Powered by Deep Web Technologies
Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability...

2

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

3

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

4

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

5

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

6

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

7

Microsoft Word - Document in Microsoft Internet Explorer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Status of the Mixed Oxide Fuel Status of the Mixed Oxide Fuel Fabrication Facility DOE/IG-0713 December 2005 STATUS OF THE MIXED OXIDE FUEL FABRICATION FACILITY TABLE OF CONTENTS MOX Facility Design Costs Details of Finding 1 Recommendations 5 Comments 6 Appendices Objective, Scope, and Methodology 9 Prior Audit Reports 11 Management Comments 12 MOX Facility Design Costs Page 1 Details of Finding Design and The audit disclosed that the cost of the Mixed Oxide Fuel Construction Budget Facility (MOX) will significantly exceed the amounts reported to Congress. As of July 2005, the National Nuclear Security Administration's (NNSA's) unvalidated estimate for the design and construction of the MOX Facility was about $3.5 billion, which is

8

Microsoft Word - Document in Microsoft Internet Explorer  

NLE Websites -- All DOE Office Websites (Extended Search)

The two N- terminal domains of the dimer do not interact, causing the misalignment of ATP hydrolysis residues. (B) Stereo surface view of the GRP94 dimer. The twisted V shape is...

9

Microsoft Word - Document in Microsoft Internet Explorer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

gas prices seem to have spiked recently, the issues leading to this increase have been gas prices seem to have spiked recently, the issues leading to this increase have been decades in the making. Our nation's refining capacity has been stagnant for thirty years, we have limited our options to increase domestic supply, and we depend more and more on foreign sources of oil that are becoming increasingly scarce because of rising demand in other countries like China and India. ♦ The energy bill signed by the president last summer has helped the U.S. start to turn the corner and lead us in the right direction. The energy bill supports development of more oil and gas reserves here at home and in addition, and will help us develop new technologies to fuel our transportation needs like hydrogen fuel cell cars. ♦ In the coming months, we may continue to see high prices due to increased demand as the

10

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

11

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run...

12

OurStory: Exploring the Sky From the Internet to Outer Space  

E-Print Network (OSTI)

OurStory: Exploring the Sky From the Internet to Outer Space Read the "Directions" sheets for step Guide, page 1 of 2 #12;OurStory: Exploring the Sky From the Internet to Outer Space Parent Guide, page 2 (attached) Computer with Internet access Pen or pencil More information at http

Mathis, Wayne N.

13

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

14

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry  

E-Print Network (OSTI)

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry Kofi. Specifically, we focus on the question "Does a high marketing orientation have a positive effect and tested a model that examines the mediating influence of marketing orientation across a number

Wu, Qinglin

15

Exploration of the comics medium developed for use on the internet  

E-Print Network (OSTI)

of a given site or made available to be downloaded. Finally, in what is possibly the greatest separation from the two-dimensionality of the printed medium, the advancement of V R M L (virtual reality markup language) on the internet allows for a... as the speed of the internet connection, could have a dramatically different experience within a common web site. It is evident that the internet, much like traditional printed work, has its own limita tions. Ultimately, however, it also has ever...

Piana, Brian James

2012-06-07T23:59:59.000Z

16

T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Microsoft Fraudulent Digital Certificate Issued by DigiNotar 06: Microsoft Fraudulent Digital Certificate Issued by DigiNotar T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar August 30, 2011 - 8:45am Addthis PROBLEM: Digital certificate affects all subdomains of google.com and may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008

17

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

18

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

19

Reporting with Microsoft Excel  

Science Journals Connector (OSTI)

Excel is Microsofts frontline reporting software. Starting originally as a commercial spreadsheet application, it has become much more.

Randal Root; Caryn Mason

2012-01-01T23:59:59.000Z

20

How To Setup EHSS Landing Page As Default Home Page For Internet...  

Energy Savers (EERE)

Internet Explorer How To Setup EHSS Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.govehss. Once the EHSS site...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

How To Setup EA Landing Page As Default Home Page For Internet...  

Energy Savers (EERE)

Internet Explorer How To Setup EA Landing Page As Default Home Page For Internet Explorer STEP 1: In Internet Explorer enter the URL http:energy.goviea. Once the EA site loads,...

22

Microsoft Word - Internet Write-Up.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sandia National Laboratories Sandia National Laboratories Nuclear Weapons Safety Program (U) DOE/IG-0799 July 2008 The following is an unclassified summary of the classified Audit Report on "Sandia National Laboratories Nuclear Weapons Safety Program (DOE/IG-0799, July 31, 2008) BACKGROUND Nuclear weapons safety is of paramount importance to U.S. security. The Department of Energy's National Nuclear Security Administration (NNSA) requires that design features minimizing the possibility of accidental or inadvertent nuclear detonation be incorporated in all nuclear weapons. Although ultimate responsibilities for nuclear weapons safety rests with Federal managers, NNSA's Sandia National Laboratories, a contractor-operated entity, produces independent safety assessments to identify nuclear weapons safety issues. Sandia's Nuclear Safety

23

Microsoft Word - test | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

test Microsoft Word - test Microsoft Word - test More Documents & Publications Interested Parties - WAPA Public Comment InterestedPartiesCOPSCoWAPA040309.pdf Microsoft Word -...

24

Has the ice man arrived? Tact on the Internet  

E-Print Network (OSTI)

Has the ice man arrived? Tact on the Internet Jonathan Grudin, UC Irvine and Microsoft Research. Eugene O'Neill's play The Ice Man Cometh outlines a series of calamities that occur when his characters the graded corrections via e- mail. The students produced a counter- proposal: After grading an exercise

Hearst, Marti

25

Internet Sampler  

E-Print Network (OSTI)

Gnat (gnatkip) wrote, 2006-08-23 16:36:00 Art: Internet Sampler Title: Internet Sampler Media: Excel, Photoshop, Crosstitch.com Caption Maker, alphabet by Carrie's Creations, graphics from Windows, IE, and Firefox Notes: An illustration... the manner of the pioneers. At the top Ill set my most oft- uttered prayer: Thank you, internet, for letting me observe so many crazy people from a safe distance." Since I first read that line, there have been so many occasions when I've been reminded...

2006-08-23T23:59:59.000Z

26

Internet 0  

E-Print Network (OSTI)

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

27

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

28

Modeling the World from Internet Photo Collections  

Science Journals Connector (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

29

Microsoft Word - Political Activity and the Federal Employee...  

Office of Environmental Management (EM)

Microsoft Word - Political Activity and the Federal Employee.doc Microsoft Word - Political Activity and the Federal Employee.doc Microsoft Word - Political Activity and the...

30

Microsoft Word - Horizon Wind Energy Comments.docx | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx More Documents &...

31

Review: Wireless Internet Handbook  

Science Journals Connector (OSTI)

......Review: Wireless Internet Handbook Reviewed by Harry Agius Wireless Internet Handbook Borko Furht, Mohammad Ilyas...the book. In fairness it does improve after the fifth chapter...Wireless Internet Handbook Borko Furht, Mohammad Ilyas......

Harry Agius

2004-07-01T23:59:59.000Z

32

Trends in Internet Marketing.  

E-Print Network (OSTI)

??Internet marketing involves the usage of the Internet to market and sell goods or services. In this thesis we wished to seek answers for the (more)

Panchanathan, Nitin

2005-01-01T23:59:59.000Z

33

Microsoft Word - AL2005-14.doc | Department of Energy  

Office of Environmental Management (EM)

4.doc Microsoft Word - AL2005-14.doc Microsoft Word - AL2005-14.doc More Documents & Publications Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word -...

34

Microsoft Word - AL2004-02.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4-02.doc Microsoft Word - AL2004-02.doc Microsoft Word - AL2004-02.doc More Documents & Publications Microsoft Word - AL2005-02.doc flash2004-07.pdf Microsoft Word - AL-Omnibus FY...

35

Microsoft Word - AL2005-02.doc | Department of Energy  

Energy Savers (EERE)

2.doc Microsoft Word - AL2005-02.doc Microsoft Word - AL2005-02.doc More Documents & Publications Microsoft Word - AL2004-02.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all...

36

Health and Wellbeing The Microsoft External Research  

E-Print Network (OSTI)

Health and Wellbeing The Microsoft External Research Division within Microsoft Research partners to support every stage of the research process. Efforts are focused in four research areas--including Health about their health. Microsoft External Research http://research.microsoft.com/en-us/ collaboration

Oxford, University of

37

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_INITIAL...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ITIALENTRYOFCOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialINITIALENTRYOFCOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP...

38

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_REVIEW...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

REVIEWUPDATECOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialREVIEWUPDATECOMPETENCYINFORMATION.doc Microsoft Word - APRIL 2009 PMCDP...

39

Internet Topology Benoit Donnet  

E-Print Network (OSTI)

Internet Topology Discovery Benoit Donnet INL Seminar - 06-07/07/2011 1 1 #12;INL Seminar - Internet Topology Discovery 2 2 #12;INL Seminar - Internet Topology Discovery Agenda 3 · Background Probing - MERLIN · Power Law - Problem - L2 vs. L3 · Conclusion 3 #12;INL Seminar - Internet Topology

Bonaventure, Olivier

40

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network (OSTI)

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

T-546: Microsoft MHTML Input Validation Hole May Permit Cross...  

Office of Environmental Management (EM)

vulnerability to allow an attacker to inject a client-side script in the response of a Web request run in the context of the victim's Internet Explorer. The script could spoof...

42

Microsoft Word - Configuring Workstations for use with the PARS...  

Office of Environmental Management (EM)

AND NETWORK REQUIREMENTS Minimum 1280 X 1024 Display (Monitor and Graphics card) 2Gb memory 2 CPU cores at 2.5 GHz or 1 CPU core at 3+ GHz MS Windows XP MS Internet Explorer 8...

43

Though the interface to the World Wide Web is fairly user friendly and straightforward, the inner workings of the Internet are quite complicated. This  

E-Print Network (OSTI)

workings of the Internet are quite complicated. This complexity exists on two levels: 1) the Internet as an entity unto itself, and 2) the Internet as an interacting ecosystem of networks. This paper explores the complexities of the Internet, providing insight into how and why the Internet works as well as it does, while

Scarano, Vittorio

44

TERRORISM TRUMPS INTERNET ACCESS  

Science Journals Connector (OSTI)

TERRORISM TRUMPS INTERNET ACCESS ... The regulation is in response to fears that terrorists will be able to punch into the Internet and gather theoretical accident information that the government requires for environmental purposes. ...

JEFF JOHNSON

2000-07-03T23:59:59.000Z

45

Victor Bahl Microsoft Research  

E-Print Network (OSTI)

access via devices other than PCs. Internet Penetration by Region (% of Households) Worldwide APeJ Japan) Asia-Pacific and Japan 124 million North America 41 million Latin America 13 million Western Europe 87

Haykin, Simon

46

a microsoft white paper Drilling for new Business Value  

E-Print Network (OSTI)

a microsoft white paper Drilling for new Business Value How innovative oil and gas companies Technical Strategist, Oil & Gas and Mining, Microsoft Adil Soofi, Enterprise Architect, Microsoft Ernie Perez, Enterprise Architect, Microsoft #12;a microsoft white paper Drilling for new B usiness Value 2

Bernstein, Phil

47

from Microsoft's Bill Gates. Summer  

NLE Websites -- All DOE Office Websites (Extended Search)

with backing from Microsoft's Bill Gates. Summer fun (pages 4-5) All aboard a bus or train and tour Y-12 and the Secret City. August 2012 Visit us Many phrases can be used to...

48

Microsoft Local Language Program Customer Case Study  

E-Print Network (OSTI)

, the program develops native language interface packs that run on top of standard Microsoft Office software older than 15 years who can read and write). Project The development of Microsoft Language Interface-speaking environment. In conjunction with the Microsoft Local Language Program, the Nigerian Government has now found

Narasayya, Vivek

49

Microsoft Word - AL2000-01.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

0-01.doc Microsoft Word - AL2000-01.doc Microsoft Word - AL2000-01.doc More Documents & Publications ALFAL 99-01 Department of Energy No Microsoft Word - al2005...

50

Microsoft Word - Section 311 AL FAL Feb 17 2010 | Department...  

Office of Environmental Management (EM)

Section 311 AL FAL Feb 17 2010 Microsoft Word - Section 311 AL FAL Feb 17 2010 Microsoft Word - Section 311 AL FAL Feb 17 2010 More Documents & Publications Microsoft Word -...

51

Microsoft Word - AL2008-05.doc | Department of Energy  

Office of Environmental Management (EM)

5.doc Microsoft Word - AL2008-05.doc Microsoft Word - AL2008-05.doc More Documents & Publications EXECUTIVE ORDER 13514 Microsoft Word - AL 2010-07 Acquistion Letters Remaining in...

52

Microsoft Word - AL-ARRASafetyALREDO3 | Department of Energy  

Office of Environmental Management (EM)

ARRASafetyALREDO3 Microsoft Word - AL-ARRASafetyALREDO3 Microsoft Word - AL-ARRASafetyALREDO3 More Documents & Publications Microsoft Word - AL-ARRASafetyALREDO3.doc DOE Handbook:...

53

Microsoft Word - AL2007-01.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AL2007-01.doc Microsoft Word - AL2007-01.doc Microsoft Word - AL2007-01.doc More Documents & Publications Microsoft Word - Rev5functionalaccountabilityimplementationplan..doc...

54

Microsoft Word - al93-4.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

3-4.doc Microsoft Word - al93-4.doc Microsoft Word - al93-4.doc More Documents & Publications Draft Policy and Planning Guidance for Community Transition Activities Microsoft Word...

55

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

56

T-613: Microsoft Excel Axis Properties Remote Code Execution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis...

57

T-724: Microsoft Security Advisory: Fraudulent digital certificates...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing...

58

T-557: Microsoft Office Excel Office Art Object Parsing Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability...

59

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of...

60

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_ROTATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_ESTABLISHI...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ESTABLISHINGAPROFILE.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialESTABLISHINGAPROFILE.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS...

62

Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Knowledge Diagram Updates March 26 2009.doc Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009.doc Microsoft Word - PMCDP Knowledge Diagram Updates March 26 2009.doc...

63

EERE Template for Microsoft Word Document Standard Cover and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE Template for Microsoft Word Document Standard Cover and Second Page EERE Template for Microsoft Word Document Standard Cover and Second Page This template was designed for...

64

Microsoft Word - NSRC precompetitive User Agreement amended 1...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement amended 1-18-07.doc Microsoft Word - NSRC precompetitive User Agreement...

65

Microsoft Word - 564M_Biomass_Project Descriptions FINAL 120409...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 More...

66

Microsoft PowerPoint - IGCA Training 2011-OPAM | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Training 2011-OPAM Microsoft PowerPoint - IGCA Training 2011-OPAM IGCA Inventory Data Collection Tool Training 2011 Microsoft PowerPoint - IGCA Training 2011-OPAM More...

67

Microsoft PowerPoint - 03 Wyss Economic Outlook [Compatibility...  

Office of Environmental Management (EM)

03 Wyss Economic Outlook Compatibility Mode Microsoft PowerPoint - 03 Wyss Economic Outlook Compatibility Mode Microsoft PowerPoint - 03 Wyss Economic Outlook Compatibility...

68

Microsoft Word - MR_Contingency_Protocol_EM_FINAL.docx | Department...  

Office of Environmental Management (EM)

Microsoft Word - MRContingencyProtocolEMFINAL.docx Microsoft Word - MRContingencyProtocolEMFINAL.docx More Documents & Publications Slide 1 LPP Risk Management Plan...

69

Microsoft Word - Fact Sheet Environment 100808 FINAL.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc More Documents & Publications...

70

ENERGY EFFICIENT INTERNET INFRASTRUCTURE  

E-Print Network (OSTI)

. D R A F T October 27, 2010, 11:34pm D R A F T #12;2 ENERGY EFFICIENT INTERNET INFRASTRUCTURE FigureCHAPTER 1 ENERGY EFFICIENT INTERNET INFRASTRUCTURE Weirong Jiang, Ph.D.1 , and Viktor K. Prasanna]. In other words, an IP address may match multiple prefixes, but only the longest D R A F T October 27, 2010

Prasanna, Viktor K.

71

Internet Performance Measurement Collaborators  

E-Print Network (OSTI)

Internet Performance Measurement Collaborators Cross Industry Working Team (XIWT) High Performance of the timestamp mechanism in the ANS Surveyor Probe device FY98 · GITS Internet Performance Measurement Toolkit developed FY99 · GITS measurement systems deployed in the field FY00 Goal To advance the state of the art

72

U-164: Microsoft Security Bulletin Advance Notification for May 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

64: Microsoft Security Bulletin Advance Notification for May 64: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address

73

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

74

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

75

U-124: Microsoft Security Bulletin Advance Notification for March 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24: Microsoft Security Bulletin Advance Notification for March 24: Microsoft Security Bulletin Advance Notification for March 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 March 14, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is

76

U-103: Microsoft Security Bulletin Advance Notification for February 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: Microsoft Security Bulletin Advance Notification for 03: Microsoft Security Bulletin Advance Notification for February 2012 U-103: Microsoft Security Bulletin Advance Notification for February 2012 February 15, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for February 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for February 2012. Microsoft has posted 6 Critical Bulletins and 5 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a

77

Microsoft Word - Intellectual Property Provisions _NRD-1003_...  

Office of Environmental Management (EM)

& Publications Intellectual Property Provisions (NRD-115) Nonresearch and Development D:WebGCCurrentMaterialtechtransGNP-1003.PDF&0; Microsoft Word - Flash2006-47JulyDeviate...

78

Sustainable Internet Architecture PROJECT DESCRIPTION  

E-Print Network (OSTI)

Sustainable Internet Architecture PROJECT DESCRIPTION 1 Introduction The Internet currently plays that the problems in the current Internet architecture stem from its lack of sustainability which impedes future de of challenges. Numerous research studies on a new Internet architecture (e.g., [16, 37, 48, 54, 55]) have

Kuzmanovic, Aleksandar

79

Internet Users' Glossary  

Science Journals Connector (OSTI)

There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them.

G. Malkin

1996-08-01T23:59:59.000Z

80

T-645: Microsoft Security Bulletin Advance Notification | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification 5: Microsoft Security Bulletin Advance Notification T-645: Microsoft Security Bulletin Advance Notification June 13, 2011 - 3:45pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on June 14, 2011. PLATFORM: Windows Operating System and Components, Microsoft Office Suites and Software, Microsoft Server Software, Microsoft Developer Tools and Software and Microsoft Security Software ABSTRACT: Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

82

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

83

UNDERGRADUATE STUDIES INTERNSHIP 201 -201 APPLICATION  

E-Print Network (OSTI)

Microsoft Excel Expert Good Limited Use None Microsoft Access Expert Good Limited Use None Internet Explorer: WordPerfect for Windows Expert Good Limited Use None Microsoft Word Expert Good Limited Use None Expert Good Limited Use None Microsoft Outlook Expert Good Limited Use None Are you able to commit to 15

Feschotte, Cedric

84

U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28: Microsoft Windows win32k.sys TrueType Font Parsing 28: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability November 7, 2011 - 8:15am Addthis PROBLEM: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability. PLATFORM: Microsoft Windows 7 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2008 Microsoft Windows Storage Server 2003 Microsoft Windows Vista Microsoft Windows XP Home Edition Microsoft Windows XP Professional ABSTRACT: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. reference LINKS:

85

2008 - 12 | Jefferson Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiation Badge Change Out Thu, 12182008 - 3:00pm Lab Cybersecurity Update: Critical Patch for Microsoft Internet Explorer - Requires Reboot Thu, 12182008 - 3:00pm Employee...

86

2008 | Jefferson Lab  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiation Badge Change Out Thu, 12182008 - 3:00pm Lab Cybersecurity Update: Critical Patch for Microsoft Internet Explorer - Requires Reboot Thu, 12182008 - 3:00pm Employee...

87

Microsoft Word - Talks 20120822  

NLE Websites -- All DOE Office Websites (Extended Search)

Dr. Dai-Mei Zhou Institute of Particle Physics, Central China Normal University zhoudm@phy.ccnu.edu.cn Abstract: We use the non-statistical fluctuation to explore the higher...

88

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

89

T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow  

NLE Websites -- All DOE Office Websites (Extended Search)

65: Vulnerability in Microsoft Malware Protection Engine Could 65: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability February 25, 2011 - 7:40am Addthis PROBLEM: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability. PLATFORM: Microsoft Malware Protection Engine Last version of the Microsoft Malware Protection Engine affected by this vulnerability: Version 1.1.6502.0 This version is the last version of the Microsoft Malware Protection Engine that is affected by the vulnerability. First version of the Microsoft Malware Protection Engine with this vulnerability addressed:Version 1.1.6603.0 If the version of the Microsoft Malware Protection Engine is equal to or

90

Integrated Internet collaboration  

Science Journals Connector (OSTI)

...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...being realized. Technologies, such as INSP...Internet and intranet computing allows...e-commerce, Intranet, remote collaboration...and other new technologies. They should be...

