remote site would also: preserve the quality of the environment; allow the environmental cleanup of Cold War weapons facilities; provide the nation with additional protection from acts of terrorism; and support a sound energy policy. Throughout the scientific evaluation of Yucca Mountain, there has been no evidence to disqualify Yucca Mountain as a suitable site for the permanent disposal of spent nuclear fuel and high-level radioactive waste. Upon completion of site characterization, the Secretary of Energy considered the results and concluded that a repository at Yucca Mountain would perform in a manner that protects public health and safety. The Secretary recommended the site to the President in February 2002; the President agreed and recommended to Congress that the site be approved. The Governor of Nevada submitted a notice of disapproval, and both houses of Congress acted to override the disapproval. In July 2002, the President's approval allowed the Department to begin the process of submittal of a license application for Yucca Mountain as the site for the nation's first repository for spent nuclear fuel and high-level radioactive waste. Yucca Mountain is located on federal land in Nye County in southern Nevada, an arid region of the United States, approximately 100 miles (160 kilometers) northwest of Las Vegas (Figure 1). The location is remote from population centers, and there are no permanent residents within approximately 14 miles (23 km) of the site. Overall, Nye County has a population density of about two persons per square mile (two persons per 2.5 square km); in the vicinity of Yucca Mountain, it is significantly less. Yucca Mountain is a series of north-south-trending ridges extending approximately 25 miles (40 km), and consists of successive layers of fine-grained volcanic tuffs, millions of years old, underlain by older carbonate rocks. The alternating layers of welded and nonwelded volcanic tuffs have differing hydrologic properties that significantly impact the manner in which water moves through the mountain. The repository horizon will be in welded tuff located in the unsaturated zone, more than 1,000 feet (300 meters) above the water table in the present-day climate, and is expected to remain well above the water table during wetter future climate conditions. Future meteorology and climatology at Yucca Mountain are important elements in understanding the amount of water available to potentially interact with the waste.

W.J. Arthur; M.D. Voegele

2005-03-14T23:59:59.000Z

386

Developing a More Effective Creative Operations Management System for Creative Businesses  

E-Print Network (OSTI)

too expensive and complicated for most users. They require the purchase of additional hardware or software, or are delivered via a subscription service (and if the subscription is terminated, all data is lost). According to interviews with actual... Manager is a relational database that costs $1,845.00 up front, and requires the purchase of multiple licenses of another software applica- tion (FileMaker Pro) in order to use it. Online project management systems are less expensive, but require...

Hembree, Ryan Matthew

2011-12-31T23:59:59.000Z

387

Reducing Uncertainty in Fisheries Management: The Time for Fishers' Ecological Knowledge  

E-Print Network (OSTI)

who knowingly fish illegally should lose their licenses permanently. 1.63 1.61 ** -1.35 St. Croix needs more fishery officers. 0.58 ** -0.70 0.73 Fishery officers should be more visible within the fishing community. -0.05 -0.06 0.03 Penalties... for illegally fishing are not severe enough to deter licensed fishers. 0.85 0.98 * 1.43 Regulations against unlicensed commercial fishing should be enforced strongly. 1.28 1.04 1.42 Management should expand the use of daily catch limits. ** -1.56 ** 0...

Carr, Liam

2012-07-16T23:59:59.000Z

388

Conference Management  

Directives, Delegations, and Requirements

To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

1999-11-03T23:59:59.000Z

389

SAPHIRE 8 Software Configuration Management Plan  

SciTech Connect

The INL software developers use version control for both the formally released SAPHIRE versions, as well as for source code. For each formal release of the software, the developers perform an acceptance test: the software must pass a suite of automated tests prior to official release. Each official release of SAPHIRE is assigned a unique version identifier. The release is bundled into a standard installation package for easy and consistent set-up by individual users. Included in the release is a list of bug fixes and new features for the current release, as well as a history of those items for past releases. Each formal release of SAPHIRE will have passed an acceptance test. In addition to assignment of a unique version identifier for an official software release, each source code file is kept in a controlled library. Source code is a collection of all the computer instructions written by developers to create the finished product. The library is kept on a server, where back-ups are regularly made. This document describes the configuration management approach used as part of the SAPHIRE development.

Curtis Smith

2010-01-01T23:59:59.000Z

390

File:03MTDLandUseLicenseProcess (1).pdf | Open Energy Information  

Open Energy Info (EERE)

MTDLandUseLicenseProcess (1).pdf MTDLandUseLicenseProcess (1).pdf Jump to: navigation, search File File history File usage File:03MTDLandUseLicenseProcess (1).pdf Size of this preview: 463 × 599 pixels. Other resolution: 464 × 600 pixels. Full resolution ‎(1,275 × 1,650 pixels, file size: 24 KB, MIME type: application/pdf) File history Click on a date/time to view the file as it appeared at that time. Date/Time Thumbnail Dimensions User Comment current 12:05, 1 October 2012 Thumbnail for version as of 12:05, 1 October 2012 1,275 × 1,650 (24 KB) Dklein2012 (Talk | contribs) You cannot overwrite this file. Edit this file using an external application (See the setup instructions for more information) File usage The following 2 pages link to this file: GRR/Flowcharts GRR/Section 3-MT-d - Land Use License Process

391

Business Ymwet Centlsaem: Enclosed is AEC Special Nuclear Material License Yo. SW-551, as  

Office of Legacy Management (LM)

c-ii 3-y c-ii 3-y !WL?DF!i 70.424 SW-551, 9s renewed AUG 9 196s cmhustian En&merin~, Inc. %.lelcar Division tYindter, Connecticut ,~ttentionr ?tr. 5. ff. Shfp,penbmg: Business Ymwet Centlsaem: Enclosed is AEC Special Nuclear Material License Yo. SW-551, as renewed. Very tTuly yours, fkmald A. Nusshauaer, Chief Saurce 4 Specfel Wcleer Yaterials Brmch Ofvision of Meterbls Licensing EnClOSUWl W W m , as renwed DISTRIBUTION: Ccaplianee, HQs 2 w/encl. H. j. McAlduff, OR00 w/encl. D. George, ?MM w/mcl. N. Dtilos, ML w/emCl, C. Luke, ML w/end. Br. RF w/encl. Div. RF w/o encl. UNITED STATES ATOMIC ENERGY COMMISSION SPECIAL NUCLEAR MATERIAL LICENSE Pursuant to the Atomic Energy Act of 1954 and Title 10, Code of Federal Regulations, Chapter 1, Part 70, "Special Nuclear Material Regulations," a license is hereby issued authorizing the licensee

392

2012 Old City Publishing, Inc. Published by license under the OCP Science imprint,  

E-Print Network (OSTI)

©2012 Old City Publishing, Inc. Published by license under the OCP Science imprint, a member and Computer Engineering, The Johns Hopkins University, 3400 North Charles Street, Baltimore, MD 21218, USA We briefly review the pilot ideas on the generation of electromagnetic (EM)-pulses much shorter than already

Kaplan, Alexander

393

Application for Replacement of Certificates, Permits, or Licenses Page 1 of 4  

E-Print Network (OSTI)

Application for Replacement of Certificates, Permits, or Licenses Page 1 of 4 Revised: 12/10/2012 OMB Control No. 0648-0272 Expiration Date: 11/30/2015 APPLICATION FOR REPLACEMENT OF CERTIFICATES Person ID: 3. Business Mailing Address: [ ] Permanent or [ ] Temporary 4. Date of Birth or Date

394

PATENTING AND LICENSING The major thrust of the Technology Transfer Office's activity is directed towards  

E-Print Network (OSTI)

PATENTING AND LICENSING The major thrust of the Technology Transfer Office's activity that he or she may have created an invention, to promptly report it to the Technology Transfer Office. 2. Patentability Determination After the invention is reported to the Technology Transfer Office

395

MCM2-7 Form Double Hexamers at Licensed Origins in Xenopus Egg Extract*S  

E-Print Network (OSTI)

the origin recog- nition complex (ORC)4 binds to DNA at the origin, and DNA- bound ORC then recruits the Cdt1- and Cdc6-licensing pro- teins. Finally, in an ATP-consuming reaction ORC, Cdc6 and Cdt1 cooperate to load

