Powered by Deep Web Technologies
Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

2

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

3

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution...

4

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code 526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability January 3, 2011 - 2:38pm Addthis PROBLEM: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability PLATFORM: Microsoft Internet Explorer 8.0.7600.16385 ABSTRACT: Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected. reference LINKS: SecurityFocus - Microsoft Internet Explorer

5

T-593: Microsoft Internet Explorer unspecified code execution | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

593: Microsoft Internet Explorer unspecified code execution 593: Microsoft Internet Explorer unspecified code execution T-593: Microsoft Internet Explorer unspecified code execution April 1, 2011 - 6:22am Addthis PROBLEM: Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system. A remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the system. PLATFORM: Microsoft Internet Explorer 8 ABSTRACT: Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process. reference LINKS: CVE-2011-1347 Update Date : 2011-03-30 Microsoft >> IE: Vulnerability Statistics IMPACT ASSESSMENT: High Discussion: Microsoft Internet Explorer could allow a remote attacker to execute

6

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote...

7

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

8

U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Internet Explorer Flaw Lets Remote Users Execute 2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 - 6:00am Addthis PROBLEM: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system. The code will run with the privileges of the

9

V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw 8: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code V-058: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code December 31, 2012 - 6:58am Addthis PROBLEM: Microsoft Internet Explorer CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 6, 7, 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. A remote user can cause arbitrary code to be executed on the target user's system. REFERENCE LINKS: SecurityTracker Alert ID: 1027930 Secunia Advisory SA51695 CVE-2012-4792 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

10

Official Microsoft Internet Explorer 4.0 Book with Cdrom, 2nd edition  

Science Conference Proceedings (OSTI)

From the Publisher:Version 4 is a complete suite of products for communicating and working together via the Internet or intranets. And here you'll learn to work with them all - Outlook Express for e-mail, NetMeeting video and data conferencing. NetShow ...

Bryan Pfaffenberger

1997-10-01T23:59:59.000Z

11

Microsoft Word - Document in Microsoft Internet Explorer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Status of the Mixed Oxide Fuel Status of the Mixed Oxide Fuel Fabrication Facility DOE/IG-0713 December 2005 STATUS OF THE MIXED OXIDE FUEL FABRICATION FACILITY TABLE OF CONTENTS MOX Facility Design Costs Details of Finding 1 Recommendations 5 Comments 6 Appendices Objective, Scope, and Methodology 9 Prior Audit Reports 11 Management Comments 12 MOX Facility Design Costs Page 1 Details of Finding Design and The audit disclosed that the cost of the Mixed Oxide Fuel Construction Budget Facility (MOX) will significantly exceed the amounts reported to Congress. As of July 2005, the National Nuclear Security Administration's (NNSA's) unvalidated estimate for the design and construction of the MOX Facility was about $3.5 billion, which is

12

Microsoft Word - Document in Microsoft Internet Explorer  

NLE Websites -- All DOE Office Websites (Extended Search)

8 Figure 1. Overview of the GRP94 structure. The two protomers of the GRP94 dimer are shown in blue and cyan. (A) Ribbon drawing of side and top views. The two N- terminal domains...

13

Microsoft Word - Document in Microsoft Internet Explorer  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

gas prices seem to have spiked recently, the issues leading to this increase have been gas prices seem to have spiked recently, the issues leading to this increase have been decades in the making. Our nation's refining capacity has been stagnant for thirty years, we have limited our options to increase domestic supply, and we depend more and more on foreign sources of oil that are becoming increasingly scarce because of rising demand in other countries like China and India. ♦ The energy bill signed by the president last summer has helped the U.S. start to turn the corner and lead us in the right direction. The energy bill supports development of more oil and gas reserves here at home and in addition, and will help us develop new technologies to fuel our transportation needs like hydrogen fuel cell cars. ♦ In the coming months, we may continue to see high prices due to increased demand as the

14

Parasitism and Internet auction fraud: An exploration  

Science Conference Proceedings (OSTI)