Dimitri Bevc; Alexander M. Popovici

91

Service Oriented Internet Jaideep Chandrashekar  

E-Print Network (OSTI)

propose a novel, overlay based Service Oriented Internet architecture that is meant to serve as a flexible elsewhere. In this paper, we describe a new architecture -- the "Service Oriented Internet" or SOI, whichService Oriented Internet Jaideep Chandrashekar ¡ , Zhi-Li Zhang ¡ , Zhenhai Duan ¡ , and Y

Duan, Zhenhai

92

Distributed Internet Security and Measurement  

E-Print Network (OSTI)

BGP (the Internet's interdomain routing protocol). It introduces Pretty Good BGP, an anomaly detection#12;Distributed Internet Security and Measurement by Josh Karlin B.A., Computer Science Internet Security and Measurement by Josh Karlin ABSTRACT OF DISSERTATION Submitted in Partial Fulfillment

Forrest, Stephanie

93

Web strategies to promote internet shopping: is cultural-customization needed?  

Science Journals Connector (OSTI)

Building consumer trust is important for new or unknown Internet businesses seeking to extend their customer reach globally. This study explores the question: Should website designers take into account the cultural characteristics of prospective customers ... Keywords: cross-cultural study, internet shopping, trust, web strategies

Choon Ling Sia; Kai H. Lim; Kwok Leung; Matthew K. O. Lee; Wayne Wei Huang; Izak Benbasat

2009-09-01T23:59:59.000Z

94

Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of Adelaide  

E-Print Network (OSTI)

89 Internet-Enabled Supply ChainsInternet-Enabled Supply Chains Quan Z. Sheng, University of the Internet-enabled Supply Chain 89 Key Supply Chain Processes and the Internet 89 Impacts of Internet-Enabled Supply Chains 92 Enabling Technologies for Internet-Enabled Supply Chain Management 92 Internet-based EDI

Sheng, Michael

95

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

96

Microsoft Word - FORM46002.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2.doc Microsoft Word - FORM46002.doc Microsoft Word - FORM46002.doc More Documents & Publications DOE F 4600.2 ATTACHMENT FLASH 2011-46(6) Attachment FY2011-63 OPAM...

97

Microsoft Word - AL2003-04.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Word - AL2003-04.doc Microsoft Word - AL2003-04.doc More Documents & Publications Microsoft Word - AL2006-08.doc AL2004-01r2.pdf City of Tulare Renewable Biogas Fuel Cell Project...

98

Microsoft Word - EERE PSRP 7 23 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 More Documents & Publications Office of Energy Efficiency and Renewable Energy Program...

99

Microsoft Word - Final MR AL.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Final MR AL.doc Microsoft Word - Final MR AL.doc Microsoft Word - Final MR AL.doc More Documents & Publications DOE F 4220.23 Weighted Guidelines Weighted Guidelines...

100

Microsoft, libraries and open source  

SciTech Connect

We are finally starting to see the early signs of transformation inscholarly publishing. The innovations we've been expecting for years areslowly being adopted, but we can also expect the pace of change toaccelerate in the coming 3 to 5 years. At the same time, many of ritualsand artifacts of the scholarly communication lifecycle are still rooted ina centuries-old model. What are the primary goals of scholarlycommunication, and what will be the future role of librarians in thatcycle? What are the obstacles in information flow (many of our owndesign) that can be removed?Is the library profession moving fast enough to stay ahead of the curve...or are we ever going to be struggling to keep up? With the advent of thedata deluge, all-XML workflows, the semantic Web, cloud servicesand increasingly intelligent mobile devices - what are the implicationsfor libraries, archivists, publishers, scholarly societies as well asindividual researchers and scholars? The opportunities are many - butcapitalizing on this ever-evolving landscape will require significantchanges to our field, changes that we are not currently well-positioned toenact. This talk will map the current scholarly communication landscape -highlighting recent exciting developments, and will focus on therepercussions and some specific recommendations for the broader field ofinformation management.About the speaker:Alex Wade is the Director for Scholarly Communication within Microsoft'sExternal Research division, where he oversees several projects related toresearcher productivity tools, semantic information capture, and theinteroperability of information systems. Alex holds a Bachelor's degree inPhilosophy from U.C. Berkeley, and a Masters of Librarianship degree fromthe University of Washington.During his career at Microsoft, Alex has managed the corporate search andtaxonomy management services; has shipped a SharePoint-based document andworkflow management solution for Sarbanes-Oxley compliance; and served asSenior Program Manager for Windows Search in Windows Vista and Windows 7.Prior to joining Microsoft, Alex held Systems Librarian, EngineeringLibrarian, Philosophy Librarian, and technical library positions at theUniversity of Washington, the University of Michigan, and U.C. Berkeley.Web: http://research.microsoft.com/en-us/people/awade/

None

2010-04-26T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Microsoft, libraries and open source  

ScienceCinema (OSTI)

We are finally starting to see the early signs of transformation inscholarly publishing. The innovations we've been expecting for years areslowly being adopted, but we can also expect the pace of change toaccelerate in the coming 3 to 5 years. At the same time, many of ritualsand artifacts of the scholarly communication lifecycle are still rooted ina centuries-old model. What are the primary goals of scholarlycommunication, and what will be the future role of librarians in thatcycle? What are the obstacles in information flow (many of our owndesign) that can be removed?Is the library profession moving fast enough to stay ahead of the curve...or are we ever going to be struggling to keep up? With the advent of thedata deluge, all-XML workflows, the semantic Web, cloud servicesand increasingly intelligent mobile devices - what are the implicationsfor libraries, archivists, publishers, scholarly societies as well asindividual researchers and scholars? The opportunities are many - butcapitalizing on this ever-evolving landscape will require significantchanges to our field, changes that we are not currently well-positioned toenact. This talk will map the current scholarly communication landscape -highlighting recent exciting developments, and will focus on therepercussions and some specific recommendations for the broader field ofinformation management.About the speaker:Alex Wade is the Director for Scholarly Communication within Microsoft'sExternal Research division, where he oversees several projects related toresearcher productivity tools, semantic information capture, and theinteroperability of information systems. Alex holds a Bachelor's degree inPhilosophy from U.C. Berkeley, and a Masters of Librarianship degree fromthe University of Washington.During his career at Microsoft, Alex has managed the corporate search andtaxonomy management services; has shipped a SharePoint-based document andworkflow management solution for Sarbanes-Oxley compliance; and served asSenior Program Manager for Windows Search in Windows Vista and Windows 7.Prior to joining Microsoft, Alex held Systems Librarian, EngineeringLibrarian, Philosophy Librarian, and technical library positions at theUniversity of Washington, the University of Michigan, and U.C. Berkeley.Web: http://research.microsoft.com/en-us/people/awade/

None

2011-10-06T23:59:59.000Z

102

Microsoft SQL Server 6.0{reg_sign} Workbook  

SciTech Connect

This workbook was prepared for introductory training in the use of Microsoft SQL Server Version 6.0. The examples are all taken from the PUBS database that Microsoft distributes for training purposes or from the Microsoft Online Documentation. The merits of the relational database are presented.

Augustenborg, E.C.

1996-09-01T23:59:59.000Z

103

V-196: Microsoft Security Bulletin Advance Notification for July 2013  

Energy.gov (U.S. Department of Energy (DOE))

Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

104

Microsoft Word - lbrereleasefinal  

NLE Websites -- All DOE Office Websites (Extended Search)

Low Background Radiation Experiment Low Background Radiation Experiment Yields Interesting Preliminary Results CARLSBAD, N.M., May 18, 2011 - New Mexico State University's Low Background Radiation Experiment (LBRE), which takes place 2,150 feet below the earth's surface at the Waste Isolation Pilot Plant, recently released some results about the project's first two years of experimentation. The March 2011 edition of Health Physics printed an article titled "Exploring Biological Effects of Low Level Radiation from the Other Side of Background," summarizing some initial data taken from LBRE and from a sister experiment conducted at the Lovelace Respiratory Research Institute in Albuquerque. "It's nice that we got them published, but they are still very preliminary," said NMSU Professor

105

Diploma in Management Internet Business concentration  

E-Print Network (OSTI)

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Diploma in Management Internet Business concentration Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

106

Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc Microsoft Word - July 2008 PMCDP Module CHRIS ESS Tutorial.doc Microsoft Word - July 2008 PMCDP Module CHRIS ESS...

107

Microsoft PowerPoint - IGCA Training 2010 v3 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Training 2010 v3 Microsoft PowerPoint - IGCA Training 2010 v3 Microsoft PowerPoint - IGCA Training 2010 v3 More Documents & Publications IGCA Training 2012 Microsoft...

108

Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc Microsoft Word - NNSA...

109

Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc | Department...  

Energy Savers (EERE)

ARRAGAODeviation 6.12.09.doc Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc Microsoft Word - AL-ARRAGAODeviation 6.12.09.doc More Documents & Publications Microsoft Word -...

110

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) Microsoft PowerPoint - Nov 2009 PI Org Chart (web) PI Organization chart Microsoft PowerPoint - Nov 2009 PI Org Chart (web) More...

111

1. The Internet 1-1 Chapter 1: The Internet  

E-Print Network (OSTI)

1. The Internet 1-1 Chapter 1: The Internet References: · Rainer Klute: Das World Wide Web. Addison with TCP/IP. Prentice Hall, 1988, ISBN 0134701887. · W. Richard Stevens: TCP Illustrated, Vol. 1. Addison-Wesley, 1994, ISBN 0201633469. · W. Richard Stevens: UNIX Network Programming, Vol. 1, 2nd Ed. Prentice Hall

Brass, Stefan

112

T-586: Microsoft Advisory about fraudulent SSL Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

586: Microsoft Advisory about fraudulent SSL Certificates 586: Microsoft Advisory about fraudulent SSL Certificates T-586: Microsoft Advisory about fraudulent SSL Certificates March 23, 2011 - 3:05pm Addthis PROBLEM: Microsoft just released an advisory alerting its customers that a total of 9 certificates were issued using the leaked/stolen CA certificated from Comodo. PLATFORM: These certificates affect the following Web properties: login.live.com mail.google.com www.google.com login.yahoo.com (3 certificates) login.skype.com addons.mozilla.org "Global Trustee" ABSTRACT: Microsoft Advisory about fraudulent SSL Certificates. reference LINKS: Microsoft Security Advisory: 2524375 ISC 2011-03-23 Security updates IMPACT ASSESSMENT: High Discussion: Microsoft is aware of nine fraudulent digital certificates issued by Comodo, a certification authority present in the Trusted Root Certification

113

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

114

T-620: Microsoft Security Bulletin Advance Notification for May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-620: Microsoft Security Bulletin Advance Notification for May T-620: Microsoft Security Bulletin Advance Notification for May 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011 May 10, 2011 - 7:00am Addthis PROBLEM: Microsoft released 2 bulletins to address vulnerabilities involving Microsoft Windows Server and Microsoft Office. This Microsoft Bulletin contains 1 Critical vulnerability and 1 Important vulnerability which require a restart after the applied patches. PLATFORM: Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2, Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based

115

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network (OSTI)

the symp- toms of abuse on the Internet. Through interposingInternet as a medium for communication and commerce has attracted many actors who abuseAbuse Working Group (MAAWG) in 2009, estimate that 29% and 12%, respectively, of Internet

Kanich, Christopher William

2012-01-01T23:59:59.000Z

116

Internet Explorer 7 on Windows Vista: Obtaining MIT Certificates  

E-Print Network (OSTI)

: A separate certificate password is not necessary for IE7 on Vista; the certificate is protected by your web services at MIT with IE7 on Windows Vista, three types of MIT web certificates are needed: · MIT servers · MIT Client Certificate, needed in IE7 on Vista to generate the personal certificate · MIT

Barton, Paul I.

117

Explorative study of African Americans and internet dating  

E-Print Network (OSTI)

. Macintosh, and Dr. Dyer. Most of all, I would like to thank Dr. Murguia for his time, patience, understanding, and encouragement throughout this entire process. To my grandmother and uncle, thank you for all of your support. You both always..., Putnam (2000) states: Members of a community that follows the principle of generalized reciprocity? raking your neighbors leaves before they blow onto your neighbors? yard, lending a dime to a stranger for a parking meter, buying a round of drinks...

Spates, Kamesha Sondranek

2005-02-17T23:59:59.000Z

118

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Office of Environmental Management (EM)

727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

119

Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management Division Oak Ridge Office SharePoint( MicrosoftSHarePointServer) PIA, Information Resourses Management...

120

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Microsoft Word - FOA 0000131 Final 10-11-09.docx | Department...  

Energy Savers (EERE)

Word - FOA 0000131 Final 10-11-09.docx More Documents & Publications Recovery Act: Clean Coal Power Initiative Microsoft Word - vDE-FOA-0000042.rtf Microsoft Word -...

122

Asymmetric responses, risk seeking and internet bubble  

Science Journals Connector (OSTI)

We measure internet bubbles to verify the existence and evaporation of the internet bubble in early 2000. Then, we compare investor responses to internet stocks with those to traditional stocks to find how the internet bubble formed. Empirical results confirm that the internet bubble existed between 1998 and 1999, but began to evaporate in early 2000. Further, we find that the internet bubble formed due to investors' irrational overreaction to internet firms' positive outlooks and underreaction to internet firms' negative outlooks relative to their reactions to traditional firms. This finding supports our hypotheses that asset bubbles formed due to investors' extreme risk-seeking asymmetric responses to good and bad information.

Jaehan Koh; Bin Wang; Lai C. Liu; Kai S. Koong

2010-01-01T23:59:59.000Z

123

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

124

Latent Class Models in action: Bridging social capital & Internet usage  

Science Journals Connector (OSTI)

Abstract This paper explores how Latent Class Models (LCM) can be applied in social research, when the basic assumptions of regression models cannot be validated. We examine the usefulness of this method with data collected from a study on the relationship between bridging social capital and the Internet. Social capital is defined here as the resources that are potentially available in ones social ties. Bridging is a dimension of social capital, usually related to weak ties (acquaintances), and a source of instrumental resources such as information. The study surveyed a stratified random sample of 417 inhabitants of Lisbon, Portugal. We used LCM to create the variable bridging social capital, but also to estimate the relationship between bridging social capital and Internet usage when we encountered convergence problems with the logistic regression analysis. We conclude by showing a positive relationship between bridging and Internet usage, and by discussing the potential of LCM for social science research.

Barbara Barbosa Neves; Jaime R.S. Fonseca

2015-01-01T23:59:59.000Z

125

Underground Exploration  

E-Print Network (OSTI)

Underground Exploration and Testing A Report to Congress and the Secretary of Energy Nuclear Waste Technical Review Board October 1993 Yucca Mountain at #12;Nuclear Waste Technical Review Board Dr. John E and Testing #12;Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Introduction

126

Research challenges towards the Future Internet  

Science Journals Connector (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri Mhnen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

127

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

547: Microsoft Windows Human Interface Device (HID) Vulnerability 547: Microsoft Windows Human Interface Device (HID) Vulnerability T-547: Microsoft Windows Human Interface Device (HID) Vulnerability February 1, 2011 - 3:20am Addthis PROBLEM Microsoft Windows Human Interface Device (HID) Vulnerability. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. reference LINKS: Security Lab: Reference CVE-2011-0638 CVE Details: Reference CVE-2011-0638 Mitre Reference: CVE-2011-0638

128

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

129

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler  

E-Print Network (OSTI)

Internet Engineering Task Force S. Floyd INTERNET-DRAFT E. Kohler Intended status: Informational draft-irtf-tmrg-tools-05.txt Status of this Memo By submitting this Internet-Draft, each author 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas

Floyd, Sally

130

Graduate Certificate in Internet Business Looking for a Career in Internet Business?  

E-Print Network (OSTI)

, telecommunications, the internet and the Web as well as a good understanding of consumer behaviour. Our internet1 Graduate Certificate in Internet Business Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have evolved to become a fundamental part

Pientka, Brigitte

131

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network (OSTI)

Internet Engineering Task Force INTERNET-DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet-Draft. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

132

Substance abuse precedes internet addiction  

Science Journals Connector (OSTI)

Abstract The purpose of the current study was to evaluate possible overlapping substance abuse and internet addiction in a large, uniformly sampled population, ranging in age from 13 to 18years. Participants (N=73,238) in the current study were drawn from the 6th Korea Youth Risk Behavior Web-based Survey (KYRBWS-V) for students from 400 middle schools and 400 high schools in 16 cities within South Korea. Of adolescent internet users, 85.2% were general users (GU), 11.9% were users with potential risk for internet addiction (PR), and 3.0% were users with high risk for internet addiction (HR). There was a difference in the number of students with alcohol drinking among the GU, PR, and HR groups (20.8% vs 23.1% vs 27.4%). There was a difference in the number of students who smoked among the GS, PR, and HR groups (11.7% vs 13.5% vs 20.4%). There was a difference in the number of students with drug use among the GU, PR, and HR groups (1.7% vs 2.0% vs 6.5%). After adjusting for sex, age, stress, depressed mood, and suicidal ideation, smoking may predict a high risk for internet addiction (OR=1.203, p=0.004). In addition, drug use may predict a high risk for internet addiction (OR=2.591, pinternet addiction have vulnerability for addictive behaviors, co-morbid substance abuse should be evaluated and, if found, treated in adolescents with internet addiction.

Young Sik Lee; Doug Hyun Han; Sun Mi Kim; Perry F. Renshaw

2013-01-01T23:59:59.000Z

133

Using Gopher on the Internet  

SciTech Connect

This report is a complication of vugraphs with respect to the use of Gopher on Internet. There are viewgraphs on using Gopher at the University of California at Santa Cruz. Examples of other Internet Gopher servers around the world are given. Also discussed is the Library of Congress Gopher and JUGHEAD which is an acronym for Jonzy`s Universal Gopher Hierarchy Excavation And Display.

Davidoff, G.

1994-04-01T23:59:59.000Z

134

Oil & Natural Gas Projects Exploration and Production Technologies | Open  

Open Energy Info (EERE)

Oil & Natural Gas Projects Exploration and Production Technologies Oil & Natural Gas Projects Exploration and Production Technologies Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Oil & Natural Gas Projects Exploration and Production Technologies Author U.S. Department of Energy Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Oil & Natural Gas Projects Exploration and Production Technologies Citation U.S. Department of Energy. Oil & Natural Gas Projects Exploration and Production Technologies [Internet]. [cited 2013/10/15]. Available from: http://www.netl.doe.gov/technologies/oil-gas/Petroleum/projects/EP/Explor_Tech/P225.htm Retrieved from "http://en.openei.org/w/index.php?title=Oil_%26_Natural_Gas_Projects_Exploration_and_Production_Technologies&oldid=688583

135

2011 Microsoft Corporation. All rights reserved. Reposting of content without explicit permission is forbidden.  

E-Print Network (OSTI)

with the familiarity of a Microsoft Office experience; consolidated intranet sites; secure and simplified business

Hunt, Galen

136

Microsoft Word - AL2006-11.doc | Department of Energy  

Office of Environmental Management (EM)

Contract Without Full and Open Competition and Site and Utilization Management Planning Subject: Cost and Price Analysis Microsoft Word - Policy Flash 2010-67 Attachment 1...

137

Microsoft Word - al96-09.doc | Department of Energy  

Energy Savers (EERE)

Contract Without Full and Open Competition and Site and Utilization Management Planning Subject: Cost and Price Analysis Microsoft Word - Policy Flash 2010-67 Attachment 1...

138

Microsoft Word - PeerReview_SAR.doc | Department of Energy  

Energy Savers (EERE)

- PeerReviewCCSP.doc Microsoft Word - Cross Reference Matrix Introduction.doc DRAFT NEPA Guidance on Consideration of the Effects of Climate Change and Greenhouse Gas Emissions...

139

Microsoft PowerPoint - Tsinghua Slideshow final for distribution...  

Energy Savers (EERE)

Documents & Publications Microsoft PowerPoint - Final translated version of Tsinghua Speech Idaho Operations AMWTP Fact Sheet Heating Ventilation and Air Conditioning Efficiency...

140

Microsoft Word - 338M_Geothermal_Project_Descriptions | Department...  

Energy Savers (EERE)

Word - 338MGeothermalProjectDescriptions More Documents & Publications Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 564MBiomassProjects.pdf Slide 1...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Microsoft PowerPoint - WH Energy and Climate Stakeholders 10...  

Office of Environmental Management (EM)

& Publications Rising Electricity Costs: A Challenge For Consumers, Regulators, And Utilities US-China Clean Energy Forum 2010 Microsoft PowerPoint - CHUGrid Week 9-21-09...

142

Microsoft Word - CERFDOE Final Report - 071204.doc | Department...  

Energy Savers (EERE)

Microsoft Word - CERFDOE Final Report - 071204.doc More Documents & Publications Integrated Project Team RM DOE EIR FM.doc Proposed Data Elements for PARS II Web Application...

143

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file. Impact: An attacker can exploit...

144

Microsoft PowerPoint - PaulGottliebTechTransfer | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - PaulGottliebTechTransfer More Documents & Publications Alliance For Sustainable Energy AllianceForSustainableEnergy-Letter.pdf Government Practices...

145

Microsoft Word - Subject Categories Booklet  

NLE Websites -- All DOE Office Websites (Extended Search)

Descriptions 01 COAL, LIGNITE, AND PEAT Information on coal and coal products, including lignite and peat, as energy sources. Reserves, geology and exploration; surface and...

146

Alexithymia and internet abuse in young adults  

Science Journals Connector (OSTI)

Problematic internet use has become a growing concern in recent years due to expanded access and dependence on the internet. This study examined the relationship between alexithymia and internet abuse in a sample of young adults (165 males and 650 females). Participants completed the Internet Addiction Test (IAT) and the TAS-20. The alexithymic group (n=105) scored significantly higher than the non-alexithymic group (n=532) on all of the IAT scales: withdrawal scale, F(1,632)=31.21, pinternet abuse and emphasize the need to address these underlying vulnerabilities when treating internet abuse.