Blow, J. Julian

396

INDEX of PADSTE HIGHLIGHTS June 3, 2009 Helper plasmid display technology licensed  

E-Print Network (OSTI)

CHEMISTRY X-ray radiography of internal, subsonic burning of explosives EARTH AND ENVIRONMENTAL SCIENCES Low of radioactive waste forms PHYSICS New microfluidics facility in P-23 THEORETICAL Mathematical regularities the licensing effort for this technology. CHEMISTRY X-ray radiography of internal, subsonic burning

397

Licensing Uncertain Patents: Per-Unit Royalty vs. Up-Front Fee  

E-Print Network (OSTI)

Licensing Uncertain Patents: Per-Unit Royalty vs. Up-Front Fee David Encaouay and Yassine Lefouiliz schemes are investigated: the per-unit royalty rate and the up-front fee. We provide conditions under-unit royalty scheme, the opportunity to do so does not exist under the up-front fee scheme. We also establish

Boyer, Edmond

398

Journal of Mathematical Economics 21 (1992) 483-508. North-Holland Optimal licensing  

E-Print Network (OSTI)

royalty in terms of the patentee's profit, licensees' profit, industry structure, and the product's price of a royalty is inferior to the other modes, both for consumers and the patentee. The firms' profits decline, or for a per unit royalty. Early work on licensing of cost reducing innovation can be traced back to Arrow

Oren, Shmuel S.

399

POLICY STATEMENT University of Georgia Research Foundation, Inc. Policy on Equity Acquisition in Licensing  

E-Print Network (OSTI)

POLICY STATEMENT University of Georgia Research Foundation, Inc. Policy on Equity Acquisition the interests of the company over their responsibilities to UGARF and the University of Georgia. This Policy with this Policy. II. Policy In the course of intellectual property licensing, UGARF, through the work of TCO, may

Arnold, Jonathan

400

ECONOMIC MODELING OF RE-LICENSING AND DECOMMISSIONING OPTIONS FOR THE  

E-Print Network (OSTI)

ECONOMIC MODELING OF RE-LICENSING AND DECOMMISSIONING OPTIONS FOR THE KLAMATH BASIN HYDROELECTRIC, and steelhead trout on the West Coast of the United States. PacifiCorp's 169-megawatt Klamath Hydroelectric Hydroelectric Project is the only thorough, objective and transparent assessment tool that analyzes the cost

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Strategic Basis for License Application Planning for a Potential Yucca Mountain Repository  

SciTech Connect

If Yucca Mountain, Nevada is designated as the site for development of a geologic repository for disposal of spent nuclear fuel and high-level radioactive waste, the Department of Energy (DOE) must obtain Nuclear Regulatory Commission (NRC) approval first for repository construction, then for an operating license, and, eventually, for repository closure and decommissioning. The licensing criteria defined in Code of Federal Regulations, Title 10, Part 63 (10 CFR Part 63) establish the basis for these NRC decisions. Submittal of a license application (LA) to the NRC for authorization to construct a repository at the Yucca Mountain site is, at this point, only a potential future action by the DOE. The policy process defined in the Nuclear Waste Policy Act (NWPA), as amended, for recommendation and designation of Yucca Mountain as a repository site makes it difficult to predict whether or when the site might be designated. The DOE may only submit a LA to the NRC if the site designation takes effect. In spite of this uncertainty, the DOE must take prudent and appropriate action now, and over the next several years, to prepare for development and timely submittal of a LA. This is particularly true given the need for the DOE to develop, load, and certify the operation of its electronic information system to provide access to its relevant records as part of the licensing support network (LSN) in compliance with NRC requirements six months prior to LA submittal. The DOE must also develop a LA, which is a substantially different document from those developed to support a Site Recommendation (SR) decision. The LA must satisfy NRC licensing criteria and content requirements, and address the acceptance criteria defined by the NRC in its forthcoming Yucca Mountain Review Plan (YMRP). The content of the LA must be adequate to facilitate NRC acceptance and docketing for review, and the LA and its supporting documents must provide the documented basis for the NR C findings required for a construction authorization. The LA must also support a licensing proceeding before an Atomic Safety and Licensing Board panel prior to NRC action on any decision to authorize construction. The DOE has established a strategic basis for planning that is intended to provide the framework for development of an integrated plan for activities leading to preparation and submittal of a LA.

Newberry, C. M.; Brocoum, S. J.; Gamble, R. P.; Murray, R. C.; Cline, M.

2002-02-26T23:59:59.000Z

402

Current Regulations and Guidance - New Approaches for Risk-Informed Low-Level Radioactive Waste Management  

SciTech Connect

This paper presents the historical foundations and future challenges for commercial low-level radioactive waste (LLRW) management in the United States. LLRW has been managed at government facilities since the beginning of the nuclear age and in the commercial sector since the early 1960's. Over the intervening years many technical, management and regulatory changes have occurred. Significant progress has been made in waste form, waste packaging and in recognizing radionuclides important to performance of disposal technologies and disposal facilities. This presentation will examine approaches using existing regulations and risk-informed approaches to improve guidance, licensing and management of LLRW. (authors)

Ryan, M.T. Ph.D.; CHP [Advisory Committee on Nuclear Waste and Materials, U.S. Nuclear Regulatory Commission, Washington, D.C. (United States)

2008-07-01T23:59:59.000Z

403

Redesignation Order No. 00-09.01-01 to the Manager of Department of Energy Idaho Operations Office  

Directives, Delegations, and Requirements

Redesignation of the Manager of the Idaho Operations Office as the representative to perform as the "authorized representative," as that term is used in the NRC regulations at 10 CFR 72.16(b), and as name holder of the NRC license under 10 CFR 72 for the Idaho Spent Fuel Facility Independent Spent Fuel Storage Installation.

2006-05-12T23:59:59.000Z

404

Management Responsibilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Responsibilities Management Responsibilities Depleted UF6 Management Responsibilities DOE has responsibility for safe and efficient management of approximately 700,000 metric tons of depleted UF6. Organizational Responsibilities In the United States, the U.S. Department of Energy is responsible for managing all the depleted uranium that has been generated by the government and has been declared surplus to national defense needs. In addition, as a result of two memoranda of agreement that have been signed between the DOE and USEC, the DOE has assumed management responsibility for approximately 145,000 metric tons of depleted UF6 that has been or will be generated by USEC. Any additional depleted UF6 that USEC generates will be USEC's responsibility to manage. DOE Management Responsibility

405

Aging Management Guideline for commercial nuclear power plants: Power and distribution transformers  

SciTech Connect

This Aging Management Guideline (AMG) provides recommended methods for effective detection and mitigation of age-related degradation mechanisms in power and distribution transformers important to license renewal in commercial nuclear power plants. The intent of this AMG to assist plant maintenance and operations personnel in maximizing the safe, useful life of these components. It also supports the documentation of effective aging management programs required under the License Renewal Rule 10 CFR Part 54. This AMG is presented in a manner which allows personnel responsible for performance analysis and maintenance to compare their plant-specific aging mechanisms (expected or already experienced) and aging management program activities to the more generic results and recommendations presented herein.

Toman, G.; Gazdzinski, R. [Sandia National Labs., Albuquerque, NM (United States)

1994-05-01T23:59:59.000Z

406

Aging Management Guideline for commercial nuclear power plants: Motor control centers; Final report  

SciTech Connect

This Aging Management Guideline (AMG) provides recommended methods for effective detection and mitigation of age-related degradation mechanisms in Boiling Water Reactor (BWR) and Pressurized Water Reactor (PWR) commercial nuclear power plant motor control centers important to license renewal. The intent of this AMG is to assist plant maintenance and operations personnel in maximizing the safe, useful life of these components. It also supports the documentation of effective aging management programs required under the License Renewal Rule 10 CFR Part 54. This AMG is presented in a manner that allows personnel responsible for performance analysis and maintenance to compare their plant-specific aging mechanisms (expected or already experienced) and aging management program activities to the more generic results and recommendations presented herein.