Most research on Internet auction fraud focuses exclusively on the relationship between the con-artist and victim. However, the con-artist and victim are situated in an ecology comprising the auction house, police, and auction community. This paper employs ... Keywords: Auction fraud, Internet crime, Metaphor, Parasitism

Cecil Eng Huang Chua; Jonathan Wareham

2008-10-01T23:59:59.000Z

15

Exploring Microsoft Word for Windows 95, Version 7.0, 1st edition  

Science Conference Proceedings (OSTI)

From the Publisher:Part of the reivsed and updated Exploring Windows Series which accommodates the Microsoft Windows 95 operating system. Fully explores Word for Windows by providing hands-on experience in addition to the rationale behind ...

Robert T. Bauer; Maryann Barber

1995-11-01T23:59:59.000Z

16

U-190: Microsoft Security Bulletin MS12-037 - Critical | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin MS12-037 - Critical 0: Microsoft Security Bulletin MS12-037 - Critical U-190: Microsoft Security Bulletin MS12-037 - Critical June 13, 2012 - 3:30pm Addthis PROBLEM: Microsoft Security Bulletin MS12-037 - Critical PLATFORM: Internet Explorer 8.x ABSTRACT: This security update resolves one publicly disclosed and twelve privately reported vulnerabilities in Internet Explorer. LINKS: Microsoft Security Bulletin MS12-037 - Critical Secunia Advisory SA49412 IMPACT ASSESSMENT: High Discussion: The most severe vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. An attacker who successfully exploited any of these vulnerabilities could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who

17

Beneficial or adverse? Exploring the association between Internet content consumption and sexual identity among single gay men who use the Internet in Guangdong, China.  

E-Print Network (OSTI)

??The purpose of this research is to explore the relationship between homosexual identity and the Internet, using an online sample from Southern China. The goals (more)

Huang, Liqi

2013-01-01T23:59:59.000Z

18

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry  

E-Print Network (OSTI)

Exploring Marketing Orientation Influences on Internet Adoption in the U.S. Lumber Industry Kofi. Specifically, we focus on the question "Does a high marketing orientation have a positive effect and tested a model that examines the mediating influence of marketing orientation across a number

19

Is Google the next Microsoft? Competition, Welfare and Regulation in Internet Search  

E-Print Network (OSTI)

). This suggests analogies with experience in other utility markets such as telecoms and electricity where a similar upstream/downstream division have proved useful in the design of regulatory intervention. IS GOOGLE THE NEXT MICROSOFT? 5 1.1. Related Literature... ) came from sites it owns and operates.5 Another major feature of the search engine market is its high levels of concentration. As of August 2007 the top four search engines had a combined market share 97% in the US with the top firm (Google) having 65...

Pollock, Rufus

20

Exploration of the comics medium developed for use on the internet.  

E-Print Network (OSTI)

??A new derivative of the comics medium may be created by incorporating computer and internet technology into the design process. Traditionally a printed medium, comics (more)

Piana, Brian James

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Microsoft PowerPoint - Effective Exploration of New_Zhao [Compatibilit...  

NLE Websites -- All DOE Office Websites (Extended Search)

phases through high-throughput exploration together with computational thermodynamics. * Cost-effective steels for AUSC clean coal systems. Fe Ni Al, Nb, Ti, Si, Ta,...

22

Exploring Pipeline Dynamics to Connect New Markets  

U.S. Energy Information Administration (EIA)

This presentation contains content that your browser may not be able to show properly. This presentation was optimized for more recent versions of Microsoft Internet ...

23

T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

06: Microsoft Fraudulent Digital Certificate Issued by DigiNotar 06: Microsoft Fraudulent Digital Certificate Issued by DigiNotar T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar August 30, 2011 - 8:45am Addthis PROBLEM: Digital certificate affects all subdomains of google.com and may be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. PLATFORM: Windows XP Service Pack 3, Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2*, Windows Server 2008

24

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

25

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

26

Microsoft Word - What's New in IE8 v3  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

What's New in Internet Explorer V8? Internet Explorer 8 (IE8) has a different look and feel than Internet Explorer 6. It also has some additional functionality and security...