R.N. Taylor; R. Koerber; J.D.A. Parker; S.B. Maitland

2014-01-01T23:59:59.000Z

147

Microsoft Word - Vol II.docx  

Office of Legacy Management (LM)

and the public. LM currently uses the Geospatial Environmental Mapping System (GEMS), a web-based application, to provide the agencies and the public with Internet access to...

148

Microsoft Word - Appendix B cover.doc  

National Nuclear Security Administration (NNSA)

information regarding DOE NEPA activities is available on the Internet through the NEPA Web site at http:www.gc.energy.govnepa. SUPPLEMENTARY INFORMATION: Background The NTS...

149

White Paper: CA and Microsoft for Interoperable, Secure Web Business  

E-Print Network (OSTI)

White Paper: CA and Microsoft for Interoperable, Secure Web Business Enablement Author: Dave, and improve outreach to business partners and customers. This white paper reviews how solutions from CA (CA SiteMinder, CA Federation Manager) and Microsoft (Active Directory Federation Services (formerly code

Narasayya, Vivek

150

U-182: Microsoft Windows Includes Some Invalid Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Microsoft Windows Includes Some Invalid Certificates 82: Microsoft Windows Includes Some Invalid Certificates U-182: Microsoft Windows Includes Some Invalid Certificates June 4, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Microsoft Windows. A remote user may be able to spoof code signing signatures. PLATFORM: Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1; and prior service packs ABSTRACT: The operating system includes some invalid intermediate certificates. The vulnerability is due to the certificate authorities and not the operating system itself. Reference Links: Security tracker ID 1027114 GENERIC-MAP-NOMATCH Vendor Advisory IMPACT ASSESSMENT: High Discussion: The invalid certificates and their thumbprints are: Microsoft Enforced Licensing Intermediate PCA: 2a 83 e9 02 05 91 a5 5f c6

151

A Handy Internet Politics Measurement Note Internet Politcs Measurement Measurement and analysis on the Internet politics through  

E-Print Network (OSTI)

A Handy Internet Politics Measurement Note Internet Politcs Measurement ­ Measurement and analysis on the Internet politics through case studies on (i) well-known but failed technical ideas in history, (ii........................................................................................................4 Abuse of Censorship-free Speech, "Human Search Engine" (China) ...............................4

Kuzmanovic, Aleksandar

152

Public Health Policy For Internet Cigarette Retailers  

E-Print Network (OSTI)

Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,Internet cigarette retailers to avoid local cigarette prices); see also National Household Survey on Drug Abuse,

Banthin, Christopher

2005-01-01T23:59:59.000Z

153

The Evolution of International Internet Telephony  

E-Print Network (OSTI)

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

154

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H. Schulzrinne  

E-Print Network (OSTI)

Internet Engineering Task Force Individual Submission INTERNET-DRAFT J. Lennox, J. Rosenberg, H Gateway Interface for SIP Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

155

Very large conferences on the Internet: the Internet Multimedia Conferencing Architecture.  

E-Print Network (OSTI)

components still in a nascent stage. 1 Introduction The Internet is not currently very good at carry­ ingVery large conferences on the Internet: the Internet Multimedia Conferencing Architecture. M In this paper we provide an overview of multimedia conferencing on the Internet. The protocols men­ tioned

Handley, Mark

156

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation  

E-Print Network (OSTI)

Internet 3.0: Ten Problems with Current Internet Architecture and Solutions for the Next Generation Louis Saint Louis, MO 63130 jain@cse.wustl.edu Abstract-- The basic ideas of the Internet architecture switching. Is this the way we would design the Internet if we were to start it now? This paper is an attempt

Jain, Raj

157

Research and the Internet connection  

Science Journals Connector (OSTI)

... to cut funding for fusion research by a third. The Princeton Plasma Physics Laboratory (PPPL) says that the loss of one quarter of its staff means that collaboration with ... means that collaboration with researchers at other universities over the Internet has become "essential". PPPL recently began transmitting sound and video from the control room of its Tokamak Fusion Test ...

Declan Butler

1996-04-04T23:59:59.000Z

158

Internet Data logging and Display  

E-Print Network (OSTI)

. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands...

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

159

Timekeeping in the Interplanetary Internet  

E-Print Network (OSTI)

vehicles, retrieve data for later transmission to Earth · Spacecraft ­ transport orbiters and surface, network routing, ephemeris maintenance and general timekeeping #12;2-Aug-04 3 IPIN issues o Transmission Transmission speeds are highly variable, but in general far slower than Earth internet o Spacecraft position

Mills, David L.

160

Microsoft Word - MAT0013.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

MAT0013 ~ IATA/Biologicals & Dry Ice Shipper MAT0013 ~ IATA/Biologicals & Dry Ice Shipper Course Syllabus Subject Category: Hazardous Materials Transportation Course Prerequisite: None Course Length: Varies by Vendor and Delivery Method Medical Approval: None Delivery Mode: Off-Site classroom, CD, or via Internet Schedule: As required, established by Research or Support Division Location/Time: Varies, typically 1 day or less, based on vendor schedule or mode of delivery Course Purpose: Dry ice is regulated as Dangerous Goods when transported by air. Certain biological materials may also be regulated as Dangerous Goods, Division 6.2. Personnel who participate in the process of shipping biological materials in dry ice containing packages by air are required to be trained in accordance with the training requirements

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Microsoft Word - induspmt.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Resources Control Board Water Resources Control Board Division of Water Quality 1001 I Street * Sacramento, California 95814 * (916) 341-5538 Mailing Address: P.O. Box 1977 * Sacramento, California * 95812-1977 FAX (916) 341-5543 * Internet Address: http://www.waterboards.ca.gov/stormwtr/index.html Alan C. Lloyd Ph D. Secretary for Environmental Protection Arnold Schwarzengger Governor To: STORM WATER DISCHARGER SUBJECT: CHECKLIST FOR SUBMITTING A NOTICE OF INTENT In order for the State Water Resources Control Board to expeditiously process your Notice of Intent (NOI), the following items must be submitted to either of the addresses indicated below: 1._______ NOI (please keep a copy for your files) with all applicable sections completed and original signature of the facility operator;

162

Measuring Internet Performance: Challenges and Opportunities  

E-Print Network (OSTI)

Measuring Internet Performance: Challenges and Opportunities Rocky K. C. Chang Internet;Internet Infrastructure and Security Laboratory 2 #12;Measuring end-to-end performance · Source: Akamai's network performance comparison 3 #12;End-to-end network monitoring ... 4 #12;Why measuring network path

Chang, Rocky Kow-Chuen

163

The End of Internet Architecture Timothy Roscoe  

E-Print Network (OSTI)

back and asks a more radical question: is an internet ar- chitecture a good thing at all? Are weThe End of Internet Architecture Timothy Roscoe National ICT Australia, Sydney Intel Research have seen considerable publishing activ- ity in the area of "internet architecture". This paper steps

Roscoe, Timothy

164

Applying Quantitative Marketing Techniques to the Internet  

E-Print Network (OSTI)

. Blattberg and Deighton [1991] laid out a good framework for Internet marketing in their articleApplying Quantitative Marketing Techniques to the Internet by Alan L. Montgomery Carnegie Mellon with clickstream data. I illustrate these four modeling techniques and discuss their potential for solving Internet

Faloutsos, Christos

165

Modeling Internet Topology Dynamics Hamed Haddadi  

E-Print Network (OSTI)

graphs. Generation of the topology of the Internet calls for a model that achieves a good balance betweenModeling Internet Topology Dynamics Hamed Haddadi University College London Steve Uhlig Delft and inference, there still exists ambiguity about the real nature of the Internet AS and router level topol- ogy

Haddadi, Hamed

166

EVALUATION OF EVIDENCE IN INTERNET AUCTION  

E-Print Network (OSTI)

allegations about the sale of counterfeit goods at Internet auction sites. Also, it applies a Bayesian- livering the goods that are offered for sale. As a result, Internet auction fraud is the most common type of Internet auction fraud in Hong Kong related to the sale of counterfeit goods (i.e., goods bear- ing false

Overill, Richard E.

167

Future Internet Infrastructures for FI Prototyping  

E-Print Network (OSTI)

++ Fraunhofer Institute FOKUS, Berlin ++ www.fokus.fraunhofer.de/go/innovation ++ 11­2009 #12;Future Internet Berlin AV de- partment (Architektur für Vermittlungskno- ten). Part of the Fraunhofer innovation clusFuture Internet Infrastructures for FI Prototyping NGN Evolution toward Future Internet Fraunhofer

Wichmann, Felix

168

Microsoft PowerPoint - Durango Solar Leasing Prebid Meeting for Internet posting.ppt  

Office of Legacy Management (LM)

Debbie Barr Debbie Barr Jalena Dayvault Dr. Laura Kilpatrick November 15, 2011 U.S. Department of Energy Office of Legacy Management Bidders Conference and Site Visit U.S. Department of Energy (DOE) Photovoltaic Solar Project Bidders Conference Durango, Colorado November 15, 2011 Office of Legacy Management Office of Site Operations 3 3 Presentation Outline Durango Disposal Site Durango Disposal Cell Background Disposal Cell Facts Disposal Cell Protectiveness Disposal Site: Long-Term Surveillance Plan 4 4 Durango Disposal Cell Background The Uranium Mill Tailings Radiation Control Act authorized DOE to clean up uranium mill tailings at 22 inactive mill sites from 1983 to 1998 Tailings were removed from Smelter Mountain and placed in a new disposal site above the west end of

169

Learning with data : a toolkit to democratize the computational exploration of data  

E-Print Network (OSTI)

This thesis explores the space of programming with data, focusing on the data-ecosystem opened up by the Internet and Cloud technologies. The central argument of this thesis is that the act of democratizing programmatic ...

Dasgupta, Sayamindu

2012-01-01T23:59:59.000Z

170

1 MICROSOFT.COM/CITIZENSHIP Microsoft on the Topic: Environmental Sustainability  

E-Print Network (OSTI)

. Microsoft is working with leading organizations around the globe to help increase the value that our to protect the environment, conserve natural resources, and safeguard the health and safety of our employees and indirect impact on the environment. A few examples include: · Data Center Operations: We are working

Narasayya, Vivek

171

1 Microsoft's Top 10 Business Practices for Environmentally Sustainable Datacenters Microsoft's Top 10 Business Practices for  

E-Print Network (OSTI)

outcomes include: Using information technology (IT) to improve energy efficiency; Accelerating--along with Microsoft's commitment to share best practices with the rest of the datacenter industry--this paper presents incentives to datacenter managers, not just for uptime, but also for improving energy efficiency as measured

Chaudhuri, Surajit

172

EXPLORATION ACTIVITY WORKSHEET MAJOR & CAREER EXPLORATION  

E-Print Network (OSTI)

of activity or process you should explore to bring you closer to your academic goals. NameEXPLORATION ACTIVITY WORKSHEET MAJOR & CAREER EXPLORATION Purpose: The exploration activity is designed for students to "explore" opportunities at UM as they relate to student success, majors, careers

Milchberg, Howard

173

Factors affecting the adoption or acceptance of internet banking services: a review and analysis of past research  

Science Journals Connector (OSTI)

Extensive review of literature shows that there is scarcity of facts related to retaining the old customers of internet banking and acquisition of new customers. This study is conducted to examine the trend of internet banking usage, its attributes and various factors affecting its adoption. The aim of this paper is to present the managers view along with the customer's view in internet banking and services to reduce the gap between customer's perceptions and manager's perceptions regarding factors affecting adoption of internet banking. This paper provides an insight into the key factors such as security, reliability, accessibility, availability, and cost, etc. used by researchers that should be kept in mind by customers before selecting particular internet banking services. These findings will be useful for new researchers who want to explore new dimensions in this field along with reducing the cost of customer acquisition, provide better service quality and higher customer retention rate.

Vaibhav Mishra; Vrijendra Singh

2014-01-01T23:59:59.000Z

174

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

175

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

176

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

177

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

178

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

179

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

180

Microsoft PowerPoint - 15.1615_Cost Estimating Panel | Department...  

Office of Environmental Management (EM)

615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel More Documents & Publications Contractor SOW...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

DOE Trade Secrets Rule Summary v 2.docx Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx More Documents &...

182

File:Microsoft PowerPoint - FINAL How to capture data from Wind...  

Open Energy Info (EERE)

Microsoft PowerPoint - FINAL How to capture data from Wind For Schools CAES energy site.pdf Jump to: navigation, search File File history File usage Metadata File:Microsoft...

183

Microsoft Word - dDE-FOA-0000116.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - dDE-FOA-0000116.rtf Microsoft Word - dDE-FOA-0000116.rtf More Documents & Publications Recovery Act - Geothermal Technologies Program:Ground Source Heat Pumps...

184

Microsoft PowerPoint - 15.1130_Jeff Baker_Final Ultra-High Efficiency...  

Office of Environmental Management (EM)

130Jeff BakerFinal Ultra-High Efficiency Commercial Buildings Microsoft PowerPoint - 15.1130Jeff BakerFinal Ultra-High Efficiency Commercial Buildings Microsoft PowerPoint -...

185

Microsoft Word - Turbine Manufactures MOU FINAL_5-31-08_.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc More Documents...

186

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 "Import". #12;Configure Microsoft Outlook 2011 for Mac HMS Help Desk Outlook 2011 for Mac HMS Help Desk: (617) 432-2000 3 · Select

Blackwell, Keith

187

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 2011 for Mac HMS Help Desk: (617) 432-2000 2 · Create a new". #12;Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432

Blackwell, Keith

188

Microsoft Word - vDE-FOA-0000042.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - vDE-FOA-0000042.rtf Microsoft Word - vDE-FOA-0000042.rtf Microsoft Word - vDE-FOA-0000042.rtf More Documents & Publications Recovery Act: Clean Coal Power Initiative...

189

Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21...  

Office of Environmental Management (EM)

Consolidated Approps FY 2008 as of feb 21 2008 final.doc Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21 2008 final.doc Microsoft Word - AL-Consolidated Approps FY...

190

Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc Microsoft Word - AL-Omnibus FY 2009 Apr 22 2009 all sections.doc More...

191

Microsoft PowerPoint - 2009.10.27 Bridge Inspection Follow-up...  

Energy Savers (EERE)

Inspection Follow-up Microsoft PowerPoint - 2009.10.27 Bridge Inspection Follow-up More Documents & Publications Slide 1 Slide 1 Microsoft Word - Issue FY2009 Q4 Draft 20090910.doc...

192

Microsoft Word - Agenda F&I Update 090804.doc | Department of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Agenda F&I Update 090804.doc Microsoft Word - Agenda F&I Update 090804.doc More Documents & Publications Agenda Slide 1 Microsoft Word - Issue FY2009 Q4 Draft 20090910.doc...

193

Microsoft PowerPoint - 12 Holman White PM Conference 2010 Rev...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Holman White PM Conference 2010 Rev 2 revised Microsoft PowerPoint - 12 Holman White PM Conference 2010 Rev 2 revised Microsoft PowerPoint - 12 Holman White PM Conference 2010...

194

Microsoft Word - nDE-FOA-0000051.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

nDE-FOA-0000051.rtf Microsoft Word - nDE-FOA-0000051.rtf Microsoft Word - nDE-FOA-0000051.rtf More Documents & Publications Weatherization Formula Grants - American Recovery and...

195

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc | Department...  

Office of Environmental Management (EM)

Microsoft Word - SMailSecureWeb-BasedEmailv3 2.doc Microsoft Word - SMailSecureWeb-BasedEmailv3 2.doc Instructions for Using Secure Email via Outlook Web Access More...

196

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

197

Periodic Broadcast and Patching Services Implementation, Measurement, and Analysis in an Internet  

E-Print Network (OSTI)

Periodic Broadcast and Patching Services ­ Implementation, Measurement, and Analysis in an Internet time al- lowing asynchronous access to multimedia steams by a large number of clients. Current research, and explore the issues that arise when implementing these algorithms. We present measurements detailing

Massachusetts at Amherst, University of

198

Standards as InterdependentArtifacts: the Case of the Internet Mo-Han Hsieh  

E-Print Network (OSTI)

Standards as InterdependentArtifacts: the Case of the Internet by Mo-Han Hsieh B.S. Civil Systems Chair, Engineer ystems Division Education Committee #12;1 #12;Standards as Interdependent in Engineering Systems ABSTRACT This thesis has explored a new idea: viewing standards as interdependent

de Weck, Olivier L.

199

Data Exploration at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Exploration Data Exploration energy16gunther.jpg Highly interactive data exploration is a key component of scientific analytics, often combining multiple analytics technologies,...

200

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

202

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin Advance Notification for April 0: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

203

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

204

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

205

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

206

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for July 9: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

207

V-175: Microsoft Security Bulletin Advance Notification for June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for June 5: Microsoft Security Bulletin Advance Notification for June 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 June 11, 2013 - 12:12am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

208

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

209

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

210

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

211

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

212

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

213

V-064: Microsoft Security Bulletin Advance Notification for January 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for January 4: Microsoft Security Bulletin Advance Notification for January 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 January 8, 2013 - 1:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

214

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for June 9: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

215

V-154: Microsoft Security Bulletin Advance Notification for May 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for May 4: Microsoft Security Bulletin Advance Notification for May 2013 V-154: Microsoft Security Bulletin Advance Notification for May 2013 May 13, 2013 - 12:47am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

216

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

217

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

209: Microsoft Security Bulletin Advance Notification for July 209: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

218

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

219

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Microsoft Security Bulletin Advance Notification for June 89: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

220

Microsoft Word - AL2008-06.doc | Department of Energy  

Energy Savers (EERE)

Word - AL2008-06.doc Microsoft Word - AL2008-06.doc More Documents & Publications Chapter 9 - Contracting Qualifications AttachmentFlash2011-81(3).pdf AcqGuide9pt2.doc&0;...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

IN-SPIRE: Creating a Visualization from Microsoft Outlook  

ScienceCinema (OSTI)

IN-SPIRE can harvest text from Microsoft Outlook e-mail messages via a simple drag-and-drop mechanism. This is great for mailing lists or systems that send search results via e-mail.

None

2012-12-31T23:59:59.000Z

222

Microsoft Word - Policy Flash 2010-81 Attachment 1 | Department...  

Energy Savers (EERE)

Flash 2010-81 Attachment 1 Microsoft Word - Policy Flash 2010-81 Attachment 2 Policy Flash 2014-13 AL 2014-03: Allowability of Contractor Litigation Defense and Settlement Costs...

223

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

224

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Microsoft Security Bulletin Advance Notification for April 30: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

225

U-033: Microsoft Security Bulletin Summary for November 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Summary for November 2011 3: Microsoft Security Bulletin Summary for November 2011 U-033: Microsoft Security Bulletin Summary for November 2011 November 10, 2011 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Summary for November 2011. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

226

internet of things | OpenEI Community  

Open Energy Info (EERE)

internet of things Home No Battery Wearables Description: Wearable IT and communication devices that don't require a battery. This group is for discussion about innovations in...

227

Traditional marketing vs. Internet marketing. A comparison.  

E-Print Network (OSTI)

?? Title: Traditional marketing vs. Internet marketing: A comparison Problem: Marketing is an important strategy for businesses and it contains numerous effective tools. Traditional marketing (more)

Varfan, Mona

2008-01-01T23:59:59.000Z

228

Diploma in Internet Business Technology 1 McGill University  

E-Print Network (OSTI)

of programming, databases, networks, telecommunications, the internet and the Web as well as a good understandingDiploma in Internet Business Technology 1 McGill University Diploma in Internet Business Technology Looking for a Career in Internet Business? Since the past decade, internet and web-based technologies have

Pientka, Brigitte

229

Microsoft Word - tmp5.rtf  

NLE Websites -- All DOE Office Websites (Extended Search)

Five-Day Unit in Particle Physics for the Introductory Five-Day Unit in Particle Physics for the Introductory Physics Classroom Day 1 Introduction: We would like the students to understand why high-energy physics is asking the questions they are asking. Today the students will explore a mythical universe and the particles and forces that make up that universe. Students will understand that these same questions are the ones that have puzzled humans throughout time. Students will also get an introduction to current particle physics terminology and be introduced to the basics of theory formation. Materials for the Day: Make student copies of "How Does the Universe Work?," pages 10 and 11 in the TMP Book. Make student copies of page 2 and "Ultimate Periodical Table," pages 29-33 in

230

Microsoft Word - LPN.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Cationic Liposome-Microtubule Complexes: Lipid-Protein Bio-Nanotubes with Open or Closed Ends Uri Raviv *,† , Daniel J. Needleman *,† , Youli Li *,† , Herbert P. Miller † , Leslie Wilson † , and Cyrus R. Safinya *,† * Materials Department, Physics Department † Molecular, Cellular, and Developmental Biology Department, Biomolecular Science and Engineering Program, University of California, Santa Barbara, CA 93106 In this work we explored the structured that form when cationic liposomes are mixed with microtubules (MTs). Using synchrotron small angle X-ray diffraction (SAXRD) and transmission electron microscopy (TEM), we find two novel structures(1). For soft and intermediate rigid membranes we find that the cationic liposomes spread and coat the MTs

231

Confessions of an Internet alautun, Maya glyph  

E-Print Network (OSTI)

Confessions of an Internet Timekeeper alautun, Maya glyph David L. Mills University of Delaware http://www.eecis.udel.edu/~mills mailto:mills@udel.edu 14-Feb-07 1 #12;On the Internet cultural algorithms, timekeeping and growing pains. ­ Along the way I developed an obsession to wind every computer

Mills, David L.