Toman, G.; Gazdzinski, R.; O`Hearn, E. [Ogden Environmental and Energy Services Co., Inc., Blue Bell, PA (United States)

1994-02-01T23:59:59.000Z

407

Aging Management Guideline for commercial nuclear power plants: Electrical switchgear. Final report  

SciTech Connect

This Aging Management Guideline (AMG) provides recommended methods for effective detection and mitigation of age-related degradation mechanisms in BWR and PWR commercial nuclear power plant electrical switchgear important to license renewal. The latent of this AMG to assist plant maintenance and operations personnel in maximizing the safe, useful life of these components. It also supports the documentation of effective aging management programs required under the License Renewal Rule 10 CFR Part 54. This AMG is presented in a manner which allows personnel responsible for performance analysis and maintenance, to compare their plant-specific aging mechanisms (expected or already experienced) and aging management program activities to the more generic results and recommendations presented herein.

Toman, G.; Gazdzinski, R.; Schuler, K. [Ogden Environmental and Energy Services Co., Inc., Blue Bell, PA (United States)

1993-07-01T23:59:59.000Z

408

Federal Energy Management Program: Energy Management Guidance  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Management Energy Management Guidance to someone by E-mail Share Federal Energy Management Program: Energy Management Guidance on Facebook Tweet about Federal Energy Management Program: Energy Management Guidance on Twitter Bookmark Federal Energy Management Program: Energy Management Guidance on Google Bookmark Federal Energy Management Program: Energy Management Guidance on Delicious Rank Federal Energy Management Program: Energy Management Guidance on Digg Find More places to share Federal Energy Management Program: Energy Management Guidance on AddThis.com... Requirements by Subject Requirements by Regulation Notices & Rules Guidance Facility Reporting Fleet Reporting Energy Management Guidance The Federal Energy Management Program (FEMP) provides guidance on Federal

409

Environmental Management Waste Management Facility (EMWMF) at...  

Office of Environmental Management (EM)

Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Environmental Management Waste Management Facility (EMWMF) at Oak Ridge Full Document and Summary Versions...

410

INVESTMENT MANAGEMENT OFFICE MANAGEMENT OFFICE  

E-Print Network (OSTI)

INVESTMENT MANAGEMENT OFFICE INVESTMENT MANAGEMENT OFFICE THE UNIVERSITY OF UTAH University of Utah | Investment Management Office Quarterly Summary The Endowment Pool had a positive first quarter (ending March gain from investments of $7.8 million. The Endowment Pool unit value of $100 has grown to $175 in 10

411

Statement by Deputy Secretary of Energy Clay Sell on NRG's License  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

by Deputy Secretary of Energy Clay Sell on NRG's by Deputy Secretary of Energy Clay Sell on NRG's License Application Statement by Deputy Secretary of Energy Clay Sell on NRG's License Application September 25, 2007 - 2:49pm Addthis "Today marks the most significant and tangible step to date, towards the construction of the first new nuclear power plant in the United States in over 30 years. DOE is confident that with NRG's reactor design selection and cooperation with their partners, General Electric and Toshiba, this project will likely result in the first of many new reactors being constructed and operated in the U.S. This reactor would join an American nuclear industry that is safe, secure and has a strong record to prove it. We look forward to the continued cooperation with industrial partners and

412

STATEMENT OF CONSIDERATIONS REQUEST BY CHEMICAL RESEARCH AND LICENSING COMPANY FOR AN  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 12:09 FR IPL DOE CH 630 252 2??9 TO RGCP-HO P. 02/03 4 12:09 FR IPL DOE CH 630 252 2??9 TO RGCP-HO P. 02/03 * * STATEMENT OF CONSIDERATIONS REQUEST BY CHEMICAL RESEARCH AND LICENSING COMPANY FOR AN ADVANCE WAIVER OF PATENT RIGHTS UNDER DOE COOPERATIVE AGREEMENT NO- DE-FC36-04G014152; ENTITLED "ADVANCES IN PROCESS INTENSIFICATION THROUGH MULTI-FUNCTIONAL REACTOR ENGINEERING"; W(A)-04-057;CH-1227 As set out in the attached waiver petition and in subsequent discussions with DOE Patent Counsel, Chemical Research and Licensing Company (CR&L) has requested an advance waiver of domestic and foreign patent rights for all subject inventions made under the above-identified cooperative agreement by its employees and its subcontractors' employees, regardless of tier, except inventions made by subcontractors eligible to retain title to inventions

413

Special Report on "Allegations of Conflict of Interest Regarding Licensing of PROTECT by Argonne National Laboratory"  

SciTech Connect

In February 2009, the Office of Inspector General received a letter from Congressman Mark Steven Kirk of Illinois, which included constituent allegations that an exclusive technology licensing agreement by Argonne National Laboratory was tainted by inadequate competition, conflicts of interest, and other improprieties. The technology in question was for the Program for Response Options and Technology Enhancements for Chemical/Biological Terrorism, commonly referred to as PROTECT. Because of the importance of the Department of Energy's technology transfer program, especially as implementation of the American Recovery and Reinvestment Act matures, we reviewed selected aspects of the licensing process for PROTECT to determine whether the allegations had merit. In summary, under the facts developed during our review, it was understandable that interested parties concluded that there was a conflict of interest in this matter and that Argonne may have provided the successful licensee with an unfair advantage. In part, this was consistent with aspects of the complaint from Congressman Kirk's constituent.

None

2009-08-01T23:59:59.000Z

414

Argonne, Evigia finalize licensing agreement for next-gen RFID sensor  

NLE Websites -- All DOE Office Websites (Extended Search)

See related See related New RFID technology tracks and monitors nuclear materials Argonne, Evigia finalize licensing agreement for next-gen RFID sensor technology By Angela Hardin * July 16, 2012 Tweet EmailPrint System enables monitoring, tracking and securing of nuclear material ANN ARBOR, Mich. and ARGONNE, Ill. (July 16, 2012)-Evigia Systems and the U.S. Department of Energy's (DOE) Argonne National Laboratory announced today that they have finalized a licensing agreement under which Argonne's patented, application-specific radio-frequency identification (RFID) sensor/seal technology and its custom-developed ARG-US software suite will be further developed and marketed by Evigia as a comprehensive nuclear and hazardous material handling solution. The system, jointly developed by Evigia and Argonne, adds sophisticated

415

09.02.99.M0.03 Licensing and Trademark Usage Page 1 of 5 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network (OSTI)

appropriate uses by Officially Licensed Vendors assuring that only quality products bear the University or inconsistent with the image and mission of an educational institution. University rule 07.03.01.M1 governs

416

u.s. DEPART1I'IENT OF ENERGY EERE PROJECT MANAGEMENT CENTER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

I'IENT OF ENERGY I'IENT OF ENERGY EERE PROJECT MANAGEMENT CENTER NEPA DETERl'vIINATION RECIPIENT:MI Department of Energy, labor & Economic Growth PROJECT TITLE: Green Chemistry - CEAM Phase 3 - Working Bug LLC Page 1 of2 STATE: MI Funding Opportunity Announcement Number Procurement Instrument Number NEPA Control Number em Number DE-FOA-OOOOO52 DE-EEOOOO166 GFO..oooo166-033 GOO Based on my review oftbe informalion concerning tbe proposed action, ali NEPA Compliance Officer (authorized under DOE Order 4S1.IA).1 bave made the following determination: ex, EA, EIS APPENDIX AND NUMBER: Description: 85.1 Actions to conserve energy. demonstrate potential energy conservation, and promote energy-efficiency that do not increase the indoor concentrations of potentially harmful substances. These actions may involve financial and technical

417

Regulatory Review of the Safety Case for Siting Licensing of Saligny Low and Intermediate Waste Repository  

SciTech Connect

The paper contains the regulatory review comments produced following submission of siting license application of Saligny repository. The regulatory review was conducted in order to verify the compliance with Romanian regulatory criteria and requirements. After assessment of completeness of safety case and availability of supporting documents the review the main technical areas started. The review process was focused on the site characteristics, waste characteristics, safety considerations as scenarios development, mathematical models, identification and treatment of uncertainties, availability of parameters. (authors)

Dogaru, D.M. [National Commission for Nuclear Activities Control, 5 Bucharest (Romania)