27

Draft NISTIR 7946, CVSS Implementation Guidance  

Science Conference Proceedings (OSTI)

... SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet 626 Explorer, Mozilla Firefox, Google Chrome, Opera ...

2013-09-04T23:59:59.000Z

28

Programming microsoft robotics studio  

Science Conference Proceedings (OSTI)

Get the practical reference to programming robotic applications by using the Microsoft Robotics Studio. Ideal for programmers familiar with Windows based development using Microsoft Visual Studio and the Microsoft .NET Framework, this guide ...

Sara Morgan

2008-03-01T23:59:59.000Z

29

Microsoft Windows Embedded Compact Cryptographic ...  

Science Conference Proceedings (OSTI)

Page 1. Microsoft Windows Cryptographic Primitives Library (bcrypt.dll) Security Policy Document ... Microsoft Windows Embedded Compact ...

2013-08-07T23:59:59.000Z

30

Internet Fish  

E-Print Network (OSTI)

I have invented "Internet Fish," a novel class of resource-discovery tools designed to help users extract useful information from the Internet. Internet Fish (IFish) are semi-autonomous, persistent information brokers; ...

LaMacchia, Brian A.

1996-08-01T23:59:59.000Z

31

Microsoft Word - Internet Write-Up.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sandia National Laboratories Sandia National Laboratories Nuclear Weapons Safety Program (U) DOE/IG-0799 July 2008 The following is an unclassified summary of the classified Audit Report on "Sandia National Laboratories Nuclear Weapons Safety Program (DOE/IG-0799, July 31, 2008) BACKGROUND Nuclear weapons safety is of paramount importance to U.S. security. The Department of Energy's National Nuclear Security Administration (NNSA) requires that design features minimizing the possibility of accidental or inadvertent nuclear detonation be incorporated in all nuclear weapons. Although ultimate responsibilities for nuclear weapons safety rests with Federal managers, NNSA's Sandia National Laboratories, a contractor-operated entity, produces independent safety assessments to identify nuclear weapons safety issues. Sandia's Nuclear Safety

32

Microsoft Word - test | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

test Microsoft Word - test Microsoft Word - test More Documents & Publications Interested Parties - WAPA Public Comment InterestedPartiesCOPSCoWAPA040309.pdf Microsoft Word -...

33

Dynamic resource management of cloud-hosted internet applications  

Science Conference Proceedings (OSTI)

Internet is evolving toward service-oriented computing platforms (e.g., cloud computing platforms, such as Amazon EC2 and Microsoft Azure). In these platforms, service providers (owners of the platforms) offer resource pools by building multiple geo-distributed ...

Hangwei Qian / Michael Rabinovich

2012-01-01T23:59:59.000Z

34

Microsoft Word - PMCDP Course Curriculum Registration Guidelines...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Course Curriculum Registration Guidelines 2 Microsoft Word - PMCDP Course Curriculum Registration Guidelines 2 Microsoft Word - PMCDP Course Curriculum Registration Guidelines...

35

T-599: Microsoft April 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

99: Microsoft April 2011 Security Bulletin Release 99: Microsoft April 2011 Security Bulletin Release T-599: Microsoft April 2011 Security Bulletin Release April 11, 2011 - 5:24am Addthis PROBLEM: Microsoft April 2011 Security Bulletin Release PLATFORM: Microsoft Windows, Microsoft Office, Microsoft Server Software, and Microsoft Developer Tools and Software ABSTRACT: Microsoft released 17 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 9 Critical vulnerabilities which require a restart after the applied patch. reference LINKS: Microsoft Security Bulletin Advance Notification for April 2011 Microsoft Security April Affected Software TechNet Webcast: Information About Microsoft April Security Bulletins IMPACT ASSESSMENT: High Discussion:

36

Guide to Microsoft Volume Licensing June 2013 i  

E-Print Network (OSTI)

Guide to Microsoft Volume Licensing June 2013 i Guide to Microsoft Volume Licensing #12;Guide to Microsoft Volume Licensing June 2013 ii Table of Contents Chapter 1: Introduction to Microsoft Volume................................................................................................................................................................ 1 Keys to Understanding Microsoft Volume Licensing

Narasayya, Vivek

37

Internet 0  

E-Print Network (OSTI)

The Internet is currently unsuitable for small devices because the assumptions behind its architecture for desktop and server computers do not scale down. Implementations and costs that apply to larger machines have a ...

Krikorian, Raffi Chant, 1978-

2004-01-01T23:59:59.000Z

38

Troubleshooting Microsoft Windows XP  

Science Conference Proceedings (OSTI)

From the Publisher:Troubleshooting Microsoft Windows XP provides fast answers to problems that can arise when using the Windows XP Home or Windows XP Professional operating system. The book addresses common issues with the new user interface, the taskbar ...

Stephen W. Sagman

2001-12-01T23:59:59.000Z

39

Microsoft CEP server and online behavioral targeting  

Science Conference Proceedings (OSTI)

In this demo, we present the Microsoft Complex Event Processing (CEP) Server, Microsoft CEP for short. Microsoft CEP is an event stream processing system featured by its declarative query language and its multiple consistency levels ...

M. H. Ali; C. Gerea; B. S. Raman; B. Sezgin; T. Tarnavski; T. Verona; P. Wang; P. Zabback; A. Ananthanarayan; A. Kirilov; M. Lu; A. Raizman; R. Krishnan; R. Schindlauer; T. Grabs; S. Bjeletich; B. Chandramouli; J. Goldstein; S. Bhat; Ying Li; V. Di Nicola; X. Wang; David Maier; S. Grell; O. Nano; I. Santos

2009-08-01T23:59:59.000Z

40

Components of Internet GIS  

E-Print Network (OSTI)

Internet GIS: a research field A research and application area that utilize Internet and other Internetworking systems to facilitate:

Imad Abugessaisa; M. Tsou

2007-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Microsoft Word - Cross Reference Matrix Introduction.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - Cross Reference Matrix Introduction.doc Microsoft Word - Cross Reference Matrix Introduction.doc Microsoft Word - Cross Reference Matrix Introduction.doc More...

42

Microsoft Word - FWP- Fact Sheet.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Microsoft Word - FOA cover sheet.doc Microsoft Word - National Science Bowl Fact Sheet.doc Microsoft Word - National Science Bowl Fact Sheet.doc...

43

Microsoft Word - CERFDOE Final Report - 071204.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERFDOE Final Report - 071204.doc Microsoft Word - CERFDOE Final Report - 071204.doc Microsoft Word - CERFDOE Final Report - 071204.doc More Documents & Publications Microsoft Word...

44

Microsoft Word - 338M_Geothermal_Project_Descriptions | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Marketing Administration Other Agencies You are here Home Microsoft Word - 338MGeothermalProjectDescriptions Microsoft Word - 338MGeothermalProjectDescriptions Microsoft...

45

Modeling the World from Internet Photo Collections  

Science Conference Proceedings (OSTI)

There are billions of photographs on the Internet, comprising the largest and most diverse photo collection ever assembled. How can computer vision researchers exploit this imagery? This paper explores this question from the standpoint of 3D scene modeling ... Keywords: 3D navigation, 3D scene analysis, Internet imagery, Photo browsers, Structure from motion

Noah Snavely; Steven M. Seitz; Richard Szeliski

2008-11-01T23:59:59.000Z

46

Microsoft Word - al2005-06.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - al2005-06.doc Microsoft Word - al2005-06.doc More Documents & Publications Microsoft Word - AL2006-01.doc OPAM Policy Acquisition Guides Microsoft Word - AL2005-08...