232

The Internet of Things: A survey  

Science Journals Connector (OSTI)

This paper addresses the Internet of Things. Main enabling factor of this promising paradigm is the integration of several technologies and communications solutions. Identification and tracking technologies, wired and wireless sensor and actuator networks, ... Keywords: Internet of Things, Pervasive computing, RFID systems

Luigi Atzori; Antonio Iera; Giacomo Morabito

2010-10-01T23:59:59.000Z

233

Page 1 of 4 Housing Internet Services  

E-Print Network (OSTI)

of Technology #12;Page 2 of 4 Introduction to Curtin Internet Services Internet services from Housing Guide). Access to the Curtin INTRANET (Curtin web pages remains free) Choose an alternative external is provided in setting up your account or choosing an ISP. Access to the Curtin INTRANET (Curtin web pages

234

An Intermittent Energy Internet Architecture Barath Raghavan  

E-Print Network (OSTI)

's energy infrastructure and will likely include significant de- ployment of intermittent renewable energyAn Intermittent Energy Internet Architecture Barath Raghavan ICSI David Irwin UMass Jeannie-design the Internet for an energy- constrained future powered by diffuse, intermittent, and expensive power sources

Shenoy, Prashant

235

Your Mission: To become familiar with the major plate boundaries through exploration of plate tectonic features using Google Earth.  

E-Print Network (OSTI)

boundaries through exploration of plate tectonic features using Google Earth. Your Supplies: (1) A computer with internet access and the Google Earth program of Earth's tectonic plates using Google Earth. To do this, login

Smith-Konter, Bridget

236

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

237

Microsoft Word - Highland_CTC.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Highland Community Technology Center Highland Community Technology Center Table of Contents * Introduction Gloria Thurman, Program Coordinator, Highland Addition Community Center * Building Community Capacity Melinda Downing, Office of Stakeholder Relations, Office of Legacy Management, U.S. Department of Energy * Capacity Building in Federal Facility Communities Marsha Minter, Office of the Administrator, U.S. Environmental Protection Agency, Washington, DC * Gone Fishing: The Urban Internet Project is helping public housing residents tap the Internet Mark Baechtel, Fast Forward, Washington Post Supplement * Chronology of Events Introduction Welcome to the Highland Addition Community Center. Living in the Highland Addition community presents challenges and opportunities. The

238

Unraveling Internet identities : accountability & anonymity at the application layer  

E-Print Network (OSTI)

Both anonymity and accountability play crucial roles in sustaining the Internet's functionality, however there is a common misconception that increasing the anonymity of Internet identities necessitates diminishing their ...

Wolff, Josephine Charlotte Paulina

2012-01-01T23:59:59.000Z

239

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

240

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

SciTech Connect

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2009-04-29T23:59:59.000Z

242

Inventing an Energy Internet: Concepts, Architectures and Protocols for Smart Energy Utilization  

ScienceCinema (OSTI)

In recent years, the Internet is revolutionizing information availability much like the Power Grid revolutionized energy availability a century earlier. We will explore the differences and similarities of these two critical infrastructures and identify ways for convergence which may lead to an energy internet. Pricing signals, nodal forecasting, and short-term elasticities are key concepts in smart energy flows respecting the delicate equilibrium involved in generation-demand and aiming at higher efficiencies. We will discuss how intelligent forecasting approaches operating at multiple levels (including device or nodal levels) can ameliorate the challenges of power storage. In addition to higher efficiencies, an energy internet may achieve significant reliability and security improvements and offer greater flexibility and transparency in the overall energy-environmental relation.

Lefteri Tsoukalas

2010-01-08T23:59:59.000Z

243

Historical Exploration And Drilling Data From Geothermal Prospects And  

Open Energy Info (EERE)

Exploration And Drilling Data From Geothermal Prospects And Exploration And Drilling Data From Geothermal Prospects And Power Generation Projects In The Western United States Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Conference Proceedings: Historical Exploration And Drilling Data From Geothermal Prospects And Power Generation Projects In The Western United States Details Activities (20) Areas (7) Regions (0) Abstract: In 2005, Idaho National Laboratory was conducting a study of historical exploration practices and success rates for geothermal resources identification. Geo Hills Associates (GHA) was contracted to review and accumulate copies of published literature, Internet information, and unpublished geothermal exploration data to determine the level of exploration and drilling activities that occurred for all of the currently

244

Building internet trust: signalling through trustmarks  

Science Journals Connector (OSTI)

Consumers' concerns about privacy, security, and control of personal information highlight the importance of trust in building marketing relationships in the computer-mediated environment. Internet firms have begun posting third-party certifications, labelled ??trustmarks?, as signals of reliability, credibility, and general trustworthiness. This paper integrates the literatures on signalling theory and trust, and makes extensions to the internet. It identifies and categorises sets of internet signals, highlighting the critical role of trustmarks in the computer-mediated environment. It develops a series of propositions related to the effectiveness of trustmarks, including variables such as source and culture. Lastly, it provides direction for future research.

K. Damon Aiken; Ben S. Liu; Robert D. Mackoy; Gregory E. Osland

2004-01-01T23:59:59.000Z

245

V-088: Microsoft Security Bulletin Advance Notification for February 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for 8: Microsoft Security Bulletin Advance Notification for February 2013 V-088: Microsoft Security Bulletin Advance Notification for February 2013 February 11, 2013 - 12:27am Addthis PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

246

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network (OSTI)

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs ­ Research amo@research.att.com http://www.research.att.com/¸amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that ``Internet traffic

Odlyzko, Andrew M.

247

Internet growth: Myth and reality, use and abuse Andrew Odlyzko  

E-Print Network (OSTI)

Internet growth: Myth and reality, use and abuse Andrew Odlyzko AT&T Labs - Research amo@research.att.com http://www.research.att.com/ amo Abstract Actual Internet traffic growth rates of 100 percent per year to Internet growth claim astronomical rates of increase; the usual phrase is that "Internet traffic

Odlyzko, Andrew M.

248

Tracers and Exploration Technologies  

Energy.gov (U.S. Department of Energy (DOE))

Below are the project presentations and respective peer review results for Tracers and Exploration Technologies.

249

Internet video streaming using 3-D SPIHT  

E-Print Network (OSTI)

several years. Video streaming involves video compression, protocols selection for streaming media, client/receiver buffer management and packet loss recovery. This thesis documents a new Internet video streaming system based on the state-of-the-art 3-D...

Jiang, Jianhong

2012-06-07T23:59:59.000Z

250

Towards an Energy-Efficient Internet  

Science Journals Connector (OSTI)

Global telecommunications consume a small but growing fraction of the worlds electricity supply. We examine the key contributors to energy consumption in the Internet and examine some...

Tucker, Rodney S

251

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal  

E-Print Network (OSTI)

INTERNET-DRAFT draft-goyal-diffserv-afstdy-00 February 2000 Internet Engineering Task Force Mukul Goyal Internet Draft Arian Durresi Expires: August 2000 Raj Jain Chunlei Liu The Ohio State University February 2000 Performance Analysis of Assured Forwarding Status of Memo This document is an Internet

Jain, Raj

252

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

253

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

254

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

255

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

256

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

257

Development of Exploration Methods for Engineered Geothermal Systems  

Open Energy Info (EERE)

Development of Exploration Methods for Engineered Geothermal Systems Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Abstract N/A Author U.S. Department of Energy Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Citation U.S. Department of Energy. Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and

258

Internet Engineering Task Force Individual Submission INTERNET-DRAFT Lennox/Schulzrinne  

E-Print Network (OSTI)

-lennox-sip-reg-payload-01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents

Lennox, Jonathan

259

Internet-based supply chain management: using the Internet to revolutionize your business  

Science Journals Connector (OSTI)

The Internet has emerged in the recent past as a dynamic medium for channeling transactions between customers and firms in virtual marketplace. In particular, the World Wide Web has emerged as a powerful new channel for supply chain, rendering many intermediaries ... Keywords: Business-to-business, Internet, Supply chain, Supply chain management

Zillur Rahman

2003-12-01T23:59:59.000Z

260

Microsoft Word - Graphics A-76 Post - MEO VV Review Report _F...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- MEO VV Review Report F.doc More Documents & Publications Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report 111.doc A-76 QUESTIONS AND ANSWERS...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Microsoft PowerPoint - 01 Bosco PM Workshop BOSCO Feb22_2010PB...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Project Management Update - Paul Bosco, Director, Office of Acquisition & Project Mgt Microsoft PowerPoint - 07 Raines 2010 PMWS-Final BBB Slide 1...

262

Microsoft PowerPoint - DonsSlides121307 | Department of Energy  

Energy Savers (EERE)

& Publications AttachmentFlash2010-39.pdf Microsoft PowerPoint - Executive Order13423rbl Sample Contract Language for Information Technology Using Energy-Efficient Products...

263

Microsoft Word - T4_VEIC_TO2_ Sub3_Residential Retrofit Program...  

Energy Savers (EERE)

ofitprogramdesignguide.pdf More Documents & Publications Microsoft Word - Horizon Wind Energy Comments.docx Reporting Pre-guidance Announcement 06-02-2011 Letter to SEP...

264

Microsoft Word - FEMP-State MOU pdf version.doc | Department...  

Office of Environmental Management (EM)

Microsoft Word - FEMP-State MOU pdf version.doc More Documents & Publications FEMP Peer Review Federal Utility Partnership Working Group Meeting: Washington Update Energy...

265

Porting the .NET Micro Framework A Microsoft Technical White Paper  

E-Print Network (OSTI)

Porting the .NET Micro Framework A Microsoft Technical White Paper December 10, 2007 AbstractShow-capable devices to port the .NET Micro Framework to new hardware platforms. This white paper introduces the .NET Micro Framework architecture with a view toward porting it to a new hardware platform. It then discusses

Hunt, Galen

266

Personal Photo Enhancement Using Example Images Microsoft Research  

E-Print Network (OSTI)

12 Personal Photo Enhancement Using Example Images NEEL JOSHI Microsoft Research WOJCIECH MATUSIK describe a framework for improving the quality of personal photos by using a person's favorite photographs "good" and "bad" photos such that properties of the good examples can be used to correct a bad photo

Jaffe, Jules

267

Oil and Gas Exploration  

E-Print Network (OSTI)

Metals Industrial Minerals Oil and Gas Geothermal Exploration Development Mining Processing Nevada, oil and gas, and geothermal activities and accomplishments in Nevada: production statistics, exploration and development including drilling for petroleum and geothermal resources, discoveries of ore

Tingley, Joseph V.

268

Microsoft Word - 1_Readers Guide.doc  

National Nuclear Security Administration (NNSA)

EIS should acknowledge that NNSS has been off limits for any commercial mineral or oilgas exploration for more than six decades and that the potential for currently exploitable...

269

Microsoft Word - RNA_folding_Herschlag.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

March 2003 Exploring the Folding Landscape of a Structured RNA by SAXS Rick Russell, Ian S. Millett, Sebastian Doniach and Daniel Herschlag Stanford University One goal of genome...

270

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network (OSTI)

INFLUENCES, USAGE, AND OUTCOMES OF INTERNET HEALTHR.E. (2006). Influences, usage, and outcomes of InternetSeeking, p-3 INFLUENCES, USAGE, AND OUTCOMES OF INTERNET

Rice, Ronald E

2006-01-01T23:59:59.000Z

271

Cryptography and the Internet: lessons and challenges  

SciTech Connect

The popularization of the Internet has brought fundamental changes to the world, because it allows a universal method of communication between computers. This carries enormous benefits with it, but also raises many security considerations. Cryptography is a fundamental technology used to provide security of computer networks, and there is currently a widespread engineering effort to incorporate cryptography into various aspects of the Internet. The system-level engineering required to provide security services for the Internet carries some important lessons for researchers whose study is focused on narrowly defined problems. It also offers challenges to the cryptographic research community by raising new questions not adequately addressed by the existing body of knowledge. This paper attempts to summarize some of these lessons and challenges for the cryptographic research community.

McCurley, K.S.

1996-12-31T23:59:59.000Z

272

Microsoft Word - EJPublicParticipation.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Justice and Public Participation Through Electronic Access Table of Contents * Introduction * Environmental Justice, Public Participation, Computers and the Internet * Capacity Building in Federal Facility Communities * Environmental Justice and Public Participation Through Electronic Access Summary * Conference Index Introduction For more than a decade, Hyde Park residents and other community residents have worked to improve our living conditions. Our work has been hampered by the multitude of industrial facilities, literally in our back yards. While some of these industrial facilities are inactive, others still operate. We are making progress. We are pleased that Melinda Downing from the Department of Energy, Marsha Minter from the

273

Egs Exploration Methodology Project Using the Dixie Valley Geothermal  

Open Energy Info (EERE)

Egs Exploration Methodology Project Using the Dixie Valley Geothermal Egs Exploration Methodology Project Using the Dixie Valley Geothermal System, Nevada, Status Update Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Egs Exploration Methodology Project Using the Dixie Valley Geothermal System, Nevada, Status Update Authors Joe Iovenitti, Jon Sainsbury, Ileana Tibuleac, Robert Karlin, Philip Wannamaker, Virginia Maris, David Blackwell, Mahesh Thakur, Fletcher H. Ibser, Jennifer Lewicki, B. Mack. Kennedy and Michael Swyer Conference Thirty-Eighth Workshop on Geothermal Reservoir Engineering Stanford University; Stanford, California; 2013 Published Publisher Not Provided, 2013 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Egs Exploration Methodology Project Using the

274

Hyperspectral mineral mapping in support of geothermal exploration-  

Open Energy Info (EERE)

mineral mapping in support of geothermal exploration- mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Hyperspectral mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA Abstract N/A Authors B. A. Martini, E. A. Silver, W. L. Pickles and P. A. Cocks Conference Geothermal Resources Council Annual Meeting; Morelia, Mexico; 2004 Published Geothermal Resources Council Annual Meeting;, 2004 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Hyperspectral mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA

275

A text mining approach to Internet abuse detection  

Science Journals Connector (OSTI)

Many organizations have started to fight Internet abuse by setting up Internet usage policies (Siau et al. 2002), conducting management training (Young and Case 2004), and monitoring and blocking employees abuse

Chen-Huei Chou; Atish P. Sinha

2008-09-01T23:59:59.000Z

276

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network (OSTI)

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

277

The internet as a source of drugs of abuse  

Science Journals Connector (OSTI)

The Internet is a vital medium for communication, entertainment ... to the many positive functions served by the Internet, it also has been used to facilitate ... and then actually sellcontrolled substances over...

Robert F. Forman PhD; Douglas B. Marlowe JD; PhD

2006-01-01T23:59:59.000Z

278

Assessing mathematics automatically using computer algebra and the internet  

Science Journals Connector (OSTI)

......against the most obvious forms of student abuse exist within the system. Students are...evaluation of students' work over the internet provides the pragmatic educator with significant...Algebraic Computation (ISSAC2002), Internet Accessible Mathematical Computation 2002......

Chris Sangwin

2004-03-01T23:59:59.000Z

279

Economics of advertising: Emerging functions of Internet advertising  

Science Journals Connector (OSTI)

This paper intends to highlight the emerging force of the Internet as an advertising medium. The economic functions of Internet advertising are examined. Moreover, the paper aims to evaluate the relative impacts ...

Marcus Ling; Kevin Lawler; Norman McBain; Alfredo Moscardini

280

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network (OSTI)

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

CAPRI : a common architecture for distributed probabilistic Internet fault diagnosis  

E-Print Network (OSTI)

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J. (George Janbing), 1979-

2007-01-01T23:59:59.000Z

282

Language Independent Icon-Based Interface for Accessing Internet  

Science Journals Connector (OSTI)

With the advancement of the information technology, Internet becomes an essential part in our every sphere of life. However, the benefits of Internet are limited to only educated people who can read and write in ...

Santa Maiti; Debasis Samanta; Satya Ranjan Das

2011-01-01T23:59:59.000Z

283

The Internet of Things Helping Utilities | OpenEI Community  

Open Energy Info (EERE)

The Internet of Things Helping Utilities Home > Groups > Smart Grid Dc's picture Submitted by Dc(107) Contributor 16 October, 2014 - 12:21 The Internet of Things (IoT) is helping...

284

How the Internet is influencing today's E&P business  

Science Journals Connector (OSTI)

...between. So, how can this technology tool be used to best advantage...management. The Internet (and Intranet) support and encourage knowledge...management. The Internet (and Intranet) support and encourage knowledge...Encouragetheuseandvalueofhigher end information, technology, and interpretation methodologies...

Jon Fuller; Joe Fay

285

Who's Who in the Internet: Biographies of IAB, IESG and IRSG Members  

Science Journals Connector (OSTI)

This FYI RFC contains biographical information about members of the Internet Activities Board (IAB), the Internet Engineering Steering Group (IESG) of the Internet Engineering Task Force (IETF), and the the Internet Research Steering Group (IRSG) of ...

G. Malkin

1992-05-01T23:59:59.000Z

286

Microsoft Word - PPL 970-Materials and Inventory 5-9-05.doc ...  

Energy Savers (EERE)

5-9-05.doc Microsoft Word - PPL 970-Materials and Inventory 5-9-05.doc More Documents & Publications Audit Report: CR-B-99-02 Microsoft Word - al95-06.doc DOE-HDBK-1139-2006...

287

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 2011 for Mac HMS Help Desk: (617) 432-2000 2 · Create a new;Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000 3

Blackwell, Keith

288

Characterizing Internet Performance to Support Wide-area Application Development  

E-Print Network (OSTI)

-of-the-way places, like Islamabad (Pakistan) or Paramaribo (Suriname), not just the Internet covering the USA

Tanenbaum, Andrew S.

289

DipZoom: The Internet Measurements Marketplace  

E-Print Network (OSTI)

DipZoom: The Internet Measurements Marketplace (Position Paper) Michael Rabinovich, Sipat Triukose measurements. Unlike existing approaches that face a difficult challenge of building a measurement platform with suf- ficiently diverse measurements and measuring hosts, DipZoom offers a matchmaking service instead

Rabinovich, Michael "Misha"

290

New platforms of the violence in internet  

Science Journals Connector (OSTI)

Over the last few decades, some of the most defining sociological changes involve communications, especially in the permeation of information technologies and its effects in all areas of life. However, does this virtual world replicate the same problems ... Keywords: cyberculture, cybersex, cyberviolence, internet, new technologies

Mara del Mar Ramrez-Alvarado; Inmaculada Gordillo

2010-10-01T23:59:59.000Z

291

TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM  

E-Print Network (OSTI)

RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 Admiralty Way Marina del Rey, California 90291 #12;#12;September 1981 Transmission Control Protocol TABLE ........................................... 12 2.9 Precedence and Security ...................................... 13 2.10 Robustness Principle

McBrien, Peter

292

Language of the Internet NAOMI S. BARON  

E-Print Network (OSTI)

processing to facilitate working on the Internet and the World Wide Web (1.3) Section 2 Linguistic Issues for Communicating via the Web 1 As with so many aspects of the computing world, the nature of the language of this chapter. #12;2 summarize the types of Web coding systems (4.1) present an overview of Web markup languages

Carlini, David

293

Dynamic, transparent Internet server replication using HYDRANET  

E-Print Network (OSTI)

) in the Internet. These agents will replicate the transport-level service access points of their origin servers and begin serving clients in the name of the origin server. A new protocol and application API was also developed that manages this service replication...

Dillon, Geoffrey A.

1998-01-01T23:59:59.000Z

294

Acoustic Lexemes for Organizing Internet Audio  

E-Print Network (OSTI)

Acoustic Lexemes for Organizing Internet Audio Michael A. Casey In this article, a method is proposed for automatic fine-scale audio description that draws inspiration from ontological sound automation of audio description at the level of sound objects for indexing and retrieving sound segments

Casey, Michael

295

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network (OSTI)

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

296

Compact Routing on Internet-Like Graphs Dmitri Krioukov  

E-Print Network (OSTI)

Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: dima@krioukov.net Kevin Fall Intel and simulation, we derive the stretch distribution of this routing scheme on Internet-like interdomain topologies that the average TZ stretch is quite low and virtually independent of . In particular, for the Internet interdomain

Yang, Xiaowei

297

Experimental Design of Worldwide Internet Voting System using PKI  

E-Print Network (OSTI)

easily participate in voting over the Internet. It is consid- ered as a good solution for the recent interest for Internet voting as a good solution to make voting more accessible and convenient, it is widely voting together with good e?ciency. In this research, we design Internet voting system us- ing public key

Kim, Kwangjo

298

Case Study: Interactive Visualization for Internet Security Soon Tee Teoh  

E-Print Network (OSTI)

] to communicate. A good way to un- derstand the behaviors and performance of the Internet is thus to collectCase Study: Interactive Visualization for Internet Security Soon Tee Teoh Kwan-Liu Ma S. Felix Wu North Carolina State University ABSTRACT Internet connectivity is defined by a set of routing protocols

California at Davis, University of

299

WEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET  

E-Print Network (OSTI)

energy which can be equal to the mainstream market. The internet provides a good groundWEB N.0, THE NEW DEVELOPMENT TREND OF INTERNET Zhiguo Sun, Wensheng Wang Agricultural Information: This article analyzes the Internet basic theory, the network foundation environment and the user behavior

Boyer, Edmond

300

Pricing the Internet Jerey K. MacKie-Mason  

E-Print Network (OSTI)

. Currently, the several Internet backbone networks are public goods with exclusion: usage is essentially freePricing the Internet by Jerey K. MacKie-Mason Hal R. Varian University of Michigan April 1993 to the Internet," JFK School of Government, May 26­27 , 1993. We describe the technology and cost structure

Varian, Hal R.