2008-07-01T23:59:59.000Z

418

Uranium-Loaded Water Treatment Resins: 'Equivalent Feed' at NRC and Agreement State-Licensed Uranium Recovery Facilities - 12094  

SciTech Connect

Community Water Systems (CWSs) are required to remove uranium from drinking water to meet EPA standards. Similarly, mining operations are required to remove uranium from their dewatering discharges to meet permitted surface water discharge limits. Ion exchange (IX) is the primary treatment strategy used by these operations, which loads uranium onto resin beads. Presently, uranium-loaded resin from CWSs and mining operations can be disposed as a waste product or processed by NRC- or Agreement State-licensed uranium recovery facilities if that licensed facility has applied for and received permission to process 'alternate feed'. The disposal of uranium-loaded resin is costly and the cost to amend a uranium recovery license to accept alternate feed can be a strong disincentive to commercial uranium recovery facilities. In response to this issue, the NRC issued a Regulatory Issue Summary (RIS) to clarify the agency's policy that uranium-loaded resin from CWSs and mining operations can be processed by NRC- or Agreement State-licensed uranium recovery facilities without the need for an alternate feed license amendment when these resins are essentially the same, chemically and physically, to resins that licensed uranium recovery facilities currently use (i.e., equivalent feed). NRC staff is clarifying its current alternate feed policy to declare IX resins as equivalent feed. This clarification is necessary to alleviate a regulatory and financial burden on facilities that filter uranium using IX resin, such as CWSs and mine dewatering operations. Disposing of those resins in a licensed facility could be 40 to 50 percent of the total operations and maintenance (O and M) cost for a CWS. Allowing uranium recovery facilities to treat these resins without requiring a license amendment lowers O and M costs and captures a valuable natural resource. (authors)

Camper, Larry W.; Michalak, Paul; Cohen, Stephen; Carter, Ted [Nuclear Regulatory Commission (United States)

2012-07-01T23:59:59.000Z

419

A sensing policy based on the statistical property of licensed channel in cognitive network  

Science Journals Connector (OSTI)

Many spectrum usage measurement reports have shown that the fixed-frequency allocation mechanism causes unbalanced resource occupancy. Most of the current sensing policies assume the same utilisation rate for various channels. Therefore, their performance cannot be optimised in the presence of sensing constraints. This paper proposes a modified sensing policy based on the statistical property of licensed channels. Using the negotiation rule and the statistics sensing results for the perception phase, the proposed approach can always select the licensed channels with the lowest statistical occupation number. The probability statistics approach is used to formulate the proposed sensing policies for the saturation network. Both analytical and simulation results are presented to validate the proposed model. The results show that our proposed sensing policy can maintain sensing efficiency without adding constraints and also guarantee that more available licensed channels are available. In addition, the computational cost, i.e., sensing number and time, can be reduced. We conclude that our proposed sensing policy can make full use of spectrum resources to improve network throughput.

Lian-Fen Huang; Zi-Long Gao; Dan Guo; Han-Chieh Chao; Jong Hyuk Park

2010-01-01T23:59:59.000Z

420

Federal Energy Management Program: Computerized Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Computerized Computerized Maintenance Management Systems to someone by E-mail Share Federal Energy Management Program: Computerized Maintenance Management Systems on Facebook Tweet about Federal Energy Management Program: Computerized Maintenance Management Systems on Twitter Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Google Bookmark Federal Energy Management Program: Computerized Maintenance Management Systems on Delicious Rank Federal Energy Management Program: Computerized Maintenance Management Systems on Digg Find More places to share Federal Energy Management Program: Computerized Maintenance Management Systems on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

LRRB Pavement Management Systems Pavement Management Systems  

E-Print Network (OSTI)

LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

Minnesota, University of

422

SUBCONTRACT MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

-1 -1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish, document, and maintain adequate purchasing systems. 2. To ensure contractors flow down contract requirements to subcontractors. WHY IS SUBCONTRACT MANAGEMENT IMPORTANT? In many Department prime contracts a significant portion of the obligated dollars is spent on subcontract work. Due to the absence of a direct contractual relationship with the subcontractor, the Department must rely on the prime contractor to manage subcontract work. Subcontractors perform significant work efforts at sites and are an integral part of the site's success. Prime

423

Program Manager  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

424

Water Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

425

Position Management  

Directives, Delegations, and Requirements

The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

1992-06-23T23:59:59.000Z

426

MANAGEMENT (MNG)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

427

DEACTIVATION MANAGEMENT  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MANAGEMENT MANAGEMENT The purpose here is to provide information for specific aspects of project management that apply to deactivation. Overall management of deactivation projects should use a traditional project management approach, and as such is not addressed. The following specific topics are based on lessons learned during deactivation of DOE facilities.  The Deactivation Mission  The Stabilization/Deactivation "Customer"  Project Approach for a Complex Facility  Establishing the Overall End-State  Viewing Deactivation in Two Phases  Early Decisions  Early Deactivation Tasks  Facility-Specific Commitments  Hazard Reduction  Detailed End-Points  Set Up Method and Criteria  Post-Deactivation S&M Plan

428

BachelorofManagement InternationalManagement  

E-Print Network (OSTI)

on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

Seldin, Jonathan P.

429

Privacy in an Ambient World (PAW) Using licenses and private computing as PET  

E-Print Network (OSTI)

management. To limit unwanted and surreptitious private information collection, private computing schemes

Hoepman, Jaap-Henk

430

A licensing plan for coupling a nuclear energy source to a chemical process plant : SASOL Secunda as a case study / Randall Ruben Lavelot.  

E-Print Network (OSTI)

??The purpose of the research study was to identify the implications of the licensing processrelated costs for coupling high temperature reactor(s) (HTR) to the SASOL (more)

Lavelot, Randall Ruben

2014-01-01T23:59:59.000Z

431

Did Apples refusal to license proprietary information enabling interoperability with its iPod music player constitute an abuse under Article 82 of the EC Treaty?  

E-Print Network (OSTI)

Did Apples refusal to license proprietary informationtechnology that allowed Apple, as the creator of amises en uvre par la socit Apple Computer, Inc. dans les

Mazziotti, Giuseppe

2005-01-01T23:59:59.000Z

432

A process for reducing the licensing burden for new products containing depleted uranium.  

SciTech Connect

This report is intended to provide guidance on the process for petitioning the U.S. Nuclear Regulatory Commission (NRC) to initiate a rulemaking that could reduce the licensing burden for new products containing depleted uranium (DU), which are being investigated by the DU Uses Research and Development (R&D) Program at Oak Ridge National Laboratory (ORNL). The focus is on requirements of the NRC rulemaking process applicable to establishing new exemptions or general licenses for products and devices containing source material. NRC policies and guidance regarding such requirements are described, including a 1965 policy statement on approval of new exemptions for products containing radionuclides (''Federal Register'', Volume 30, page 3462 [30 FR 3462]; March 16, 1965) and Regulatory Guide 6.7, which addresses the contents of environmental reports that support rulemaking petitions seeking exemptions for radionuclide-containing products. Methodologies for calculating radiological and nonradiological impacts on human health (i.e., risks) associated with distributing, using, and disposing of DU-containing products are presented. Also, methodologies for completing assessments of the potential effects of accidents involving new DU-containing products and of product misuse are described. The report recommends that the U.S. Department of Energy formulate a regulatory plan for deployment of DU-containing products in areas that are not already radiologically controlled. Such a plan is needed because deployment of new DU-containing products may be difficult under existing NRC licensing requirements. To provide a basis for the regulatory plan, it is recommended that detailed assessments of the radiological and nonradiological risks of distributing, using, and disposing of DU-containing products be conducted. Such assessments should be initiated as soon as sufficient data are available from the ongoing DU Uses R&D Program at ORNL to support the analyses.

Ranek, N. L.; Kamboj, S.; Hartmann, H. M.; Avci, H.