47

Development of Exploration Methods for Engineered Geothermal...  

Open Energy Info (EERE)

Not Provided DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Development of Exploration Methods for Engineered Geothermal Systems through...

48

Development of Exploration Methods for Engineered Geothermal...  

Open Energy Info (EERE)

2013 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Development of Exploration Methods for Engineered Geothermal Systems Through...

49

Microsoft Word - Rev5functionalaccountabilityimplementationplan...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - Rev5functionalaccountabilityimplementationplan..doc More Documents & Publications Microsoft Word - AL2007-01.doc Policy Flash 2012-54 OPAM Policy Acquisition Guides...

50

Antikerezeption im Internet.  

E-Print Network (OSTI)

??Die Dissertation 'Antikerezeption im Internet' untersucht, wie das Wissen ber die Antike im Medium Internet erscheint. Zunchst wird mit Rekurs auf die konstruktivistische Systemtheorie ein (more)

Bechthold-Hengelhaupt, Tilman

2012-01-01T23:59:59.000Z

51

Record Sheet For The Internet  

NLE Websites -- All DOE Office Websites (Extended Search)

Record Sheet for Internet Information Student Names Brief Description of Information Internet URL...

52

DISCOVER. LEARN. CONNECT. Microsoft Dynamics  

E-Print Network (OSTI)

integrated data structure, business intelligence, and data mining. DynAA strives to provide you Enterprise Resource Planning integrated data structure, business intelligence, and data mining. DynAA strives or Microsoft Business Solutions ApS in the United States and/or other countries. Microsoft Business Solutions

Narasayya, Vivek

53

Memo to Skip Laitner of EPA: initial comments on "The internet begins with coal"  

E-Print Network (OSTI)

The Internet Begins with Coal: A Preliminary Exploration ofMark P. Mills. 1999. "Dig more coalthe PCs are coming." Inon "The Internet Begins with Coal" cc: Mark P. Mills, Rob

Koomey, Jonathan G.

2008-01-01T23:59:59.000Z

54

Strategy formulation by internet entrepreneurs.  

E-Print Network (OSTI)

??[Truncated abstract] Poor strategy development by Internet entrepreneurs has been linked to the failure of Internet firms. Unfortunately, little is known about successful Internet entrepreneurs (more)

Mahadim, Batiah

2011-01-01T23:59:59.000Z

55

Microsoft Word - IIPS User Manual 3-7.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

that supports Java scripts such as Netscape 7.x or Internet Explorer 6.x For those who plan to submit proposals through IIPS, the only web browsers that currently support file...

56

News: Microsoft RMS to protect "Digital Rights"  

Science Conference Proceedings (OSTI)

Dario Forte In the second half of this year, Microsoft will release the beta code of a new technology called RMS (Rights Management Services). According to Microsoft technicians this technology should be able to allow application of policies to safeguard ...

2003-07-01T23:59:59.000Z

57

Reading Comprehension - Internet Safety  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Safety Twenty hours days weeks years ago, kids in school had never even heard of the internet. Now, I'll bet you can't find a single person in your school who...

58

Microsoft Windows Server 2008 Administrator Series  

E-Print Network (OSTI)

Microsoft Windows Server 2008 Administrator Series Led by: Dianne Burke, MCSE and UM Faculty Member emergency such as a medical emergency to drop out of either one of Windows Server 2008 class before on Microsoft Windows Server 2008. The series prepares IT Professionals for the Microsoft Certified Technology

Crone, Elizabeth

59

Internet Control Architecture for Internet-Based Personal Robot  

Science Conference Proceedings (OSTI)

This paper proposes a novel direct internet control architecture for internet-based personal robot, which is insensitive to the inherent internet time delay. The personal robot can be controlled using a simulator provided at a local site. Since the internet ... Keywords: internet control, internet interface, personal robot, remote control, telerobotics