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Visualising Internet Traffic Data with Three-Dimensional Spherical Display  

E-Print Network (OSTI)

successful in this respect has proven to give good predictions about structural features of the InternetVisualising Internet Traffic Data with Three-Dimensional Spherical Display Ben Yip1 , Shea Goyette1 of visualising internet traffic data using the underlying spherical nature of the globe. The method uses data

Hong,Seokhee

302

Invited Talk: Mitigating the Effects of Internet Timing Faults  

E-Print Network (OSTI)

Invited Talk: Mitigating the Effects of Internet Timing Faults Across Embedded Network Gateways and the Internet. The usual approach to making such a connection is to install a gateway node which translates from Internet protocols to embedded field bus network protocols. Such connections raise obvious security

Koopman, Philip

303

Internet Routing Resilience to Failures: Analysis and Implications  

E-Print Network (OSTI)

Internet Routing Resilience to Failures: Analysis and Implications Jian Wu Ying Zhang Z. Morley Mao Kang G. Shin University of Michigan ABSTRACT Internet interdomain routing is policy-driven, and thus phys- ical connectivity does not imply reachability. On average, routing on today's Internet works

Mao, Zhuoqing Morley

304

Modeling Internet Topology Kenneth L. Calvert, Georgia Tech  

E-Print Network (OSTI)

such as the Internet, has a strong bearing on many management and performance issues. Good models of the topologicalModeling Internet Topology Kenneth L. Calvert, Georgia Tech Matthew B. Doar, Ascom Nexion Ellen W aspects of locality and hierarchy present in the Internet. Two implemen­ tations that generate networks

Zegura, Ellen W.

305

Ethical implications of internet monitoring: A comparative study  

Science Journals Connector (OSTI)

Organizations have become increasingly concerned about employee use of the Internet for personal reasons while at work. Monitoring Internet usage has become more and more prevalent in the workplace. While there may be legitimate business functions such ... Keywords: Autonomy, Fairness, Internet monitoring, University, Workplace

Frances S. Grodzinsky; Andra Gumbus; Stephen Lilley

2010-09-01T23:59:59.000Z

306

Exploration Best Practices  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Farm 1 | US DOE Geothermal Program eere.energy.gov Geothermal Technologies Program 2010 Peer Review Exploration Best Practices and Success Rates PI: Katherine Young Presented by:...

307

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

308

V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of 7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability August 14, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in the Windows NAT Driver PLATFORM: Windows Server 2012 ABSTRACT: This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows REFERENCE LINKS: Secunia Advisory SA54420 Security Tracker ID 1028909 Microsoft Security Bulletin MS13-064 CVE-2013-3182 IMPACT ASSESSMENT: Medium DI SCUSSION: The vulnerability is caused due to an error within the Windows NAT Driver when handling ICMP packets and can be exploited to cause the system to stop responding IMPACT: Denial of Service SOLUTION: Vendor has released a security update

309

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

310

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

311

Microsoft Word - What's New in Outlook 2007.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

What's New in Outlook 2007? What's New in Outlook 2007? Help The Help option has additional topics in Outlook 2007. Some of the most useful ones are under the Microsoft Office Outlook Help menu item. "What's New" and "Training" are both helpful. What's New in Outlook 2007? What's New? One topic that we recommend is "Getting to know you; again: The Ribbon". It explains the use of the Ribbon that we will be discussing later in this document. What's New in Outlook 2007? Training The Training option provides numerous small training modules that you can read to learn about specific areas within Outlook 2007. It also has an "Outlook 2007 Training Courses" option that provides links to a variety of online training courses provided by Microsoft. A great training resource that you can link to

312

Microsoft PowerPoint - TemplatesrnlTechBriefp1.ppt  

NLE Websites -- All DOE Office Websites (Extended Search)

NAPL Calculator NAPL Calculator at a glance  easy and quick  based on microsoft excel  guides clean-up decision making  works with soil, soil vapor, or groundwater samples The NAPL Calculator is an analytical model that is a self- executing Microsoft Excel workbook that requires qualitative/quantitative soil, groundwater, or soil vapor sample results and a few simple geotechnical parameters. A classic chemistry approach is used that is based on the work of Shiu, Feenstra, McKay and Cherry and is advocated by the U.S. Environmental Protection Agency. The method is known to many academics and researchers but not to many practitioners in environmental clean-up. Even for those who know the method, the calculation can be laborious. The NAPL Calculator is designed to make this

313

AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET  

E-Print Network (OSTI)

parts of the Internet where the un- derlying link layer technology would be able to give good supportAN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS AN EDGE DEVICE FOR SUPPORTING INTERNET INTEGRATED SERVICES OVER SWITCHED ATM NETWORKS H. Hussmann Dresden

314

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Petroleum Exploration & Environmental Geochemistry to Carbon Sequestration Petroleum Exploration & Environmental Geochemistry to Carbon Sequestration EXECUTIVE SUMMARY Recent interest in carbon sequestration has generated a need to monitor for carbon dioxide leakage over a variety of subsurface storage reservoirs. The determination of whether and how much sequestered CO 2 may be leaking from a subsurface reservoir requires that the measurements be made within natural geologic conduits that can be defined by mapping the distribution of thermogenic hydrocarbon seeps associated with the subject reservoirs. Soil gas data from exploration and environmental surveys are presented as a series of case studies that provides effective guidance for locating these natural conduits. An extensive soil gas data base is presented that includes surveys

315

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

316

Exploration Best Practices  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of this project is to provide an overview of currentt geoth thermall explloratiti on bbestt practi tices andd a baseline values for exploration (both non-drilling and drilling) success rates in the U.S.

317

Instructions apply to Internet Explorer and may vary for other browsers. SYRACUSE UNIVERSITY  

E-Print Network (OSTI)

page. Select the Term for which to search. Enter class search criteria, most commonly the Course ...........................................5 Class Search ...................................................6 Introduction Syracuse University) roster. You can also search for classes in Faculty Center. Log in to MySlice Go to myslice.syr.edu. You

Mather, Patrick T.

318

Exploration Drilling | Open Energy Information  

Open Energy Info (EERE)

Exploration Drilling Exploration Drilling Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Exploration Drilling Details Activities (0) Areas (0) Regions (0) NEPA(15) Exploration Technique Information Exploration Group: Drilling Techniques Exploration Sub Group: Exploration Drilling‎ Parent Exploration Technique: Drilling Techniques Information Provided by Technique Lithology: Identify lithology and mineralization, provide core samples and rock cuttings Stratigraphic/Structural: Retrieved samples can be used to identify stratigraphy and structural features such as fracture networks or faults Hydrological: -Water samples can be used for geochemical analysis -Fluid pressures can be used to estimate flow rates Thermal: -Temperatures can be measured within the hole

319

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Gulf Coast Carbon Gulf Coast Carbon Center: Exploring Carbon Public Policy Initiatives for Texas Ian J. Duncan GCCC Vision Statement The GCCC seeks to impact global levels of GHG in the atmosphere by doing science and engineering studies that will support reduction of CO2 and methane emissions and enable the development of an economically viable, multifaceted, CO2 sequestration industry in the Gulf Coast GCCC Industry Partners KEY PUBLIC POLICY STAKEHOLDERS * Texas Legislature * State Agencies * NGO's * General Public * Power Generating Companies * Coal/Lignite Mining industry * Refineries * Chemical Industry * Cement Industry * CO2 EOR Industry * Pipeline operators PUBLIC POLICY PROJECT CLASS UT's LBJ SCHOOL Course Goal: To explore the notion ......."CO2 EOR can drive the development of infrastructure

320

Microsoft PowerPoint - NRELFeb2009  

NLE Websites -- All DOE Office Websites (Extended Search)

RMOTC RMOTC The Rocky Mountain Oilfield Testing Center (RMOTC) i i il fi ld f i (RMOTC) is an operating oil field focusing on environmentally balanced energy technologies and alternatives and is the premier energy testing and alternatives and is the premier energy testing and demonstration field in the United States. 3 Location * RMOTC is located at Teapot Dome Oilfield Teapot Dome Oilfield within the Naval Petroleum Reserve No. 3 (NPR-3) * Town offices are located in Casper, Wyo. Casper WYOMING 4 Opportunities RMOTC offers testing, demonstration, research & d l i i i development opportunities in: * Renewable energy * Exploration * Environmental * Production * Drilling * Energy assurance 5 Fossil & renewable partnerships RMOTC is committed to exploring environmentally b l d l i h i ' i balanced solutions to the nation's energy issues.

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Microsoft Word - Pincus-R.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Using High-Resolution Cloud Simulations to Explore Using High-Resolution Cloud Simulations to Explore Variability Unresolved in Large-Scale Models R. Pincus National Oceanic and Atmospheric Administration Cooperative Institute for Research in Environmental Science Climate Diagnostics Center Boulder, Colorado S. A. Klein National Oceanic and Atmospheric Administration Geophysical Fluid Dynamics Lab Princeton, New Jersey K.-M. Xu National Aeronautics and Space Administration Langley Research Center Hampton, Virginia Fundamentals Large-scale models represent the atmospheric state as a time-evolving set of values at discrete points, each of which represents the mean within the grid-cell domain, typically 10s to 100s of km. The value at each point changes with time as various dynamic, thermodynamic, and microphysical processes act;

322

Po?Poster ? 36: Using the internet for real?time medical physics education  

Science Journals Connector (OSTI)

This presentation is an update on the Remote Real?Time Learning Project (http://www.neteinfach.com/rrtl/index.htm). The goal of the project is to promote the use of Internet to provide classroom style real?time interactive education in Medical Physics. This project was started 3 years ago as a collaboration between the Department of Medical Physics at the Toronto?Sunnybrook Regional Cancer Centre in Canada and the Department of Radiology at the University of Malaya in Malaysia. A class of Medical Physicsgraduate students at the University of Malaya attended lectures provided by lecturers in Toronto using the Internet as the main tool of communication. As part of the study the different methods that can be used to provide real?time interactive remote education were explored and various topics including traditional classroom lectures as well as hands?on workshops were also delivered. Based on our experience a reasonably stable methodology has been established. This methodology allows a fairly smooth set?up and conduction of the lectures at an insignificant cost while offering flexible convenience to the lecturers as well as the students despite the widely different time zones. The current plan is to expand the process to allow students at multiple sites of the world to attend the online lectures at the same time. Our project welcomes the participation of both lecturers and students who are interested in taking advantage of the advance of the Internet to promote greater accessibility of quality education in the field.

M Woo; K Ng

2005-01-01T23:59:59.000Z

323

Potential Internet Applications in Forest Products Exporting and  

E-Print Network (OSTI)

of Respondents #12;Adoption of Internet Technologies 0.0% 39.8% 57.0% 3.2% 0% 20% 40% 60% 80% 100 to Other Industries (n=93) #12;Adoption of Internet Technologies 2.2% 51.1% 22.8%23.9% 0% 20% 40% 60% 80 (n=54) 0% 20% 40% 60% 80% 100% Intranet Internet EDI Extranet VPN Do not use Use within next two

324

Cooperative Exploration under Communication Constraints  

E-Print Network (OSTI)

process has not been fully characterized. Existing exploration algorithms do not realistically modelCooperative Exploration under Communication Constraints by Emily M. Craparo Submitted. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . David Darmofal Chairman, Department Committee on Graduate Students #12;2 #12;Cooperative Exploration

How, Jonathan P.

325

Analysis of Internet Banking Security Crack Through Messenger Hacking  

Science Journals Connector (OSTI)

The messenger is a free information and communication means for easy information exchange with acquaintances connected to the Internet during ordinary work process. Therefore, acquaintances (automatically) connec...

Dea-Woo Park; Kyong-Ha Roo

2013-01-01T23:59:59.000Z

326

Proactive techniques for correct and predictable Internet routing  

E-Print Network (OSTI)

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

327

Microsoft Word - 47C468D4-69BA-281F40.doc | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Microsoft Word - 47C468D4-69BA-281F40.doc More Documents & Publications Biofuels & Greenhouse Gas Emissions: Myths versus Facts Biofuels & Greenhouse Gas Emissions:...

328

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

329

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

330

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

331

V-133: Microsoft pulls Patch Tuesday security fix | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft pulls Patch Tuesday security fix 3: Microsoft pulls Patch Tuesday security fix V-133: Microsoft pulls Patch Tuesday security fix April 14, 2013 - 6:00am Addthis PROBLEM: Microsoft pulls Patch Tuesday security fix PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

332

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

333

Microsoft Word - IQA memo10-6-08 | Department of Energy  

Office of Environmental Management (EM)

memo10-6-08 Microsoft Word - IQA memo10-6-08 More Documents & Publications Mid-Level Ethanol Blends Intermediate Ethanol Blends: Plans and Status Overview of DOE Fuel & Lubricant...

334

Microsoft Word - 0-PEP-6-14-07.doc | Department of Energy  

Office of Environmental Management (EM)

0-PEP-6-14-07.doc PSF.pdf More Documents & Publications Sample Project Execution Plan Project Execution Plan Review Module (RM) Microsoft PowerPoint - 16.1555Chad HendersonFinal...

335

Microsoft PowerPoint - Abraham_Diagnostics_Feb08 v2.ppt | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Microsoft PowerPoint - AbrahamFormationFeb08 v2.ppt Diagnostic studies on Li-battery cells and cell components Diagnostic Studies on Lithium Battery Cells and Cell Components...

336

XML and relational database management systems: inside Microsoft SQL Server 2005  

Science Journals Connector (OSTI)

Microsoft SQL Server has a long history of XML support dating back to 1999. While first concentrating on enabling the transport of relational data via XML with the SQL Server 2000 release, SQL Server 2005 now additionally provides native ...

Michael Rys

2005-06-01T23:59:59.000Z

337

Microsoft Word - Press Release RECOMP 2-8-08 REV FINAL.doc |...  

Energy Savers (EERE)

& Publications USA RS Basic Contract - Contract No.: DE-RW0000005 Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21 2008 final.doc Root Cause Analysis Report In...

338

Microsoft Word - AL 2010-07 Acquistion Letters Remaining in Effect...  

Office of Environmental Management (EM)

AL 2010-07 Acquistion Letters Remaining in Effect May 2010 revision 1 June 2010 Microsoft Word - AL 2010-07 Acquistion Letters Remaining in Effect May 2010 revision 1 June 2010...

339

Microsoft Word - GRS Review_OMB White Paper - Real Property Right...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GRS ReviewOMB White Paper - Real Property Right-sizing and Carbon Reduction August 7 2009 2.docx Microsoft Word - GRS ReviewOMB White Paper - Real Property Right-sizing and...

340

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - 32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical November 9, 2011 - 1:00pm Addthis PROBLEM: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

342

Already a pressing global issue, internet governance is growing in importance in international debates. With internet  

E-Print Network (OSTI)

Already a pressing global issue, internet governance is growing in importance in international, including those falling under: the United Nations General Assembly (UNGA), the International related to these processes are then weaved around two particular forums ­ the ITU Plenipotentiary in 2014

Chen, Yiling

343

Exploration Incentive Tax Credit (Montana)  

Energy.gov (U.S. Department of Energy (DOE))

The Mineral and Coal Exploration Incentive Tax Credit provides tax incentives to entities conducting exploration for minerals and coal. Expenditures related to the following activities are eligible...

344

Exploration for Uranium Ore (Virginia)  

Energy.gov (U.S. Department of Energy (DOE))

This legislation describes permitting procedures and requirements for exploration activities. For the purpose of this legislation, exploration is defined as the drilling of test holes or...

345

Exploring Autodesk Navisworks 2014  

Science Journals Connector (OSTI)

Exploring Autodesk Navisworks 2014 is a comprehensive textbook that has been written to cater to the needs of the students and the professionals who are involved in the AEC profession. In this textbook, the author has emphasized on various hands on tools ...

Sham Tickoo / CADCIM Technologies

2013-08-01T23:59:59.000Z

346

Exploring Civil and Environmental  

E-Print Network (OSTI)

Engineers % of Total Architectural, Engineering, and Related Services 135,000 53 Federal, State, and Local1 CEE 100 Exploring Civil and Environmental Engineering #12;CEE 100 Schedule--Winter 2010 https Geotechnical Engineering January 27 Steve Muench Construction Engineering February 3 Greg Miller Structural

347

Workshop: Teachers explore electronics  

Science Journals Connector (OSTI)

Workshop: Teachers explore electronics Conference: ASE conference hits Nottingham Teacher training: Videoconferencing discovers asteroids Lecture: Annual education talk gets interactive Award: Britton receives a New Year's honour Multimedia: Multimedia conference 2010 will be held in France Conference series: ICPE travels to Thailand in 2009 Filming: Sixth-formers take physics on location

348

Explorations Cathy Moulder  

E-Print Network (OSTI)

Explorations in Mapping Cathy Moulder Director of Library Services, Maps, Data & GIS Mc � "Professional mapping" � Geographic Information Systems (GIS) � Web 2.0 and NeoGeography � Role of traditional GIS... Neogeography is about people using and creating their own maps, on their own terms

Haykin, Simon

349

Exploring Functional Mellin Transforms  

E-Print Network (OSTI)

We define functional Mellin transforms within a scheme for functional integration proposed in [1]. Functional Mellin transforms can be used to define functional traces, logarithms, and determinants. The associated functional integrals are useful tools for probing function spaces in general and $C^\\ast$-algebras in particular. Several interesting aspects are explored.

J. LaChapelle

2015-01-08T23:59:59.000Z

350

Exploring Mars' Climate History  

E-Print Network (OSTI)

Exploring Mars' Climate History #12;2 Mars Reconnaissance Orbiter ESA Mars Express (NASA: MARSIS by studying the solar wind and other interactions with the Sun. #12;The solar wind is a high-speed stream of electrons and protons released from the Sun. #12;High-energy photons (light) stream constantly from the Sun

351

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......Resulting from Abuse of Dextromethorphan Sold Over the Internet Barry K. Logan...resulting from abuse of dextromethorphan sold over the internet. | Dextromethorphan...Resulting from Abuse of Dextromethorphan Sold Over the Internet Reproduction......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

352

End-to-end routing behavior in the internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

353

End-to-end routing behavior in the Internet  

Science Journals Connector (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

354

Touring the Internet in a TCP Sidecar Rob Sherwood  

E-Print Network (OSTI)

Touring the Internet in a TCP Sidecar Rob Sherwood Department of Computer Science University, College Park nspring@cs.umd.edu ABSTRACT An accurate router-level topology of the Internet would benefit. The combined approach mitigates problems associated with traceroute-based topology discovery, including abuse

Gruner, Daniel S.

355

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ?  

E-Print Network (OSTI)

MEASURING INTERNET TELEPHONY QUALITY: WHERE ARE WE TODAY ? Olof Hagsand SICS Sweden Kjell Hanson Ericsson Business Networks Sweden Ian Marsh SICS Sweden Abstract Users of Internet telephony applications demand good quality audio playback. This quality is largely dependent on the instantaneous network

356

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright  

E-Print Network (OSTI)

INTERNET AND E-COMMERCE PATENTS Bradley C. Wright The digital world is getting crowded. The number become pervasive, companies with an Internet presence have labored to distinguish their Web sites and marketing techniques from the offerings of others. Consumers who purchase goods and services over

Shamos, Michael I.

357

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network (OSTI)

of household Internet usage, 89% of 93 families needed support from a computer help desk in the 1st year for Technical Help 1.3. Theoretical Analysis 2. METHOD 2.1. Requests for Support From the Help Desk 2Troubles With the Internet: The Dynamics of Help at Home Sara Kiesler, Bozena Zdaniuk, Vicki

358

Troubles With the Internet: The Dynamics of Help at Home  

E-Print Network (OSTI)

help desk in the 1st year they used the Internet. However, usually only the most technically involved aspects of technological change and communication systems. Bozena Zdaniuk is Data Management Coordinator 2.1. Requests for Support From the Help Desk 2.2. Internet Usage 2.3. Questionnaire Measures 2

Kiesler, Sara

359

Models for a selfmanaged Internet By Frank Kelly  

E-Print Network (OSTI)

Models for a self­managed Internet By Frank Kelly Centre for Mathematical Sciences, University. Kelly that some current Internet traffic needs large buffers, causing unacceptable queue­ ing delays, Crowcroft & Oechslin 1998; Gibbens & Kelly 1999a; Key & McAuley 1999a). Its premise is that a simple packet

Kelly, Frank

360

A look behind the future internet architectures efforts  

Science Journals Connector (OSTI)

The Future Internet Architectures (FIA) constitutes a 10-year effort by the U.S. National Science Foundation (NSF) that was launched in 2006, with the announcement of the Future INternet Design (FIND) research area within a Network Technologies and Systems ...

Darleen Fisher

2014-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES  

E-Print Network (OSTI)

CACHING CHARACTERISTICS OF INTERNET AND INTRANET WEB PROXY TRACES Arthur Goldberg, Ilya Pevzner} This paper studies the caching characteristics of HTTP requests and responses that pass through production a large Internet Service Provider (ISP) and 2.0 million entries from an Intranet firewall are studied. We

Goldberg, Arthur P.