2004-01-06T23:59:59.000Z

433

Management Overview  

NLE Websites -- All DOE Office Websites (Extended Search)

Immobilization Research Immobilization Research Kurt Gerdes U.S. DOE, Office of Engineering and Technology John Vienna Pacific Northwest National Laboratory Environmental Management May 19, 2009 2009 Hanford - Idaho - Savannah River Technical Exchange 2 Objectives Perform research and development to advance the waste stabilization technology options by through closely- coupled theory, experimentation, and modeling Develop solutions for Hanford, Idaho, Savannah River, and Oak Ridge wastes challenges (along with facilitating management of future wastes) Environmental Management General Approach Balance between near-term incremental technology improvements and long-term transformational solutions Address the requirements for high risk waste streams - high-level tank waste (RPP, SRS)

434

Resource Management Services: Water Regulation, Part 600: Applications for Licenses and Preliminary Permits Under the Water Power Act (New York)  

Energy.gov (U.S. Department of Energy (DOE))

These regulations provide instructions for applications proposing the construction, repair, or operation of hydropower sources. Applications are reviewed by the Water Power and Control Commission.

435

Licensed operating reactors: Status summary report, data as of December 31, 1995. Volume 20  

SciTech Connect

The US Nuclear Regulatory Commission`s monthly summary of licensed nuclear power reactor data is based primarily on the operating data report submitted by licensees for each unit. This report is divided into two sections: the first contains summary highlights and the second contains data on each individual unit in commercial operation. Section 1 availability factors, capacity factors, and forced outage rates are simple arithmetic averages. Section 2 items in the cumulative column are generally as reported by the licensees and notes to the use of weighted averages and starting dates other than commercial operation are provided.

NONE

1996-06-01T23:59:59.000Z

436

ALLIANCE MANAGEMENT  

Science Journals Connector (OSTI)

In the last two decades, production and manufacturing management has rapidly adopted a range of new concepts: manufacturing strategy, focused factory, just-in-time manufacturing, concurrent engineering, total ...

2000-01-01T23:59:59.000Z

437

Negotiable Licensing  

NLE Websites -- All DOE Office Websites (Extended Search)

Durable Fuel Cell Membrane Electrode Assembly (MEA) Microseismic Tracer Particles for Hydraulic Fracturing A Photo-Stimulated Low Electron Temperature High Current Diamond Film...

438

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

February 24, 2011 February 24, 2011 T-564: Vulnerabilities in Citrix Licensing administration components The vulnerabilities impact all current versions of the Citrix Licensing Administration Console, formerly known as the License Management Console. February 23, 2011 T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. February 22, 2011 T-562: Novell ZENworks Configuration Management novell-tftp.exe Buffer Overflow A vulnerability has been reported in Novell ZENworks Configuration

439

Stormwater Management  

E-Print Network (OSTI)

management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

Jaber, Fouad

2008-10-23T23:59:59.000Z

440

Management Strategies for the Potato Psyllid in California  

E-Print Network (OSTI)

on injurious Utah insects: potato psyllid. Proc. Utah Acad.eyed bug predator of the potato psyllid. Fl. Entomol. 18:Knowlton, G. F. 1934b. Potato psyllid investigations. Proc.

Butler, Casey

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Lessons learnt from ITER safety & licensing for DEMO and future nuclear fusion facilities  

E-Print Network (OSTI)

One of the strong motivations for pursuing the development of fusion energy is its potentially low environmental impact and very good safety performance. But this safety and environmental potential can only be fully realized by careful design choices. For DEMO and other fusion facilities that will require nuclear licensing, S&E objectives and criteria should be set at an early stage and taken into account when choosing basic design options and throughout the design process. Studies in recent decades of the safety of fusion power plant concepts give a useful basis on which to build the S&E approach and to assess the impact of design choices. The experience of licensing ITER is of particular value, even though there are some important differences between ITER and DEMO. The ITER project has developed a safety case, produced a preliminary safety report and had it examined by the French nuclear safety authorities, leading to the licence to construct the facility. The key technical issues that arose during ...

Taylor, Neill

2013-01-01T23:59:59.000Z

442

Environmental assessment proposed license renewal of Nuclear Metals, Inc. Concord, Massachusetts  

SciTech Connect

The US Nuclear Regulatory Commission (NRC) has prepared this Environmental Assessment (EA) to evaluate environmental issues associated with the renewal of licenses issued by NRC for facilities operated by Nuclear Metals, Inc. (NMI) in Concord, Massachusetts. By renewing the licenses, NRC proposes to allow the continuation of ongoing operations involving radioactive materials at NMI`s facilities. This EA focuses on the potential impacts related to air emissions at NMI during normal (incident-free) operations and accidental releases. Findings indicate that there are only two areas of potential concern. First, modeling results for sulfur dioxide (SO{sub 2}) emissions from the boilers during normal operations indicate that the potential exists for exceeding the short-term National Ambient Air Quality Standards (NAAQS). NMI is prepared to undertake mitigative action to prevent potential exceedances of the short-term SO{sub 2} NAAQS, and the Massachusetts Department of Environmental Protection is prepared to resolve the issue via a permit/approval change or through a Consent Order. Second, in the unlikely event of a severe fire, predicted sulfuric acid (H{sub 2}SO{sub 4}) concentrations based on conservative (upper bound) modeling exceed the Emergency Response Planning Guideline (ERPG) levels. NMI has committed to NRC to give a briefing for local emergency response officials regarding the potential for an accidental H{sub 2}SO{sub 4} release.

Miller, R.L.; Easterly, C.E.; Lombardi, C.E.; Treitler, I.E.; Winbow, R.T.; Zimmerman, G.P. [Oak Ridge National Lab., TN (United States)

1997-02-01T23:59:59.000Z

443

Licensing Guide and Sample License  

NLE Websites -- All DOE Office Websites (Extended Search)

TEI:HNOL06Y TRANSFER WORKIN6 6ROUP TEI:HNOL06Y TRANSFER WORKIN6 6ROUP Lic:en!iing Guide and Sample Lic:en!ie ·~ ICan.u City Plan I OFermilab ~OAK ~RIDGE Nuioul~.

444

Summary and analysis of public comments on NUREG-1317: Regulatory options for nuclear plant license renewal: Final report  

SciTech Connect

On August 29, 1988, the US Nuclear Regulatory Commission (NRC) issued an Advance Notice of Proposed Rulemaking on nuclear plant license renewal and solicited public comments on NUREG-1317, ''Regulatory Options for Nuclear Plant License Renewal.'' NUREG-1317 presents a discussion of fifteen topics involving technical, environmental, and procedural issues and poses a set of related questions. As part of its ongoing task for the NRC, The MITRE Corporation has summarized and analyzed the public comments received. Fifty-three written comments were received. Of these, 83 percent were from nuclear industry representatives; the remaining comments represented federal and state agencies, public interest groups, and a private citizen.

Ligon, D.M.; Seth, S.S.

1989-03-01T23:59:59.000Z

445

Managing the Management: CORBAbased Instrumentation of Management Systems  

E-Print Network (OSTI)

Management Team Department of Computer Science, TU M? unchen Arcisstr. 21, D­80333 Munich, Germany akeller approach to this problem by defining a MIB for manage­ ment systems. It can be regarded as a step towardsManaging the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network

446

Part 1. Knowledge Bank License Agreement (A Community in the Knowledge Bank can designate a Community Administrator to submit digital objects into the  

E-Print Network (OSTI)

Part 1. Knowledge Bank License Agreement (A Community in the Knowledge Bank can designate submission process, the community administrator is asked to check acceptance of the Knowledge Bank License to accept the agreement and return it to the Knowledge Bank.) By submitting this agreement, the copyright

Howat, Ian M.