362

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network (OSTI)

­lennox­sip­reg­payload­01.ps Columbia University October 31, 2000 Expires: April 2001 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

363

Internet Engineering Task Force Individual Submission INTERNETDRAFT Lennox/Schulzrinne  

E-Print Network (OSTI)

­lennox­sip­reg­payload­00.ps Columbia University March 6, 2000 Expires: September 2000 Transporting User Control Information in SIP REGISTER Payloads Status of this Memo This document is an Internet­Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet­Drafts are working documents

Lennox, Jonathan

364

Enabling Performance Intelligence for Application Adaptation in the Future Internet  

E-Print Network (OSTI)

plat- form. Achieving autonomicity in the Future Internet will require a performance architecture that such "Future Internet Perfor- mance Architecture" (FIPA), and present our reference implementation of FIPA in virtualization [1] technology at end-hosts and core network switches/routers. The Global Envir

Calyam, Prasad

365

Spelling and searching the internet: An overlooked problem  

Science Journals Connector (OSTI)

Misspellings, phonetic spellings, deliberately idiosyncratic spellings, typographical, and other errors are examined in relation to the Internets lack of standardization. Despite the dramatic effect different spellings have on the outcome of searches, this topic has not been adequately addressed in the literature nor have solutions been suggested hitherto.

Edward Proctor

2002-01-01T23:59:59.000Z

366

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh  

E-Print Network (OSTI)

Internet Suspend/Resume Michael Kozuch, Intel Research Pittsburgh M. Satyanarayanan, Carnegie to suspend work at one machine and to resume it at another. Our key insight is that this capability can a machine at one Internet site, then travel to some other site and resume my work there on another machine

Satyanarayanan, Mahadev "Satya"

367

Intelligent fault prediction system based on internet of things  

Science Journals Connector (OSTI)

Fault prediction is the key technology to ensure the safe operation of large equipment. Based on the investigation of current and developing research of fault prediction, an intelligent fault prediction system based on internet of things is proposed ... Keywords: Fault prediction, Intelligent computer information processing, Internet of things, Mechanical equipment groups, Predictive maintenance

Xiaoli Xu; Tao Chen; Mamoru Minami

2012-09-01T23:59:59.000Z

368

RMOTC - Testing - Exploration  

NLE Websites -- All DOE Office Websites (Extended Search)

Exploration Helicopter flying over RMOTC testing facility for leak detection survey test Notice: As of July 15th 2013, the Department of Energy announced the intent to sell Naval Petroleum Reserve Number 3 (NPR3). The sale of NPR-3 will also include the sale of all equipment and materials onsite. A decision has been made by the Department of Energy to complete testing at RMOTC by July 1st, 2014. RMOTC will complete testing in the coming year with the currently scheduled testing partners. For more information on the sale of NPR-3 and sale of RMOTC equipment and materials please join our mailing list here. RMOTC's extensive exploration-related data sets, including 3D and 2D seismic, wells and logging data, and cores - both physical core samples, stored in Casper, and core analysis data and reports - provide a great

369

An asteroseismology explorer  

SciTech Connect

In response to a NASA opportunity, a proposal has been made to study the concept of an Asteroseismology Explorer (ASE). The goal of the ASE would be to measure solar-like oscillations on many (perhaps hundreds) of stars during a 1-year mission, including many members of open clusters. We describe this proposal's observational goals, a strawman technical approach, and likely scientific rewards. 5 refs.

Brown, T.M.; Cox, A.N.

1986-08-11T23:59:59.000Z

370

Life Cycle Environmental Assessment of the Internet: The Benefits and  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

371

Microsoft Word - LB-Lignite.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Name Organization E-Mail Darin Damiani, U.S. Department of Energy, Darin.Damiani@netl.doe.gov Principal Investigator Edward Steadman Field Test Information: Field Test Name Lignite in North Dakota Field Validation Test Test Location Section 36-T159N-R90W in Burke County, North Dakota Amount and Source of CO 2 Tons Less than 500 tons for the project Source Commercial source - Praxair Flatland Exploration Company, subsidiary of Fischer Oil and Gas ND State Land Department Eagle Operating, Inc. Schlumberger Field Test Partners (Primary Sponsors) Praxair Summary of Field Test Site and Operations: CO 2 in an Unminable Lignite Seam - The site for the pilot-scale CO 2 sequestration-enhanced coalbed methane (ECBM) project operated by the Energy & Environmental Research Center is

372

Microsoft Word - Acoustek_final_Jan2009  

NLE Websites -- All DOE Office Websites (Extended Search)

88 88 BP GROUP: ACOUSTEK ASSESSMENT A demonstration of a pipeline monitoring system, Naval Petroleum Reserve No. 3, Teapot Dome Field, Wyoming Final Report for the Period of September 29-October 3, 2008 Date Completed: January 6, 2009 By Barry Lennox & Xuesong Wang, University of Manchester David Mackay, BP Exploration Mike Curtis, RMOTC Prepared for the United States Department of Energy Office of Fossil Energy Work performed under Rocky Mountain Oilfield Testing Center (RMOTC) CRADA 2008-112 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors or their employees,

373

Microsoft Word - PBII Plenary Paper.doc  

Office of Scientific and Technical Information (OSTI)

From Plasma Immersion Ion Implantation to Deposition: From Plasma Immersion Ion Implantation to Deposition: A Historical Perspective on Principles and Trends André Anders Lawrence Berkeley National Laboratory, University of California, Berkeley, California 94720, USA Abstract Plasma immersion techniques of surface modification are known under a myriad of names. The family of techniques reaches from pure plasma ion implantation, to ion implantation and deposition hybrid modes, to modes that are essentially plasma film deposition with substrate bias. In the most general sense, all plasma immersion techniques have in common that the surface of a substrate (target) is exposed to plasma and that relatively high substrate bias is applied. The bias is usually pulsed. In this review, the roots of immersion techniques are explored, some going back

374

Microsoft Word - agreement_scanned.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING ARRANGEMENT IMPLEMENTING ARRANGEMENT BETWEEN THE DEPARTMENT OF ENERGY OF THE UNITED STATES OF AMERICA AND THE DEPARTMENT OF TRADE AND INDUSTRY OF THE UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND TO COOPERATE IN THE FIELD OF FOSSIL ENERGY TECHNOLOGY WHEREAS, The Department of Energy of the United States of America (DOE) and the Department of Trade and Industry of the United Kingdom of Great Britain and Northern Ireland (DTI), hereinafter referred to as the "Participants"; Entered into a Memorandum of Understanding on Collaboration in Energy Research and Development on November 6, 2000 (the "the MOU"); Share an interest in joint planning and exchange of information and personnel in the field of cleaner coal technology, and for exploring opportunities for expanded fossil energy utilization,

375

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

FIFTH ANNUAL CONFERENCE ON CARBON CAPTURE AND SEQUESTRATION - DOE/NETL FIFTH ANNUAL CONFERENCE ON CARBON CAPTURE AND SEQUESTRATION - DOE/NETL May 8 - 11, 2006 CONFERENCE PROCEEDINGS Comparing Climate-Change Mitigating Potentials of Alternative Synthetic Liquid Fuel Technologies Using Biomass and Coal Robert H. Williams 1 , Eric D. Larson 1 , Haiming Jin 2 1 Princeton Environmental Institute, Princeton University Guyot Hall, Washington Road, Princeton, NJ, 08544 2 TX Energy, 1330 Post Oak Boulevard, Suite 1600, Houston, TX, 77056 Abstract The climate-change mitigation potentials of alternative options for making synthetic liquid fuel from coal and biomass without and with CO 2 capture and storage are explored. The emphasis is on making Fischer-Tropsch liquids, with comparisons to cellulosic ethanol. Particular attention is

376

Microsoft Word - HgAcBr  

NLE Websites -- All DOE Office Websites (Extended Search)

August 2013 August 2013 Quantification of the Mercury Adsorption Mechanism on Brominated Activated Carbon The primary anthropogenic source of mercury (Hg) emissions into the atmosphere is coal- fired power utilities. This work explores materials designed for Hg capture to be applied in the ductwork of a power plant to prevent Hg release into the atmosphere. Bench-scale com- bustion experiments have been carried out, in which sorbent materials were placed in a simulated flue gas stream doped with ppb levels of Hg. The sorbent surfaces were probed using x-ray absorption spectroscopy to determine the mechanism of Hg binding and to ultimately improve solvent design. The spectroscopy data was analyzed alongside results from density functional theory (DFT) for benchmarking so that DFT can be used as a

377

Microsoft Word - SD452.3 FINAL  

National Nuclear Security Administration (NNSA)

NA SD M 452.3-1 NA SD M 452.3-1 Approved: 12-10-09 DEFENSE PROGRAMS BUSINESS REQUIREMENTS AND PROCESSES MANUAL NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs AVAILABLE ONLINE AT: INITIATED BY: http://www.nnsa.energy.gov Office of Defense Programs NA SD M 452.3-1 Page 12-10-09 1 DEFENSE PROGRAMS BUSINESS REQUIREMENTS AND PROCESSES MANUAL 1. PURPOSE. This Department of Energy (DOE), National Nuclear Security Administration (NNSA) Business Requirements and Process Manual supplements DOE O 452.3 "Management of the Department of Energy Nuclear Weapons Complex." This supplemental directive establishes the Requirements Modernization and Integration (RMI) Explorer as the electronic Defense Programs manual that implements DOE O

378

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Mineralization in Mineralization in Mineralization in Mineralization in Calcium Silicate Calcium Silicate Building Products Building Products Yixin Shao, Jun Chang and Sam Wang Yixin Shao, Jun Chang and Sam Wang Department of Civil Engineering Department of Civil Engineering McGill University McGill University Montreal, Canada Montreal, Canada Objectives Objectives To explore the possibility of sequestering carbon dioxide in calcium-carrying building products through their early age carbonation curing using recovered CO 2 or as-captured flue gas The potential carbon uptake by the commercial building products The strength gain and durability performance of the carbonated products To demonstrate environmental, technical and economical benefits of the technology The market The market Portland cement annual production:

379

Microsoft Word - ARRA Final Report Cover_1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Geothermal Technologies Program Geothermal Technologies Program under the American Recovery and Reinvestment Act OAS-RA-11-05 March 2011 Department of Energy Washington, DC 20585 March 22, 2011 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "The Department of Energy's Geothermal Technologies Program under the American Recovery and Reinvestment Act" BACKGROUND Under the American Recovery and Reinvestment Act of 2009 (Recovery Act), the Department of Energy's Geothermal Technologies Program received $400 million to promote the exploration and development of new geothermal fields and innovative research into advanced geothermal technologies. This funding represents an almost ten-fold increase over the $44 million originally

380

Exploration and Development Techniques for Basin and Range Geothermal  

Open Energy Info (EERE)

Techniques for Basin and Range Geothermal Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Exploration and Development Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Abstract Abstract unavailable. Authors David D. Blackwell, Mark Leidig, Richard P. Smith, Stuart D. Johnson and Kenneth W. Wisian Conference GRC Annual Meeting; Reno, NV; 2002/09/22 Published Geothermal Resources Council, 2002 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Exploration and Development Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Citation David D. Blackwell,Mark Leidig,Richard P. Smith,Stuart D. Johnson,Kenneth

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Police Officers Perceptions of their Reactions to Viewing Internet Child Exploitation Material  

Science Journals Connector (OSTI)

Internet child exploitation (ICE) material, commonly referred to as internet child pornography or child sexual abuse images, refers to sexualised depictions of children ... produced, distributed, accessed or stor...

Martine Powell; Peter Cassematis; Mairi Benson

2014-04-01T23:59:59.000Z

382

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

383

Internet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries  

E-Print Network (OSTI)

Site A Performance Routing B l i l d b t lti l th ( ltih d it ) Routers need tools to detectInternet Path-Quality Monitoring inInternet Path-Quality Monitoring in the Presence of Adversaries routed from Alice to Bob via a path of intermediate routers Routing protocols used to set up paths

Goldberg, Sharon

384

(for Gene Recognition Analysis Internet Link),  

NLE Websites -- All DOE Office Websites (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

385

Fermilab Leadership Institute Integrating Internet, Instruction and  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

386

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

387

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

388

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

389

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

390

Microsoft Word - 2007hsn-infocom-paper-lehman-etal.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 Control Plane Architecture and Design Considerations for Multi-Service, Multi-Layer, Multi- Domain Hybrid Networks Tom Lehman 1 , Xi Yang 1 , Chin P. Guok 2 , Nageswara S. V. Rao 3 , Andy Lake 4 , John Vollbrecht 4 , Nasir Ghani 5 1 Information Sciences Institute East, University of Southern California, Arlington, VA 22203, USA, Email: {tlehman,xyang}@isi.edu 2 Network Engineering Services Group, ESnet, Berkeley, CA 94720, USA, Email: chin@es.net 3 Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA, Email: raons@ornl.edu 4 University Corporation for Advanced Internet Development, Internet2, Ann Arbor, MI 48104, USA, Email: {jrv,alake}@internet2.edu 5 Department of Electrical and Computer Engineering, Tennessee Technological University, Cookville, TN 38505, USA,

391

Microsoft Word - Resource Materials_Oct09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Resource Material Resource Material October Cyber Security Awareness Day 2009 Title # Inventory # Reproduce Description 1 Keeping Kids Safer on the Internet 50 0 NCMEC Handout 2 Stop-Think-Click 7 Practices for Safer Computing 75 0 FTC Foldout 3 Know the Rules... Internet Safety Quiz for Adults New 150 NCMEC Handout 4 Protect Your Family...Internet Safety & Security are all about you. New 150 Staysafe.org Trifold 5 Parent Texting Quiz New 150 NCMEC Handout 6 FTC Facts...Social Networking Sites: A Parent's Guide 100 0 FTC Handout 7 Work Computing Pyramid 50 50 Internal Handout 8 Home Computing Pyramid 50 50 Internal Handout 9 Tips to Prevent Sexting New 150 ConnectSafely.org Handout 10 Tips to Help Stop Cyberbullying New 150 ConnectSafely.org Handout

392

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 1020 of 31,917 results. 11 - 1020 of 31,917 results. Download Microsoft Word- Document in Microsoft Internet Explorer http://energy.gov/downloads/microsoft-word-document-microsoft-internet-explorer Download WC_1995_008_CLASS_WAIVER_of_Governments_Patent_Rights_In_In.pdf http://energy.gov/gc/downloads/wc1995008classwaiverofgovernmentspatentrightsininpdf Download WC_1996_001_CLASS_WAIVER_FOR_LELAND_STANFORD_JUNIOR_UNIVERSI.pdf http://energy.gov/gc/downloads/wc1996001classwaiverforlelandstanfordjunioruniversipdf Download WC_2000_003_CLASS_WAIVER_FOR_BWXT_UNDER_A_MANAGEMENT_AND_OPE.pdf http://energy.gov/gc/downloads/wc2000003classwaiverforbwxtunderamanagementandopepdf Download Preliminary Notice of Violation, MK-Ferguson of Oak Ridge Company- EA-98-08 Preliminary Notice of Violation issued to MK-Ferguson of Oak Ridge Company,

393

Switzerland exploration may resume  

SciTech Connect

Since 1912, 35 wells have been drilled for oil and gas, 19 of them in the last 38 years. Eighty percent of these 19 wells had oil and/or gas shows, but only one was placed on production. The only gas discovery, Entlebuch-1, produced about 2.6 bcf of a high quality gas in 10 years. It was abandoned in 1994. This paper discusses why exploration waned. A second look at the data suggests Switzerland has a high potential for gas production.

Lahusen, P.H. [SEAG, Geneva (Switzerland)

1997-06-23T23:59:59.000Z

394

Microsoft Word - 100424 Smart Grid White Paper _final_.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NEUSTAR WHITE PAPER: NEUSTAR WHITE PAPER: WHEN SMART GRIDS GROW SMART ENOUGH TO SOLVE CRIMES March 18, 2010 I. INTRODUCTION Telecommunications carriers and Internet service providers enjoy a close-up view of our lives. They see our telephone calling patterns, track our mobile whereabouts, store our emails, and memorize our Internet browsing habits. No wonder these communication service providers often get caught in debates about the privacy of communication activities. Privacy-minded subscribers expect communication service providers to keep subscriber activities confidential. Law enforcement expects to view certain activities promptly upon request. If the service provider under-discloses or over-discloses information to law enforcement it risks legal liability.

395

Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process  

E-Print Network (OSTI)

Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process Adam M. Ross in Tradespace Exploration · Question-guided TSE· Question-guided TSE · Discussion · Conclusion seari.mit.edu © 2010 Massachusetts Institute of Technology 2 #12;Introduction · Early design process is high leverage

de Weck, Olivier L.

396

Microsoft Word - Warm Rinse Guidance 6 29 2010_FINAL _2_  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The following is a draft U.S. Department of Energy interpretive rule, which sets out the The following is a draft U.S. Department of Energy interpretive rule, which sets out the Department's views on the application of the clothes washer testing procedure described in 10 CFR § 430 Appendix J1. This draft interpretive rule represents the Department's interpretation of its existing regulations and is exempt from the notice and comment requirements of the Administrative Procedure Act. See 5 U.S.C. § 553(b)(A). Nevertheless, we are interested in receiving feedback from the public on the interpretation set forth below. Therefore, the Department is accepting comments from the public until July 30, 2010. Comments should be provided in WordPerfect, Microsoft Word, PDF, or text file format by sending an email to: WarmRinse.FAQ@hq.doe.gov. At the end of the

397

FASTPLOT: An interface to Microsoft{reg_sign} FORTRAN graphics  

SciTech Connect

Interface routines to the Microsoft{reg_sign} FORTRAN graphics library (GRAPHICS.LIB) are provided to facilitate development of graphics codes. These routines are collected into the FASTPLOT library (FASTPLOT.LIB). The FASTPLOT routines simplified the development of applications utilizing graphics and add capabilities not available in GRAPHICS.LIB such as plotting histograms, splines, symbols, and error bars. Specifically, these routines were utilized in the development of the mortality data viewing code, MORTVIEW, for the US Environmental Protection Agency. Routines for color imaging, developed for use with the X-ray Computer Tomography (XCT) imaging code, and examples are also provided in the FASTPLOT library. Many example uses of FASTPLOT.LIB are contained in this document to facilitate applications development. The FASTPLOT.LIB library, source, and applications programs are supplied on the accompanying FASTPLOT diskette.

Ward, R.C.

1994-03-01T23:59:59.000Z

398

Microsoft PowerPoint - DSSE_Portfolio.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Knowledge Management & Analysis System Knowledge Management & Analysis System Data Systems Sciences & Engineering Group Computational Sciences & Engineering Division  Problem Statement: - DHS's DNDO subject matter experts need to collaborate with a variety of scientific data in order to support analysis of radiological and nuclear data across multiple data sites  Technical Approach: - KMAS is a web application running under Microsoft SharePoint - A common XML-based schema allows nuclear forensic data from disparate sources to be extracted and harvested d spa ate sou ces to be e t acted a d a ested  Benefit: - Transparent to the end user, the distributed database prevents KMAS from having to maintain a central library or repository of nuclear radiation data  Technology Readiness Level 9

399

Relevance of Massively Distributed Explorations  

E-Print Network (OSTI)

that this exploration process gives a partial and biased view of the real topology, which leads to the idea links) and may be biased by the exploration process (some properties of the obtained map may be induced induced by the exploration process. In order to improve these maps, several re- searchers and groups now

Paris-Sud XI, Université de

400

Relevance of Massively Distributed Explorations  

E-Print Network (OSTI)

that this exploration process gives a partial and biased view of the real topology, which leads to the idea links) and may be biased by the exploration process (some properties of the obtained map may be induced induced by the exploration process. In order to improve these maps, several re- searchers and groups no

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Polar Explorer References Raold Amundsen  

E-Print Network (OSTI)

-15, 2003, 1 h 19 min. * National Geographic May 2009, concerning claims of Arctic Ocean oil and gasPolar Explorer References Raold Amundsen My Life as an Explorer, Raold Amundsen The Red Tent.L. Berens [This book includes other historic polar explorers] * National Geographic Jan. 2009 (2 articles

Fabrikant, Sara Irina

402

DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

DDE DDE Discovering data and non-text information in the Department of Energy DOE Data Explorer What's New About DDE DOE Data Centers OSTI's Data ID Service Featured Collection Featured Data Collection Visit CEDR View the archive Search Find Advanced Search Options × Full Text: Bibliographic Data: Creator/Author: Title: Subject: Identifier Numbers: Host Website: Research Org: Sponsor/Funding Org: Contributing Orgs: Type: Select Type Publication Date: from Date: to to Date: Sort: By Relevance By Title Limit to: Matches with DOI only Collections only (no DOIs) Clear Find Advanced Search Basic Search Browse DDE Content All Titles (alphabetically) Sponsor/Funding Organizations Types of Data and Non-text Other Related Organizations Subject Categories Some links on this page may take you to non-federal websites. Their

403

Success Stories: Carbon Explorer  

NLE Websites -- All DOE Office Websites (Extended Search)

LBNL Device Monitors Ocean Carbon LBNL Device Monitors Ocean Carbon Imagine waking up each morning and discovering that twenty percent of all plants in your garden had disappeared over night. They had been eaten. Equally astonishing would be the discovery in the afternoon that new plants had taken their place. This is the norm of life in the ocean. Without the ability to accurately observe these daily changes in ocean life cycles, over vast spatial scales, we lack the ability to predict how the ocean will respond to rising CO2 levels, crippling our ability to develop accurate models of global warming or devise strategies to prevent it. The Carbon Explorer, conceived by Berkeley Lab's James K. Bishop in collaboration with Scripps Institution of Oceanography (La Jolla, California) and WET labs, Inc. (Philomath, Oregon), bridges this

404

The Extreme Physics Explorer  

E-Print Network (OSTI)

Some tests of fundamental physics - the equation of state at supra-nuclear densities, the metric in strong gravity, the effect of magnetic fields above the quantum critical value - can only be measured using compact astrophysical objects: neutron stars and black holes. The Extreme Physics Explorer is a modest sized (~500 kg) mission that would carry a high resolution (R ~300) X-ray spectrometer and a sensitive X-ray polarimeter, both with high time resolution (~5 ?s) capability, at the focus of a large area (~5 sq.m), low resolution (HPD~1 arcmin) X-ray mirror. This instrumentation would enable new classes of tests of fundamental physics using neutron stars and black holes as cosmic laboratories.

Martin Elvis

2006-08-25T23:59:59.000Z

405

TEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE  

E-Print Network (OSTI)

://www.ncemch.org/pubs/PDFs/breastfeedingTIB.pdf Internet monograph (standard citation to a part) Inhalent abuse [Internet]. Bethesda (MD): NationalTEXAS A&M UNIVERSITY LIBRARIES CITING THE INTERNET USING CSE STYLE Excellence in library recommendations for Internet citations using the CSE style are taken from the National Library of Medicine

406

A framework for nation-centric classification and observation of the internet  

Science Journals Connector (OSTI)

The Internet has matured to a mission-critical infrastructure, and recently attracted much attention at political and legal levels in many countries. Civil actions regarding the Internet infrastructure require a thorough understanding of the national ... Keywords: AS-level classification, German internet graph, methodology, nation-state internet routing

Matthias Whlisch; Sebastian Meiling; Thomas C. Schmidt

2010-11-01T23:59:59.000Z

407

Internet Engineering Task Force INTERNETDRAFT J. Lennox, J.Rosenberg, H.Schulzrinne  

E-Print Network (OSTI)

Internet Engineering Task Force INTERNET­DRAFT J. Lennox, J.Rosenberg, H.Schulzrinne draft Status of this Memo This document is an Internet­Draft. Internet­Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also

Lennox, Jonathan

408

On Power-Law Relationships of the Internet Topology Michalis Faloutsos  

E-Print Network (OSTI)

On Power-Law Relationships of the Internet Topology Michalis Faloutsos U.C. Riverside Dept. of Comp the apparent randomness of the Internet, we dis- cover some surprisingly simple power-laws of the Internet topology. These power-laws hold for three snapshots of the Internet, between November 1997 and December

409

Community Internet Access in Rural Areas: Solving the Economic Sustainability Puzzle  

E-Print Network (OSTI)

- oping nations. In researching and studying the economic self-sustainability of the Internet in rural

410

OSTI Pact with Internet Archive Ensures Uninterrupted Research Access |  

Office of Scientific and Technical Information (OSTI)

Pact with Internet Archive Ensures Uninterrupted Research Access Pact with Internet Archive Ensures Uninterrupted Research Access E-print Network One sure thing about the World Wide Web: like the weather, it will change. Given this dynamic nature of the Web and the importance of preservation of scientific information in a digital environment, OSTI recently partnered with Internet Archive to ensure uninterrupted access to more than 1 million online research papers from the E-print Network. The DOE E-print Network is the largest collection that a federal institution has undertaken in an on-going effort to preserve their own documents and history through Archive-It. "As a result of the pioneering partnership between the Internet Archive and OSTI, we are ensuring long-term, continuous access to the growing body of cutting-edge

411

Using end-user latency to manage internet infrastructure  

Science Journals Connector (OSTI)

Performance is a requirement for all interactive applications. For Internet-based distributed applications, the need is even more acute - users have a choice about where they browse, and if a site's performance frustrates them they may never return. ...

J. Bradley Chen; Michael Perkowitz

2002-12-01T23:59:59.000Z

412

Chapter 6 Use [and Abuse] of Multistakeholderism in the Internet  

Science Journals Connector (OSTI)

Multistakeholderism has become the Internet governance regime choice of many. While it is certain that everyone does not have the same modalities in mind when they utter the term, it is apparent that for many ...

Avri Doria

2014-01-01T23:59:59.000Z

413

The CATI Project: Charging and Accounting Technology for the Internet  

E-Print Network (OSTI)

The CATI Project: Charging and Accounting Technology for the Internet Burkhard Stiller1, Torsten, Switzerland 1 E-Mail: [stiller | plattner]@tik.ee.ethz.ch, 2 E-Mail: [braun | mguenter]@iam.unibe.ch Abstract

Braun, Torsten

414

The Internet, children, and privacy: the case against parental monitoring  

Science Journals Connector (OSTI)

Raising children with access to the Internet is still a relatively new phenomenon. It ... childrens on-line communication exchanges, is not good. While there are reasons to think that...ethical inappropriateness

Kay Mathiesen

2013-12-01T23:59:59.000Z

415

Organization Culture Dimensions as Antecedents of Internet Technology Adoption  

Science Journals Connector (OSTI)

In recent years, growth of the Internet and the World Wide Web has had an impact on the way local, state, and national governments work. In this research, we examine the factors that influence adoption of Inte...

Subhasish Dasgupta; Babita Gupta

2013-01-01T23:59:59.000Z

416

An interoperable internet scale solution for RFID network security  

E-Print Network (OSTI)

Security and privacy issues are critically important in RFID networks because EPC data and their associated business events are valuable assets. In this paper, an Interoperable Internet-Scale Security (IISS) framework for ...

Mao, Tingting

417

Towards More Efficient Delay Measurements on the Internet  

E-Print Network (OSTI)

the speed of experiments, improving the accuracy of measurement results, and reducing the amount of tra?c generated by the scan. Finally, we present architectures for performing an Internet scale measurement scan. We found that with custom drivers...

Webster, Patrick Jordan

2013-07-22T23:59:59.000Z

418

Population internet penetration rate and channel supply chain players' performances  

Science Journals Connector (OSTI)

With the rapid development of the internet, the population internet penetration rate plays a strategic importance in the dual-channel supply chain. In this research, we use a game-theoretic approach to examine the effect of the population internet penetration rate on the performances of the manufacturer and traditional retailer under the Stackelberg and Bertrand competitive models. Our results suggest that an increase in the population internet penetration rate always has a negative impact on the manufacturer and traditional retailer's profits. Furthermore, when the product is more suitable for the online market, the traditional retailer will be hurt more by the population internet penetration rate. For the manufacturer, although a larger product web fit can increase profits, the population internet penetration rate has a stronger impact on profitability, thus decreasing profits even as the product web fit increases. Our results also suggest that both the manufacturer and the retailer can adopt either of the Stackelberg and Bertrand competitive market structures in the dual-channel supply chain since their profits are unaffected by the two models. The managerial implications of our results are discussed and the probable paths of future research are identified.

Ruiliang Yan; John Wang; Sanjoy Ghose

2009-01-01T23:59:59.000Z

419

Policies and procedures to manage employee Internet abuse  

Science Journals Connector (OSTI)

Industry analysts estimate that billions of dollars in lost revenue were attributed to employee Internet abuse. Trends also suggest that lost job productivity and corporate liability have emerged as new workplace concerns due to growth of new online technologies and mobile computing. Such employee Internet misuse creates new management dilemmas on how to respond to incidences of such misuse as well poses network security risks and drains on network bandwidth. Within an organization, it is imperative to ensure that employees are using computing resources effectively and appropriately. Utilizing the previous literature in the field, this paper proposed a revised framework to manage employee Internet abuse. The former model proposed did not account for new digital media and recommended screening applicants for Internet addiction, using more of a clinical test than a job performance test. This new model describes both prevention and intervention methods to address incidents of online misuse in the workplace and refocuses hiring decisions into post-employment training. It also examines the new hiring concerns with the new iGeneration of college graduates and it examines how organizations should best utilize acceptable Internet use policies with clear methods of Internet monitoring to enforce that workers are complying with company policies. This paper also talks about the potential benefits of rehabilitation approaches to manage employees who abuse instead of terminating them to decrease job turnover and improve job retention. Implications for current management practices are also discussed.

Kimberly Young

2010-01-01T23:59:59.000Z

420

E-Print Network 3.0 - application development framework Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

Microsoft .NET Framework 4... Foundation ... Source: Narasayya, Vivek - Data Management, Exploration and Mining Group, Microsoft Research Collection: Computer Technologies and...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

E-Print Network 3.0 - attacks influence driving Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Go? Dinei Florencio and Cormac Herley Microsoft Research One Microsoft... that an Internet attacker, who attacks en masse, faces a sum-of-effort rather ... Source: Herley,...

422

Money flows in the Internet ecosystem : strategic opportunities for telecom operators and other Internet agents in the digital age  

E-Print Network (OSTI)

The question about where the money goes is something really interesting for all the companies in the Internet ecosystem. While there is a huge interest, no clear answers have been provided, partially because the ecosystem ...

Valentin Vinagrero, Israel

2014-01-01T23:59:59.000Z

423

Exploring reachability via settlement-free peering  

Science Journals Connector (OSTI)

The importance of an autonomous system is typically derived by its economic relevance, in Internet terms measured by the number of customer ASes it provides with connectivity. Such simple business relationship does not hold anymore. In this paper, we ... Keywords: AS importance, BGP peering, internet measurement

Sebastian Meyer; Matthias Whlisch; Thomas C. Schmidt

2012-12-01T23:59:59.000Z

424

Surfing the internet with a BCI mouse  

Science Journals Connector (OSTI)

In this paper, we present a new web browser based on a two-dimensional (2D) braincomputer interface (BCI) mouse, where our major concern is the selection of an intended target in a multi-target web page. A real-world web page may contain tens or even hundreds of targets, including hyperlinks, input elements, buttons, etc. In this case, a target filter designed in our system can be used to exclude most of those targets of no interest. Specifically, the user filters the targets of no interest out by inputting keywords with a P300-based speller, while keeps those containing the keywords. Such filtering largely facilitates the target selection task based on our BCI mouse. When there are only several targets in a web page (either an original sparse page or a target-filtered page), the user moves the mouse toward the target of interest using his/her electroencephalographic signal. The horizontal movement and vertical movement are controlled by motor imagery and P300 potential, respectively. If the mouse encounters a target of no interest, the user rejects it and continues to move the mouse. Otherwise the user selects the target and activates it. With the collaboration of the target filtering and a series of mouse movements and target selections/rejections, the user can select an intended target in a web page. Based on our browser system, common navigation functions, including history rolling forward and backward, hyperlink selection, page scrolling, text input, etc, are available. The system has been tested on seven subjects. Experimental results not only validated the efficacy of the proposed method, but also showed that free internet surfing with a BCI mouse is feasible.

Tianyou Yu; Yuanqing Li; Jinyi Long; Zhenghui Gu

2012-01-01T23:59:59.000Z

425

Exploration Technologies Technology Needs Assessment  

Energy.gov (U.S. Department of Energy (DOE))

The Exploration Technologies Needs Assessment is a critical component of ongoing technology roadmapping efforts, and will be used to guide the program's research and development.

426

Radioisotopes: Energy for Space Exploration  

SciTech Connect

Through a strong partnership between the Energy Department's office of Nuclear Energy and NASA, Radioisotope Power Systems have been providing the energy for deep space exploration.

Carpenter, Bob; Green, James; Bechtel, Ryan

2011-01-01T23:59:59.000Z

427

Radioisotopes: Energy for Space Exploration  

ScienceCinema (OSTI)

Through a strong partnership between the Energy Department's office of Nuclear Energy and NASA, Radioisotope Power Systems have been providing the energy for deep space exploration.

Carpenter, Bob; Green, James; Bechtel, Ryan

2013-05-29T23:59:59.000Z

428

Representations of 'trolls' in mass media communication: a review of media-texts and moral panics relating to 'internet trolling'  

Science Journals Connector (OSTI)

There is a general trend amongst mass media organisations around the world towards concentration of the visual, written and audio packaging and of newspapers, websites and television as channels of information. These platforms are explored in detail in this paper in relation to the moral panics around 'internet trolling'. This paper discusses the history of trolling in the context of mass media, specifically 'classical trolling' and 'anonymous trolling'. A review of different media headlines finds that whether or not a story is portrayed in newspapers, online, or on television, the media will use a variety of ways to convey their messages. In the case of 'trolls', they show a darker, sinister and transgressive side of cyberspace in the form of abuse and vitriol (i.e., anonymous trolling). The paper concludes that future research should look in detail at the different character types of internet troller and how these affect the way so called 'trolls' are represented in the media and the effect this has on the attitude towards young internet users and trollers in general.

Jonathan Bishop

2014-01-01T23:59:59.000Z

429

INTERNATIONAL SPACE EXPLORATION COORDINATION GROUP  

E-Print Network (OSTI)

exploration coordination tool to enhance the implementation of the coordination process At the 1st ISECG1 INTERNATIONAL SPACE EXPLORATION COORDINATION GROUP WORKPLAN Update following 3rd ISECG Meeting broader future participation in the planning and coordination process; - assessment of the requirements

430

U-127: Microsoft Security Bulletin MS12-020 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-127: Microsoft Security Bulletin MS12-020 - Critical U-127: Microsoft Security Bulletin MS12-020 - Critical U-127: Microsoft Security Bulletin MS12-020 - Critical March 16, 2012 - 9:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-020 - Critical PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2, Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows 7 for x64-based Systems Service

431

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009  

E-Print Network (OSTI)

Deutsche Telekom to offer Microsoft Office on a monthly payment plan Jun 11, 2009 · Customers able · Offer available first to T-Mobile Austria mobile broadband customers and Deutsche Telekom business customers in Germany from Q3 2009 · Deutsche Telekom is the first telecommunications provider to offer

Deutschmann, Rainer

432

EarlyOff: Using House Cooling Rates To Save Energy Microsoft Research, UK and  

E-Print Network (OSTI)

EarlyOff: Using House Cooling Rates To Save Energy Carl Ellis Microsoft Research, UK and Lancaster the house warm while saving energy. We use a previously gathered data set of real-time heating, gas, and occupancy readings from five houses and conduct a data-driven analy- sis of potential energy savings. Using

Hazas, Mike

433

Boot Camp: System Requirements for Microsoft Windows Last Modified: June 17, 2008  

E-Print Network (OSTI)

Boot Camp: System Requirements for Microsoft Windows · Last Modified: June 17, 2008 · Article: HT1899 · Old Article: 306538 Summary Apple's Boot Camp software, included with Mac OS X 10.5 Leopard. System requirements To use Boot Camp with Mac OS X 10.5 you need the following: · An Intel-based Mac

Papautsky, Ian

434

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432-2000  

E-Print Network (OSTI)

Configure Microsoft Outlook 2011 for Mac HMS Help Desk: (617) 432 HMS Help Desk: (617) 432-2000 2 · Click on the icon to the left Help Desk: (617) 432-2000 3 · Enter the following fields: o E

Blackwell, Keith

435

On Bitcoin and Red Balloons Moshe Babaioff, Microsoft Research, Silicon Valley  

E-Print Network (OSTI)

On Bitcoin and Red Balloons Moshe Babaioff, Microsoft Research, Silicon Valley Shahar Dobzinski balloons). We focus on another prominent example: Bitcoin, a decentralized electronic currency system. Bitcoin represents a radical new approach to monetary systems. It has been getting a large amount

Fiat, Amos

436

On Bitcoin and Red Balloons Moshe Babaioff, Microsoft Research, Silicon Valley.  

E-Print Network (OSTI)

X On Bitcoin and Red Balloons Moshe Babaioff, Microsoft Research, Silicon Valley. moshe (finding red balloons). We focus on another prominent scenario: Bitcoin, a decentralized electronic currency system. Bitcoin represents a radical new approach to monetary systems. It has been getting a large

Fiat, Amos

437

Urban Computing With City Dynamics http://research.microsoft.com/en-us/projects/urbancomputing/default.aspx  

E-Print Network (OSTI)

Urban Computing With City Dynamics http://research.microsoft.com/en-us flow Human mobility Energy consumption Environment Economic Populations ...... Data available Mobile, person, vehicle, building, and street in the urban areas can be used as a component to sense city

Rajamani, Sriram K.

438

7.5 Declaration in Apple vs. Microsoft/HewlettPackard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett­Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Golbeck, Jennifer

439

7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard  

E-Print Network (OSTI)

327 7.5 Declaration in Apple vs. Microsoft/Hewlett-Packard Ben Shneiderman I, Ben Shneiderman declarations and to further identify the arrangement that is unique to Apple and that makes the overall Petrie, Attorneys for Plaintiff, Apple Computer, Inc.; APPLE COMPUTER, INC., Plaintiff, vs. MCROSOFT CORP

Shneiderman, Ben

440

Internet-based calibration of a multifunction calibrator  

SciTech Connect

A new way of providing calibration services is evolving which employs the Internet to expand present capabilities and make the calibration process more interactive. Sandia National Laboratories and the National Institute of Standards and Technology are collaborating to set up and demonstrate a remote calibration of multifunction calibrators using this Internet-based technique that is becoming known as e-calibration. This paper describes the measurement philosophy and the Internet resources that can provide real-time audio/video/data exchange, consultation and training, as well as web-accessible test procedures, software and calibration reports. The communication system utilizes commercial hardware and software that should be easy to integrate into most calibration laboratories.

BUNTING BACA,LISA A.; DUDA JR.,LEONARD E.; WALKER,RUSSELL M.; OLDHAM,NILE; PARKER,MARK

2000-04-17T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Value creation and the internet: entrepreneurial behaviour in Dutch SMEs  

Science Journals Connector (OSTI)

Although almost all Small- and Medium-sized Enterprises (SMEs) have adopted the internet and e-mail, only those entrepreneurs that realise how these innovations can be applied in their business are able to recognise opportunities to create value. Based on a sample of 614 Dutch SMEs, we examine what factors determine the recognition of such opportunities. Particularly, we argue that the use of the internet and e-mail has a positive relationship to organisational and strategic value creation; that organisational value creation precedes strategic value creation; and that entrepreneurs who are able to actually create strategic value and thus have actually recognised entrepreneurial opportunities from these technologies have higher levels of knowledge and experience, are more proactive networkers and have higher levels of entrepreneurial orientation. Our findings suggest that there are clear possibilities for SMEs to capitalise on adopting the internet and e-mail because all the associated factors can be enhanced through choices consciously made by the entrepreneurs.

Marijke Van Der Veen; Ingrid Wakkee

2009-01-01T23:59:59.000Z

442

Microsoft Word - V-ESR-G-00003_R1.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

of these pumps led SRS to explore baseline alternatives. The evaluation effort eventually expanded to include looking at alternative technologies other than mixing, which included...

443

Revisiting the Tradespace Exploration Paradigm: Structuring the Exploration Process  

E-Print Network (OSTI)

A number of case applications of tradespace exploration have further extended the types of analyses and knowledge insights that can be gained about tradeoffs between design choices and perceived utility and cost of ...

Ross, Adam Michael

444

Geothermal Exploration Cost and Time  

SciTech Connect

The Department of Energys Geothermal Technology Office (GTO) provides RD&D funding for geothermal exploration technologies with the goal of lowering the risks and costs of geothermal development and exploration. The National Renewable Energy Laboratory (NREL) was tasked with developing a metric in 2012 to measure the impacts of this RD&D funding on the cost and time required for exploration activities. The development of this cost and time metric included collecting cost and time data for exploration techniques, creating a baseline suite of exploration techniques to which future exploration cost and time improvements can be compared, and developing an online tool for graphically showing potential project impacts (all available at http://en.openei.org/wiki/Gateway: Geothermal). This paper describes the methodology used to define the baseline exploration suite of techniques (baseline), as well as the approach that was used to create the cost and time data set that populates the baseline. The resulting product, an online tool for measuring impact, and the aggregated cost and time data are available on the Open Energy Information website (OpenEI, http://en.openei.org) for public access. - Published 01/01/2013 by US National Renewable Energy Laboratory NREL.

Scott Jenne

2013-02-13T23:59:59.000Z

445

CSP 550: Internet Programming Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and Paradigms, 2002.  

E-Print Network (OSTI)

CSP 550: Internet Programming Texts Andrew Tanenbaum and M. Steen, Distributed Systems: Principles and SOAP 9 hours Total 45 hours Edited March 2006 (html, css checks) CSP 550: Internet Programming - CS

Heller, Barbara

446

Internet-based Abuse Prevention Training www.PraesidiumInc.com  

E-Print Network (OSTI)

Internet-based Abuse Prevention Training www.PraesidiumInc.com Quick Start Guide Welcome to Armatus page, an orange arrow will appear. Click the orange arrow to move forward. Do not use your Internet

Subramanian, Venkat

447

Building trust over the Internet : design and prototyping of an advocacy website  

E-Print Network (OSTI)

The Internet has empowered consumers with information, options, and a simple mechanism for transaction. Although the Internet has not completely replaced traditional shopping methods, it has brought about a change in the ...

Ma, Sha, 1981-

2004-01-01T23:59:59.000Z

448

E-Print Network 3.0 - art internet database Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

internet database Search Powered by Explorit Topic List Advanced Search Sample search results for: art internet database Page: << < 1 2 3 4 5 > >> 1 This is a guide to finding...

449

Routing Approach in IPv6 Ubiquitous Internet-Based Home Automation Network  

Science Journals Connector (OSTI)

Internet-based home automation system allows home owners to monitor and control connected devices in the home using any Internet enabled device. The homes low power and low data rate, ... needs are catered for u...