447

Managing Solutions  

E-Print Network (OSTI)

tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

Baker, Emily

2007-01-01T23:59:59.000Z

448

Improved best estimate plus uncertainty methodology including advanced validation concepts to license evolving nuclear reactors  

SciTech Connect

Many evolving nuclear energy programs plan to use advanced predictive multi-scale multi-physics simulation and modeling capabilities to reduce cost and time from design through licensing. Historically, the role of experiments was primary tool for design and understanding of nuclear system behavior while modeling and simulation played the subordinate role of supporting experiments. In the new era of multi-scale multi-physics computational based technology development, the experiments will still be needed but they will be performed at different scales to calibrate and validate models leading predictive simulations. Cost saving goals of programs will require us to minimize the required number of validation experiments. Utilization of more multi-scale multi-physics models introduces complexities in the validation of predictive tools. Traditional methodologies will have to be modified to address these arising issues. This paper lays out the basic aspects of a methodology that can be potentially used to address these new challenges in design and licensing of evolving nuclear technology programs. The main components of the proposed methodology are verification, validation, calibration, and uncertainty quantification. An enhanced calibration concept is introduced and is accomplished through data assimilation. The goal is to enable best-estimate prediction of system behaviors in both normal and safety related environments. To achieve this goal requires the additional steps of estimating the domain of validation and quantification of uncertainties that allow for extension of results to areas of the validation domain that are not directly tested with experiments, which might include extension of the modeling and simulation (M&S) capabilities for application to full-scale systems. The new methodology suggests a formalism to quantify an adequate level of validation (predictive maturity) with respect to required selective data so that required testing can be minimized for cost saving purposes by showing further testing wold not enhance the quality of the validation of predictive tools. The proposed methodology is at a conceptual level. When matured and if considered favorably by the stakeholders, it could serve as a new framework for the next generation of the best estimate plus uncertainty licensing methodology that USNRC developed previously. In order to come to that level of maturity it is necessary to communicate the methodology to scientific, design and regulatory stakeholders for discussion and debates. This paper is the first step to establish this communication.

Unal, Cetin [Los Alamos National Laboratory; Williams, Brian [Los Alamos National Laboratory; Mc Clure, Patrick [Los Alamos National Laboratory; Nelson, Ralph A [IDAHO NATIONAL LAB

2010-01-01T23:59:59.000Z

449

LTS Project Management - Hanford Site  

NLE Websites -- All DOE Office Websites (Extended Search)

Transition LTS Execution Project Management Planning Resource Management Reporting Interface Management Communications (InternalExternal) Information Management Records...

450

Risk management  

SciTech Connect

In the autumn of 1993 an incident occurred with a diving support vessel, whereby a live pipeline from a NAM gas production platform, situated in the Dutch sector of the North Sea, was considerably displaced. Key element in the repair of the line was to identify potential hazards involved in various remedial scenarios and to manage the associated risks.

Visser, M. [Nederlandse Aardolie Maatschappij, Velsen (Netherlands)

1995-12-31T23:59:59.000Z

451

Superfund Policy Statements and Guidance Regarding Disposition of Radioactive Waste in Non-NRC Licensed Disposal Facilities - 13407  

SciTech Connect

This talk will discuss EPA congressional testimony and follow-up letters, as well as letters to other stakeholders on EPA's perspectives on the disposition of radioactive waste outside of the NRC licensed disposal facility system. This will also look at Superfund's historical practices, and emerging trends in the NRC and agreement states on waste disposition. (author)

Walker, Stuart [U.S. Environmental Protection Agency (United States)] [U.S. Environmental Protection Agency (United States)

2013-07-01T23:59:59.000Z

452

The licensing of patents in return for a fee or royalties has a key role in drug discovery.  

E-Print Network (OSTI)

The licensing of patents in return for a fee or royalties has a key role in drug discovery. Now the licensee brings out a new product, it may be unclear whether they need to pay royalty fees to the patentee patents in exchange for royalty payments; however, they disputed whether the licence of two patents

Cai, Long

453

YORK UNIVERSITY LICENSING PROGRAM 1050 Kaneff Tower, 4700 Keele Street, Toronto, ON M3J 1P3  

E-Print Network (OSTI)

Quarterly Royalty Report · Royalties are based on the wholesale cost of the products and are currently set at 7% · Royalty Reports and cheques must be filed with the York University Licensing Program and are due 15 days after the end of each quarter (January 15, April 15, July 15 and October 15) · A Royalty

454

CRAFTER LICENSE AGREEMENT This Agreement shall serve as a legal and binding Agreement by and between Texas  

E-Print Network (OSTI)

in the form prescribed by University ("Official Label") label to each Licensed Article. 6. ROYALTY PAYMENTS/REPORTS. (a) Royalty Payments. Upon execution of this Agreement, and upon renewal of this Agreement as set forth in Paragraph 3 above, Licensee shall pay to University a royalty fee in the amount of two hundred

455

License Terms This dataset is made freely available to academic and non-academic entities for non-commercial  

E-Print Network (OSTI)

License Terms This dataset is made freely available to academic and non-academic entities for non publication in any published work that makes use of the dataset. 3. That if you have altered the content of the dataset or created derivative work, prominent notice is made so that any recipients know

Hefei Institute of Intelligent Machines

456

DOE-STD-0100T; DOE Standard Licensed Reactor Nuclear Safety Criteria Applicable to DOE Reactors  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

00T 00T November 1993 Superseding DOE/NE-0100T April 1991 DOE STANDARD LICENSED REACTOR NUCLEAR SAFETY CRITERIA APPLICABLE TO DOE REACTORS U.S. Department of Energy Washington, D.C. 20585 AREA SAFT DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. This document has been reproduced directly frorn the best available copy. Available to DOE and DOE contractors from the Office of Scientific and Technical Information, P.O. Box 62, Oak Ridge, TN 37831; (615) 576-8401. Available to the public from the U.S. Department of Commerce, Technology Administration, National Technical Information Service, Springfield, VA 22161; (703) 487-4650. Order No. DE94005221 CONTENTS

457

Licensed operating reactors. Status summary report data as of December 31, 1993  

SciTech Connect

The Nuclear Regulatory Commissions annual summary of licensed nuclear power reactor data is based primarily on the report of operating data submitted by licensees for each unit for the month of December, the year to date (in this case calendar year 1993) and cumulative data, usually for the date of commercial operation. The data is not independently verified, but various computer checks are made. The report is divided into two sections. The first contains summary highlights and the second contains data on each individual unit in commercial operation. Section 1 capacity and availability factors are simple arithmetic averages. Section 2 items in the cumulative column are generally as reported by the licensee and notes as to the use of weighted averages and starting dates other than commercial operation are provided.

Hartfield, R.A.

1994-03-01T23:59:59.000Z

458

Licensed operating reactors: Status summary report data as of December 31, 1991. Volume 16  

SciTech Connect

The Nuclear Regulatory Commission`s annual summary of licensed nuclear power reactor data is based primarily on the report of operating data submitted by licensees for each unit for the month of December because that report contains data for the month of December, the year to date (in this case calendar year 1991) and cumulative data, usually from the date of commercial operation. The data is not independently verified, but various computer checks are made. The report is divided into two sections. The first contains summary highlights and the second contains data on each individual unit in commercial operation. Section 1 capacity and availability factors are simple arithmetic averages. Section 2 items in the cumulative column are generally as reported by the licensee and notes as to the use of weighted averages and starting dates other than commercial operation are provided.

NONE

1992-03-01T23:59:59.000Z

459

A Process for Reducing the Licensing Burden for New Products Containing Depleted Uranium  

NLE Websites -- All DOE Office Websites (Extended Search)

3-01 3-01 A Process for Reducing the Licensing Burden for New Products Containing Depleted Uranium Environmental Assessment Division Argonne National Laboratory Operated by The University of Chicago, under Contract W-31-109-Eng-38, for the United States Department of Energy Argonne National Laboratory, a U.S. Department of Energy Office of Science laboratory, is operated by The University of Chicago under contract W-31-109-Eng-38. DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor The University of Chicago, nor any of their employees or officers, makes any warranty, express or implied, or assumes

460

THE DECISION TO RECOMMEND YUCCA MOUNTAIN AND THE NEXT STEPS TOWARD LICENSED REPOSITORY DEVELOPMENT  

SciTech Connect

After more than 20 years of carefully planned and reviewed scientific field work by the U.S. Department of Energy, the U.S. Geological Survey, and numerous other organizations, Secretary of Energy Abraham concluded in January that the Yucca Mountain site is suitable, within the meaning of the Nuclear Waste Policy Act, for development as a permanent nuclear waste and spent fuel repository. In February, the Secretary recommended to the President that the site be developed for licensed disposal of these wastes, and the President transmitted this recommendation to Congress. This paper summarizes key technical and national interest considerations that provided the basis for the recommendation. It also discusses the program's near-term plans for repository development if Congress designates the site.

Barrett, L. H.