Ardiansyah Musa Efendi; Oh Seung Kyo

2013-01-01T23:59:59.000Z

450

The Use of Internet and Intranet In American Convention and Visitors Bureaus  

Science Journals Connector (OSTI)

The emergence of the Internet/Intranet offers new promise to American Convention and ... extent of the various capabilities of the Internet/Intranet are used by CVBs to augment marketing ... directors have not re...

Y. Y. Yuan; D. R. Fesenmaier; L. Xia

1999-01-01T23:59:59.000Z

451

E-Print Network 3.0 - arthritis-related internet web Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

related internet web Search Powered by Explorit Topic List Advanced Search Sample search results for: arthritis-related internet web Page: << < 1 2 3 4 5 > >> 1 COP 6930 Advanced...

452

SFU Library Ask. Explore. Discover.  

E-Print Network (OSTI)

SFU Library Ask. Explore. Discover. SFU Library Annual Report 2007-08 #12;SFU Library Annual Report..................................................................................................... 8 WAC BENNETT LIBRARY................................................................................... 9 SAMUEL AND FRANCES BELZBERG LIBRARY............................................... 10 FRASER

453

Laboratories to Explore, Explain VLBACHANDRA  

E-Print Network (OSTI)

Institute of Technology Idaho National Engineering Laboratory Lawrence Livermore National Laboratory, at least, be one that allows the scientific exploration of burning plasmas" and if Japan and Europe do

454

Microsoft Word - NatlConfBlackMayors.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Conference of Black Mayors, Inc. National Conference of Black Mayors, Inc. Initiative: Partnered in developing the 1997 Environmental Justice conference, "The State of Environmental Justice in America" Cooperative Agreement, created in 1999 * Goal * Technical Assistance * Communities Served * Community Impact Goal: The cooperative agreement enhances the National Conference of Black Mayors, Inc. (NCBM) members' capacity for energy and environmental planning through computer-based technology, Internet access and a training workshop. Technical Assistance: The NCBM will establish a formal relationship with DOE's Dr. Samuel P. Massie Chairs of Excellence Program participants. The Massie Chairs of Excellence Program partnership will provide the NCBM's members with technical assistance in the environmental

455

Microsoft Word - eia7a_users_manual_final  

U.S. Energy Information Administration (EIA) Indexed Site

Form EIA-7A Users Manual Annual Coal Production and Preparation Report Document Number: 001 Version: 1.0 February 2012 1 February 2012 Document History Number Date Section Description 1 February 2012 Document initiation Primary POC: Paulette Young Phone: (202) 586-1719 Email: paulette.young@eia.gov Document Changes/Maintenance POC: Primary POC: Paulette Young Phone: (202) 586-1719 Email: paulette.young@eia.gov Project References:  Coal Internet Data Collection (CIDC) User's Manual, September 2007 2 February 2012 Content 1. General System Overview .................................................................................... 4 1.1 System Overview .................................................................................................................. 4

456

Exploration and Development at Dixie Valley, Nevada- Summary of Doe Studies  

Open Energy Info (EERE)

at Dixie Valley, Nevada- Summary of Doe Studies at Dixie Valley, Nevada- Summary of Doe Studies Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Exploration and Development at Dixie Valley, Nevada- Summary of Doe Studies Authors David D. Blackwell, Richard P. Smith and Maria C. Richards Conference Thirty-Second Workshop on Geothermal Reservoir Engineering; Stanford University, Stanford, California; 39083 Published Thirty-Second Workshop on Geothermal Reservoir Engineering;, 2007 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Exploration and Development at Dixie Valley, Nevada- Summary of Doe Studies Citation David D. Blackwell,Richard P. Smith,Maria C. Richards. 2007. Exploration and Development at Dixie Valley, Nevada- Summary of Doe Studies. In:

457

Silver Peak Innovative Exploration Project  

Energy.gov (U.S. Department of Energy (DOE))

DOE Geothermal Peer Review 2010 - Presentation. Project objectives: Reduce the high level of risk during the early stages of geothermal project development by conducting a multi-faceted and innovative exploration and drilling program at Silver Peak. Determine the combination of techniques that are most useful and cost-effective in identifying the geothermal resource through a detailed, post-project evaluation of the exploration and drilling program.

458

Employee Use of the Internet and Acceptable Use Policies in the Academic Workplace: Controlling Abuse while Creating Culture.  

E-Print Network (OSTI)

?? The use of the Internet has grown substantially, especially since the late 1990s. Businesses are relying increasingly on the Internet and intranet as tools (more)

King, B.J.

2007-01-01T23:59:59.000Z

459

ARTIGO INTERNET IST estreia laboratrio de medicina regenerativa  

E-Print Network (OSTI)

ARTIGO INTERNET IST estreia laboratório de medicina regenerativa in http://www.boasnoticias.pt/ Data: 2011-9-20 Link: http://www.boasnoticias.pt/not ... IST estreia laboratório de medicina Células Estaminais e Medicina Regenerativa. O objetivo deste espaço vai centrar-se na investigação em

Instituto de Sistemas e Robotica

460

Reduction-based Security Analysis of Internet Routing Protocols  

E-Print Network (OSTI)

Reduction-based Security Analysis of Internet Routing Protocols Chen Chen, Limin Jia, Boon Thau Loo. These properties require routes announced by honest nodes in the network not to be tampered with by the adversary proofs with automated analysis. We define several reduction steps to reduce proving route authenticity

Pennsylvania, University of

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Towards Securing Interdomain Routing on the Internet Sharon Goldberg  

E-Print Network (OSTI)

up by the routing protocols. 1. We start with a game-theoretic analysis that shows that evenTowards Securing Interdomain Routing on the Internet Sharon Goldberg A Dissertation Presented economic goals. Despite these complex relationships, the interdomain routing system (that allows ASes

Singh, Jaswinder Pal

462

Roaming and investments in the mobile internet market  

Science Journals Connector (OSTI)

This model discusses mobile network operators' (MNOs) incentives to invest in their network facilities such as new 4G networks under various regimes of data roaming charge regulation. Given an induced externality of investments (spillovers) due to the ... Keywords: Investment spillover, Mobile internet, National roaming, Regulation

Torben StHmeier

2012-09-01T23:59:59.000Z

463

ENERGY MANAGEMENT REAL-TIME MULTI-TIER INTERNET SERVICES  

E-Print Network (OSTI)

ENERGY MANAGEMENT IN REAL-TIME MULTI-TIER INTERNET SERVICES A Dissertation Presented to the faculty This dissertation has been read and approved by the examining Committee: Kevin Skadron (Advisor) Sudhanva Gurumurthi and Applied Science: James H. Aylor (Dean) May 2008 #12;Abstract Energy management only recently emerged

Skadron, Kevin

464

Search Technology Internet Start-Ups Business Computing Companies  

E-Print Network (OSTI)

#12;Search Technology Internet Start-Ups Business Computing Companies Inside Technology Bits Blog engineer at Google, uses statistical analysis of data to help improve the company's search engine » Cellphones, Cameras, Computers and more Personal Tech » Advertise on NYTimes.com Search All NYTimes

Oyet, Alwell

465

Rocky K. C. Chang Internet Infrastructure and Security Group  

E-Print Network (OSTI)

10 July 2012 Measuring and Understanding Internet Performance: A Personal View #12;2 Graduate Forum, SunYat-sen University July 2012 #12;Measuring end-to-end performance Source:Akamai's network performance comparison3 Graduate Forum, SunYat-sen University July 2012 #12;Why measuring network path

Chang, Rocky Kow-Chuen

466

Energy Router: Architectures and Functionalities toward Energy Internet  

E-Print Network (OSTI)

, such as sunlight, wind, hydro, tide, geothermal, and waste [1]. Besides the utilization of renewable energyEnergy Router: Architectures and Functionalities toward Energy Internet Yi Xu, Jianhua Zhang, Wenye Wang, Avik Juneja, and Subhashish Bhattacharya Future Renewable Electric Energy Delivery and Management

Wang, Wenye

467

ARTIGO INTERNET PLUX vence Prmio "Biggest Innovation" em concurso  

E-Print Network (OSTI)

concorreram aos prémios "Biggest Innovation", "Greatest Social Value" e "Potential for Biggest Social ImpactNewsSearch ARTIGO INTERNET PLUX vence Prémio "Biggest Innovation" em concurso internacional in http://www.cienciapt.net Data: 2010-8-16 Link: http://www.cienciapt.net/pt/in ... PLUX vence Prémio "Biggest Innovation" em

Instituto de Sistemas e Robotica

468

Technology acceptance model for internet banking: an invariance analysis  

Science Journals Connector (OSTI)

The technology acceptance model (TAM) has been applied in different contexts to investigate a wide range of information technologies (IT), and a cumulative tradition has already been developed in this stream of research. Most TAM studies have been empirical ... Keywords: internet banking, invariance analysis, technology acceptance model

Vincent S. Lai; Honglei Li

2005-01-01T23:59:59.000Z

469

Acculturation to the global culture and internet adoption  

Science Journals Connector (OSTI)

Globalization is felt in most parts of the world and its effects on culture are becoming a topic of interest to society and in particular to the IS academic community. Our research addresses calls for research on the issue of globalization and its cultural ... Keywords: acculturation, dynamic view of culture, global culture, internet adoption, subjective norm, technology acceptance model, theory of reasoned action

Reem Ayouby; Anne-Marie Croteau; Louis Raymond

2012-11-01T23:59:59.000Z

470

Internet-Enabled Distributed Engineering (Web) Services , J. Cheng1  

E-Print Network (OSTI)

1 Internet-Enabled Distributed Engineering (Web) Services J. Peng1 , D. Liu1 , J. Cheng1 , C.S. Han in Civil Engineering. The web services model is becoming a popular approach for integrating software service approach is a promising paradigm for integrating large engineering software applications. Keywords

Stanford University

471

A dependability evaluation tool for the Internet of Things  

Science Journals Connector (OSTI)

The Internet of Things (IoT) is a promising networking paradigm which immerses objects (cell phones, goods, watches, sensing motes, TVs, etc.) in a worldwide connection. Despite its high degree of applicability, the IoT faces some challenges. One of ...

Ivanovitch Silva; Rafael Leandro; Daniel Macedo; Luiz Affonso Guedes

2013-10-01T23:59:59.000Z

472

Internet, a Political Issue for Europe (1970s-2010s)  

E-Print Network (OSTI)

Internet, a Political Issue for Europe (1970s-2010s) Draft paper The final version of this paper will be published in Bishop J. & Solo A.M.G, Politics and Policy in the Information Age, Springer, in 2013. Romain in Europe? How did the "network of networks" and ICTs become political stakes for EU institutions

Paris-Sud XI, Université de

473

ARTIGO INTERNET Professores visitam o maior reactor de Fuso Nuclear  

E-Print Network (OSTI)

ARTIGO INTERNET Professores visitam o maior reactor de Fusão Nuclear in http reactor de Fusão Nuclear Experiência aproxima investigação das futuras gerações Doze professores do ensino secundário visitaram o maior reactor de fusão nuclear da Terra (JET), no Reino Unido, na semana passada

Instituto de Sistemas e Robotica

474

Performance analysis and network path characterization for scalable internet streaming  

E-Print Network (OSTI)

Delivering high-quality of video to end users over the best-effort Internet is a challenging task since quality of streaming video is highly subject to network conditions. A fundamental issue in this area is how real-time applications cope...

Kang, Seong-Ryong

2008-10-10T23:59:59.000Z

475

SRP: a Scalable Resource Reservation Protocol for the Internet  

E-Print Network (OSTI)

SRP: a Scalable Resource Reservation Protocol for the Internet Werner Almesberger 1 , Tiziana (SRP) provides a light-weight reser- vation mechanism for adaptive multimedia applications. Our main these applications need in order to operate prop- erly. SRP aims to allow such applications to make a dependable

Almesberger, Werner

476

Information Commons Help Desk Internet / Connectivity Wireless Access  

E-Print Network (OSTI)

Information Commons Help Desk Internet / Connectivity » Wireless Access ID #1912 Connecting in the Username and Password fields.5. Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help on this entry Info Commons Help Desk - Connecting to the UofT wireless netwo... http://help

Boonstra, Rudy

477

Triple Play Support for the Next Generation Internet Mario Baldi  

E-Print Network (OSTI)

opportunity to information providers or, at least, be economically self-sustainable. In other words, Internet of accessing any type of information: it must be a profitable business or, at least, economically self- sustainable. In order to achieve this objective, services people are willing to pay for must be offered over

Baldi, Mario

478

Using the Internet to Stay Informed about Energy  

E-Print Network (OSTI)

and Oil Contract Information ....................................... http://apollo.osti.gov/htrnUeia4st2a.htm1 GasWEB Home Page ...................................................................................... http://www.gasweb.orglgasweb ... in 1997. My INTERNET e-mail address is jnp@unicomp.net. ENERGY HOMEPAGES Government: .................................................... DOE EREN - Energy Efficiency http://www.eren.doe.gov...

Phillips, J.

1996-01-01T23:59:59.000Z

479

ATLAS2000 Atlases of the Future in Internet M. Friedrich  

E-Print Network (OSTI)

ATLAS2000 ­ Atlases of the Future in Internet M. Friedrich (mafri@ipg.uni-freiburg.de) M. Melle the ecological system earth. Until recently the traditional atlas has been the pri- mary tool for collection and dissemination of geographical knowledge about the earth. To advance to concepts of the atlas it is necessary

Reiterer, Harald

480

ANALYSIS OF INTERNET TOPOLOGY DATA Hao (Johnson) Chen  

E-Print Network (OSTI)

ANALYSIS OF INTERNET TOPOLOGY DATA by Hao (Johnson) Chen B.E. in Computer Science, Shen Zhen OF SCIENCE In the School of Computing Science © Hao (Johnson) Chen 2004 SIMON FRASER UNIVERSITY April 2004, without permission of the author. #12;Approval Name: Hao (Johnson) Chen Degree: Master of Science Title

Trajkovic, Ljiljana

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

The Internet-What's Really in it for Teachers  

Science Journals Connector (OSTI)

......the filing system idea into an Intranet. An Intranet is simply a kind of internal...system but using all the same technologies as the Internet. No access...stuff again, but here with an Intranet system we have a genuine opportunity......

BRYAN DYE

1998-06-01T23:59:59.000Z

482

A comparison of the Internet multicast routing protocols  

Science Journals Connector (OSTI)

The exploding Internet has brought many novel network applications. These include teleconferencing, interactive games, the voice/video phone, real-time multimedia playing, distributed computing, web casting, and so on. One of the specific characteristics ... Keywords: Datagrams, Delivery tree, Multicasting routing protocols

Jhyda Lin; Ruay-Shiung Chang

1999-01-01T23:59:59.000Z

483

US - Voice Over Internet Protocol Phone Service Providers Market Analysis  

E-Print Network (OSTI)

This report explains the overview of Voice over internet protocol (VoIP) and the challenges the VoIP Phone Service providers face to become market leaders. The report provides an overview of new services offering, both residential and business...

Srinivasan, Vijaybabu

2006-05-19T23:59:59.000Z

484

Review of Internet Service Providers and Peering Matthew Renzelmann  

E-Print Network (OSTI)

Review of Internet Service Providers and Peering Matthew Renzelmann February 11, 2007 1 Introduction This paper discusses the issues that lead ISPs to con- sider peering or transit arrangements with one an- other. Norton considers the technical reasons for peering as well as the financial

Akella, Aditya

485

PROVISIONING AND ANALYSIS OF APPLICATION-SPECIFIC INTERNET MEASUREMENTS  

E-Print Network (OSTI)

S metrics need to be sampled with strict periodicity for accurate network weather forecasting. To addressS) metrics (e.g., delay and loss) and estimation techniques such as forecasting for initial selection, measurement scheduling techniques are presented that provision QoS metrics on the Internet with the accuracy

Calyam, Prasad

486

The GIS Manual 1 The Integration of Internet GIS  

E-Print Network (OSTI)

The GIS Manual 1 CHAPTER 48 The Integration of Internet GIS and Wireless Mobile GIS Ming, centralized GIS architecture, to an open, distributed geographic information services (GIServices) framework. With advances in computer networking and wireless communication technology, GIS is moving toward an integration

Tsou, Ming-Hsiang

487

Herding cats: modelling Quality of Service for Internet applications  

Science Journals Connector (OSTI)

...Quality of Service; performance engineering 1. Introduction In this paper...erent rates. For exam- ple, audio, video, gaming and data applications...the meantime, the Internet Engineering Task Force continues to build...quality of real-time multimedia audio and video. Poster presented...

2000-01-01T23:59:59.000Z

488

Turbo King: Framework for Large-Scale Internet Delay Measurements  

E-Print Network (OSTI)

servers (which is called cache pollution) and requires large traffic overhead when deployed in large consuming half the bandwidth needed by King and reducing the impact of cache pollution by several orders building an all-to-all delay matrix between approximately 220, 000 BGP prefixes advertised in the Internet

Loguinov, Dmitri

489

Energy Internet -- Towards Smart Grid 2.0  

Science Journals Connector (OSTI)

Price rising of energy and the limitation of fossil fuel makes it an inevitable tendency to introduce distributed energy such as renewable energy to the existing supply system in the future. Different players, such as power generation, transmission, ... Keywords: energy internet, smart grid, energy router, distributed generation

Junwei Cao, Mingbo Yang

2013-12-01T23:59:59.000Z

490

Five Deaths Resulting from Abuse of Dextromethorphan Sold Over the Internet  

Science Journals Connector (OSTI)

......obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The...Fatal Outcome Humans Internet Male Marketing legislation...Substance-Related Disorders blood Young Adult 99 Dextromethorphan...obtained from the same internet supplier in each...dextromethorphan abuse and toxicity. The......

Barry K. Logan; Gary Goldfogel; Rebecca Hamilton; James Kuhlman

2009-03-01T23:59:59.000Z

491

Addressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet  

E-Print Network (OSTI)

. In the face of potential abuse or other malice, it seems clear that future Internet designs need to addressAddressing Reality: An Architectural Response to Real-World Demands on the Evolving Internet David jtw@lcs.mit.edu Ted Faber USC ISI faber@isi.edu ABSTRACT A system as complex as the Internet can only

Faber, Ted

492

OPPORTUNITIES FOR COMPUTERAIDED INSTRUCTION IN PHONETICS AND SPEECH COMMUNICATION PROVIDED BY THE INTERNET  

E-Print Network (OSTI)

BY THE INTERNET M. Huckvale 1 , C. Benoit 2 , C. Bowerman 3 , A. Eriksson 4 , M. Rosner 5 , M. Tatham 6 , B. Williams 7 Computer Aided Learning and Use of the Internet Working Group SOCRATES Thematic Network available on the Internet could be exploited in the education of phonetics and speech communication

Edinburgh, University of

493

ELISA: European Linkage between Internet Integrated and Differentiated Services over ATM  

E-Print Network (OSTI)

Internet does not guarantee Quality of Service for user flows, which prevents the provision of good qualityELISA: European Linkage between Internet Integrated and Differentiated Services over ATM T. V. Do-Fokus Abstract Nowadays we are witnessing the growth of Internet at an unprecedented rate. However, the current

494

Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings, Bonka Boneva,  

E-Print Network (OSTI)

that many people, especially those with good social resources, have integrated the Internet--they become instantly popular. If communication is so important to Internet users, there is good reasonChapter xx Internet Evolution and Social Impact Sara Kiesler, Robert Kraut, Jonathon Cummings

495

ETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology  

E-Print Network (OSTI)

. Finally, a good understanding of the Internet topology can lead to improvements in network topologyETH TIK-NR. 118, JULY 2001 1 A Spectral Analysis of the Internet Topology Danica Vukadinovi´c, Polly Huang, Thomas Erlebach Abstract-- In this paper we investigate properties of the Internet topology

Huang, Polly

496

The Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson  

E-Print Network (OSTI)

interested in learning more about Internet measurement, the book by Crovella and Krishnamurthy [1] is a goodThe Extensive Challenges of Internet Application Measurement Martin Arlitt Carey Williamson The Internet has grown dramatically and evolved significantly over the past 10 years. While this growth

Williamson, Carey

497

Internet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills  

E-Print Network (OSTI)

the Internet backbone networks and gateways are carefully engineered for good service, op­ erating speedsInternet Time Synchronization: the Network Time Protocol 1,2,3 David L. Mills Electrical), which is designed to distribute time information in a large, diverse internet system operating at speeds

Mills, David L.

498

Studying Black Holes in the Internet with Hubble Ethan Katz-Bassett  

E-Print Network (OSTI)

as a top priority in the original design of the Internet protocols, ahead of high perfor- mance or goodStudying Black Holes in the Internet with Hubble Ethan Katz-Bassett Harsha V. Madhyastha John P that operates contin- uously to find Internet reachability problems in which routes exist to a destination

Anderson, Richard

499

A framework for flowbased accounting on the Internet HansWerner Braun  

E-Print Network (OSTI)

for accounting in the Internet reflects its historical status as bulk­funded good for the academic communityA framework for flow­based accounting on the Internet Hans­Werner Braun hwb@sdsc.edu San Diego describe steps toward an accounting mechanism to attribute Internet resource consumption based on service

Polyzos, George C.

500

Sales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight  

E-Print Network (OSTI)

, the Internet are considered. This paper discusses sales and use taxes for electronic services and goodsSales Taxes on the Internet: When and How to Tax? Ozlem Uzuner Lee McKnight Massachusetts Institute As a first attempt to tax electronic commerce, many countries applied the existing tax laws to Internet

Uzuner, ?zlem