2002-02-25T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

National Low-Level Waste Management Program final summary report of key activities and accomplishments for fiscal year 1997  

SciTech Connect

The US Department of Energy (DOE) has responsibilities under the Low-Level Radioactive Waste Policy Amendments Act of 1985 to assist states and compacts in their siting and licensing efforts for low-level radioactive waste disposal facilities. The National Low-Level Waste Management Program (NLLWMP) is the element of the DOE that performs the key support activities under the Act. The NLLWMP`s activities are driven by the needs of the states and compacts as they prepare to manage their low-level waste under the Act. Other work is added during the fiscal year as necessary to accommodate new requests brought on by status changes in states` and compacts` siting and licensing efforts. This report summarizes the activities and accomplishments of the NLLWMP during FY 1997.

Rittenberg, R.B.

1998-03-01T23:59:59.000Z

462

Licensing of spent fuel dry storage and consolidated rod storage: A Review of Issues and Experiences  

SciTech Connect

The results of this study, performed by Pacific Northwest Laboratory (PNL) and sponsored by the US Department of Energy (DOE), respond to the nuclear industry's recommendation that a report be prepared that collects and describes the licensing issues (and their resolutions) that confront a new applicant requesting approval from the US Nuclear Regulatory Commission (NRC) for dry storage of spent fuel or for large-scale storage of consolidated spent fuel rods in pools. The issues are identified in comments, questions, and requests from the NRC during its review of applicants' submittals. Included in the report are discussions of (1) the 18 topical reports on cask and module designs for dry storage fuel that have been submitted to the NRC, (2) the three license applications for dry storage of spent fuel at independent spent fuel storage installations (ISFSIs) that have been submitted to the NRC, and (3) the three applications (one of which was later withdrawn) for large-scale storage of consolidated fuel rods in existing spent fuel storage pools at reactors that were submitted tot he NRC. For each of the applications submitted, examples of some of the issues (and suggestions for their resolutions) are described. The issues and their resolutions are also covered in detail in an example in each of the three subject areas: (1) the application for the CASTOR V/21 dry spent fuel storage cask, (2) the application for the ISFSI for dry storage of spent fuel at Surry, and (3) the application for full-scale wet storage of consolidated spent fuel at Millstone-2. The conclusions in the report include examples of major issues that applicants have encountered. Recommendations for future applicants to follow are listed. 401 refs., 26 tabs.

Bailey, W.J.

1990-02-01T23:59:59.000Z

463

Data Management Policy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

464

Object Management Systems  

E-Print Network (OSTI)

Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

Gollu, Aleks Ohannes

1995-01-01T23:59:59.000Z

465

Environmental Management System  

NLE Websites -- All DOE Office Websites (Extended Search)

Management System Environmental Management System An Environmental Management System is a systematic method for assessing mission activities, determining the environmental impacts...

466

Environmental Management System Plan  

E-Print Network (OSTI)

R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

Fox, Robert

2009-01-01T23:59:59.000Z

467

Federal Energy Management Program: Best Management Practice: Cooling Tower  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooling Tower Management to someone by E-mail Cooling Tower Management to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Google Bookmark Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Delicious Rank Federal Energy Management Program: Best Management Practice: Cooling Tower Management on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Cooling Tower Management on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

468

Federal Energy Management Program: Best Management Practice: Water  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Management Planning to someone by E-mail Water Management Planning to someone by E-mail Share Federal Energy Management Program: Best Management Practice: Water Management Planning on Facebook Tweet about Federal Energy Management Program: Best Management Practice: Water Management Planning on Twitter Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Google Bookmark Federal Energy Management Program: Best Management Practice: Water Management Planning on Delicious Rank Federal Energy Management Program: Best Management Practice: Water Management Planning on Digg Find More places to share Federal Energy Management Program: Best Management Practice: Water Management Planning on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance

469

Managing Critical Management Improvement Initiatives  

Directives, Delegations, and Requirements

Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

2003-10-01T23:59:59.000Z

470

Environmental Management  

SciTech Connect

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2014-11-12T23:59:59.000Z

471

Environmental Management  

ScienceCinema (OSTI)

Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

None

2015-01-07T23:59:59.000Z

472

Best Management Practice #1: Water Management Planning  

Energy.gov (U.S. Department of Energy (DOE))

A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

473

Nuclear Regulatory Commission's Integrated Strategy for Spent Fuel Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NRC's NRC's Integrated Strategy for NRC s Integrated Strategy for Spent Fuel Management Earl Easton 1 U.S. Nuclear Regulatory Commission May 25, 2010 Road to Yucca Mountain * 20+ years of preparation for the licensing i review * DOE application received in June 2008 and accepted for review in September 2008 * President Obama pursues alternatives to Yucca Mountain * DOE motion to withdraw in March 2010 2 * DOE motion to withdraw in March 2010 * Blue Ribbon Commission on America's Nuclear Future 2 Growing Spent Fuel Inventory Cumulative Used Nuclear Fuel Scenarios 50,000 100,000 150,000 200,000 250,000 Metric Tons 3 - 50,000 2010 2015 2020 2025 2030 2035 2040 2045 2050 Year Reference: Crozat, March 2010 Integrated Strategy * In response to the evolving national debate on spent fuel management strategy, NRC initiated a number of actions:

474

Acting Assistant Secretary for DOE Office of Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Acting Assistant Secretary for DOE Office of Environmental Acting Assistant Secretary for DOE Office of Environmental Management Visits Hanford - First Visit, Commemorates Completion of Major Recovery Act Project Acting Assistant Secretary for DOE Office of Environmental Management Visits Hanford - First Visit, Commemorates Completion of Major Recovery Act Project August 11, 2011 - 12:00pm Addthis Media Contact Geoff Tyree, DOE Geoffrey.Tyree@rl.doe.gov 509-376-4171 Media visit requirements to be completed by 2 p.m. today: This visit requires badges and an RSVP by 2 p.m. today by email to tmbirch@wch-rcc.com at Washington Closure Hanford. You must include in your email (for badging purposes) your full name exactly as it appears on your driver's license, confirm you are a U.S. Citizen, your date of birth, as well as the name, address, and phone number of the company you are

475

U.S. spent nuclear fuel management: Political, fiscal, and technical feasibility  

Science Journals Connector (OSTI)

Abstract Successful U.S. spent nuclear fuel management policy must satisfy political, fiscal, and technical constraints. Technical requirements have been thoroughly investigated in the United States and Nordic countries for volcanic tuff, salt, and granite. Fiscal planning requires an inflation-adjusted revenue stream and predictable real interest rate earnings on fund balances. A prompt solution satisfying political constraints requires compromise between the overlapping but distinct goals of seven different sets of interests at the federal level. Absent such compromise, there will be delay until sufficient support for one of three strategies evolves: (1) force the Yucca Mountain repository on Nevada, (2) open a centralized storage facility without coupling to repository licensing, or (3) follow a consent-based process for repository licensing. Formulations of each of these strategies to overcome impediments to their success are described.

Clifford Singer

2013-01-01T23:59:59.000Z

476

Contract Management Certificate Program  

E-Print Network (OSTI)

Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

Rose, Michael R.

477

Your Records Management Responsibilities  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Your Records Management Your Records Management Responsibilities Table of Contents INTRODUCTION RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT RECORDS MANAGEMENT IN THE DEPARTMENT OF ENERGY IMPORTANCE OF RECORDS MANAGEMENT YOUR RECORDS MANAGEMENT RESPONSIBILITIES RECORDS MANAGEMENT LIFE CYCLE ELECTRONIC RECORDS & RECORDKEEPING LAW, REGULATION, AND POLICY ASSISTANCE RECORDS MANAGEMENT TERMS 2 INTRODUCTION If you are a government employee or contractor working for a federal agency, records management is part of your job. This pamphlet explains your responsibilities for federal records and provides the context for understanding records management in the federal government and in the Department of Energy. TOP RECORDS MANAGEMENT IN THE FEDERAL GOVERNMENT

478

Integrated Safety Management Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

INTEGRATED SAFETY INTEGRATED SAFETY MANAGEMENT SYSTEM DESCRIPTION U.S. DEPARTMENT OF ENERGY Office of Environmental Management Headquarters May 2008 Preparation: Braj K. sin& Occupational Safety and Health Manager Office of Safety Management Concurrence: Chuan-Fu wu Director, Offlce of Safety Management Deputy Assistant Secretary for safe& Management andoperations Operations Officer for 1 Environmental Management Approval: Date p/-g Date Environmental Management TABLE OF CONTENTS ACRONYMS................................................................................................................................................................v EXECUTIVE SUMMARY .........................................................................................................................................1

479

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

480

The Harlequin Cabbage-bug.  

E-Print Network (OSTI)

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "license manager bugs" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across. From Nick B:

482

Managing Aging Effects on Dry Cask Storage Systems for Extended Long Term  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Managing Aging Effects on Dry Cask Storage Systems for Extended Managing Aging Effects on Dry Cask Storage Systems for Extended Long Term Storage and Transportation of Used Fuel Rev0 Managing Aging Effects on Dry Cask Storage Systems for Extended Long Term Storage and Transportation of Used Fuel Rev0 The report is intended to help assess and establish the technical basis for extended long-term storage and transportation of used nuclear fuel. It provides: 1) an overview of the ISFSI license renewal process based on 10 CFR 72 and the guidance provided in NUREG-1927; 2) definitions and terms for structures and components in DCSSs, materials, environments, aging effects, and aging mechanisms; 3) TLAAs and AMPs, respectively, that have been developed for managing aging effects on the SSCs important to safety in the dry cask storage system designs; and 4) AMPs and TLAAs for the SSCs

483

Energy management  

SciTech Connect

This paper is a review of the Department of Energy's (DOE) Contractor Purchasing System Review (CPSR) Program, which oversees the extensive subcontracting activities of the Department's management and operating (M and O) contractors. This review is part of a special GAO audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that adequate corrective actions are taken. This effort focuses on 16 areas, one of which is DOE contractor oversight. This report describes the subcontracting deficiencies occurring at DOE, identifies shortcomings in DOE's CPSR Program, and discusses the corrective actions that DOE has committed to take in its CPSR Program in response to these findings.

Glenn, J.

1991-10-01T23:59:59.000Z

484

M E Environmental Management Environmental Management  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

safety  performance  cleanup  closure safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management Office of Site Restoration, EM-10 Office of D&D and Facility Engineering, EM-13 Facility Deactivation & Decommissioning (D&D) D&D Program Map Addendum: Impact of American Recovery and Reinvestment Act (ARRA) on EM's D&D Program 2013 Edition U.S. Department Of Energy safety  performance  cleanup  closure M E Environmental Management Environmental Management safety  performance  cleanup  closure M E Environmental Management Environmental Management M E Environmental Management Environmental Management 3/13/2013 The American Recovery and Reinvestment Act of 2009

485

Minnesota Innovation Partnerships (MN-IP) Try and Buy MN-IP Try and Buy --for companies interested in licensing existing U of M inventions  

E-Print Network (OSTI)

is executed BUY (LICENSE) · Low, published royalty rate, with first $1 million of product sales royalty-free · Royalty rates based on industry comparables · Royalty rate discount for MN operating companies2 · Royalty

Minnesota, University of

486

Regulatory analysis for amendments to regulations for the environmental review for renewal of nuclear power plant operating licenses. Final report  

SciTech Connect

This regulatory analysis provides the supporting information for a proposed rule that will amend the Nuclear Regulatory Commission`s environmental review requirements for applications for renewal of nuclear power plant operating licenses. The objective of the proposed rulemaking is to improve regulatory efficiency by providing for the generic evaluation of certain environmental impacts associated with nuclear plant license renewal. After considering various options, the staff identified and analyzed two major alternatives. With Alternative A, the existing regulations would not be amended. This option requires that environmental reviews be performed under the existing regulations. Alternative B is to assess, on a generic basis, the environmental impacts of renewing the operating license of individual nuclear power plants, and define the issues that will need to be further analyzed on a case-by-case basis. In addition, Alternative B removes from NRC`s review certain economics-related issues. The findings of this assessment are to be codified in 10 CFR 51. The staff has selected Alternative B as the preferred alternative.

NONE

1996-05-01T23:59:59.000Z

487

Energy management  

SciTech Connect

In January 1990 GAO began implementing a special audit effort to help ensure that areas vulnerable to fraud, waste, abuse, and mismanagement are identified and that appropriate corrective actions are taken. This effort focuses on 16 areas, one of which is the Department of Energy's (DOE) contracting practices. As part of this effort, the authors determined if contract audits for monitoring and overseeing DOE's contracting process were being performed and that we identify the impact or potential impact to the government when contract audits were not performed. Specifically, this paper discusses audit coverage of DOE's management and operating (M and O) contractors and DOE contracts, the problems that may occur when contract audit activity is not performed, and factors that have impeded contract audit coverage.

Dingell, J.D.

1991-10-01T23:59:59.000Z

488

Overview - Data Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Help > Data Management Help > Data Management Data Management for Data Providers Click an arrow to follow the data management path of a data set from planning to curation. plan Overview plan Plan manage Manage archive Archive curation DAAC Curation Data Management Overview Plan Manage Archive DAAC Curation Related Links DAAC Help Best Practices PDF Workshops DataONE ESIP Data Management Overview Welcome to the data management pages for data providers to the ORNL Distributed Active Archive (DAAC). These pages provide an overview of data management planning and preparation and offer practical methods to successfully share and archive your data. Plan - write a short data management plan while preparing your research proposal, Manage - assign logical, descriptive file names, define the contents of your data files, and use consistent data values when preparing

489

Management & Administration Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Review of Alleged Conflicts of Interest Involving a Legal Services Contractor forthe Yucca Mountain Project License Application February 21, 2008 Audit Letter Report:...

490

FIRE MANAGEMENT PLAN MONTAGUE PLAIN  

E-Print Network (OSTI)

FIRE MANAGEMENT PLAN FOR MONTAGUE PLAIN WILDLIFE MANAGEMENT AREA #12;Fire Management Plan for Montague Plain Wildlife Management Area prepared for Massachusetts Dept. of Fisheries, Wildlife. 2003. Fire Management Plan for Montague Plain Wildlife Management Area. Department of Natural Resources

Schweik, Charles M.

491

Waste Management | Department of Energy  

Energy Savers (EERE)

Management Waste Management Oak Ridge has an onsite CERCLA disposal facility, the Environmental Management Waste Management Facility, that reduces cleanup and transportation costs....

492

Load Management for Industry  

E-Print Network (OSTI)

In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

Konsevick, W. J., Jr.

1982-01-01T23:59:59.000Z

493

Federal Energy Management Program: Operations and Maintenance Management  

NLE Websites -- All DOE Office Websites (Extended Search)

Management Support to someone by E-mail Management Support to someone by E-mail Share Federal Energy Management Program: Operations and Maintenance Management Support on Facebook Tweet about Federal Energy Management Program: Operations and Maintenance Management Support on Twitter Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Google Bookmark Federal Energy Management Program: Operations and Maintenance Management Support on Delicious Rank Federal Energy Management Program: Operations and Maintenance Management Support on Digg Find More places to share Federal Energy Management Program: Operations and Maintenance Management Support on AddThis.com... Sustainable Buildings & Campuses Operations & Maintenance Federal Requirements Program Management

494

PETSc: Documentation: FAQ  

NLE Websites -- All DOE Office Websites (Extended Search)

FAQ FAQ Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site General How can I subscribe to the PETSc mailing lists? Any useful books on numerical computing? What kind of parallel computers or clusters are needed to use PETSc? What kind of license is PETSc released under? Why is PETSc programmed in C, instead of Fortran or C++? Does all the PETSc error checking and logging reduce PETSc's efficiency? How do such a small group of people manage to write and maintain such a large and marvelous package as PETSc? For complex numbers will I get better performance using C or C++? How come when I run the same program on the same number of processes

495

Records Management Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

496

Renae Speck Commercialization Manager  

NLE Websites -- All DOE Office Websites (Extended Search)

Manager Renae Speck, Ph.D is a Commercialization Manager in the Office of Technology Transfer in the Partnership Directorate at the United States Department of Energy's Oak...