Kuk-Hyun Han; Sinn Kim; Yong-Jae Kim; Jong-Hwan Kim

2001-03-01T23:59:59.000Z

60

from Microsoft's Bill Gates. Summer  

NLE Websites -- All DOE Office Websites (Extended Search)

Power surge (page 2) Developing fuel for next- generation nuclear reactors, with backing from Microsoft's Bill Gates. Summer fun (pages 4-5) All aboard a bus or train and tour Y-12...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Microsoft Word - AL2005-16.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6.doc Microsoft Word - AL2005-16.doc Microsoft Word - AL2005-16.doc More Documents & Publications Microsoft Word - AL2005-10.doc Audit Report: IG-0860 Policy Flash 2013-33...

62

Microsoft PowerPoint - 05 Okonski final Project Management Workshop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Slides O'Konski More Documents & Publications Microsoft PowerPoint - 09 Lehman final 1003 SC PM Workshop Microsoft PowerPoint - ShanasBioSlides121307 Microsoft PowerPoint -...

63

Microsoft Word - AL2005-08.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - AL2005-08.doc Microsoft Word - AL2005-08.doc More Documents & Publications Attachment FY2011-28 OPAM OPAM Policy Acquisition Guides Microsoft Word - al2004-03...

64

Microsoft Word - al2007-11.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - al2007-11.doc Microsoft Word - al2007-11.doc More Documents & Publications Attachment FY2011-28 OPAM Microsoft Word - AL2005-08.doc OPAM Policy Acquisition Guides...

65

Microsoft Word - AL2005-12.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - AL2005-12.doc Microsoft Word - AL2005-12.doc More Documents & Publications Microsoft Word - AL2005-11.doc Policy Flash 20012-15 OPAM Policy Acquisition Guides...

66

Microsoft Word - al2004-03.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - al2004-03.doc Microsoft Word - al2004-03.doc More Documents & Publications Microsoft Word - AL2005-08.doc Attachment FY2011-28 OPAM OPAM Policy Acquisition Guides...

67

Microsoft Word - AL2006-01.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - AL2006-01.doc Microsoft Word - AL2006-01.doc More Documents & Publications Microsoft Word - al2005-06.doc Attachment FY2011-28 OPAM OPAM Policy Acquisition Guides...

68

Business Intelligence in Microsoft SharePoint 2010, 1st edition  

Science Conference Proceedings (OSTI)

Dive into the business intelligence (BI) features in SharePoint 2010and use the right combination of tools to deliver compelling solutions. This practical guide helps you explore several BI application services available in SharePoint 2010 and Microsoft ...

Norm Warren; Mariano Teixeira Neto; John Campbell; Stacia Misner

2011-05-01T23:59:59.000Z

69

Online Harassment in Context: Trends From Three Youth Internet  

E-Print Network (OSTI)

Objective: The current study examines an increase in youth online harassment over the last decade in order to better explore the implications of the trend for prevention initiatives. Method: The Youth Internet Safety Surveys (YISSs) involved 3 crosssectional, nationally representative telephone surveys of 4,561 youth Internet users,

Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor; Lisa M. Jones; Kimberly J. Mitchell; David Finkelhor

2012-01-01T23:59:59.000Z

70

Impact of Internet Literacy, Internet Addiction Symptoms, and Internet Activities on Academic Performance  

Science Conference Proceedings (OSTI)

This study examines the interrelationships among Internet literacy, Internet addiction symptoms, Internet activities, and academic performance. Data were gathered from a probability sample of 718 children and adolescents, aged 9-19, in Hong Kong, using ... Keywords: Internet activities, Internet addiction symptoms, Internet literacy, academic performance, adolescents and children

Louis Leung; Paul S. N. Lee

2012-11-01T23:59:59.000Z

71

Microsoft Word - Turbine Manufactures MOU FINAL_5-31-08_.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU FINAL5-31-08.doc Microsoft Word - Turbine Manufactures MOU...

72

Microsoft PowerPoint - 06 Crawley Drive for Net Zero Energy Commercial...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - 06 Crawley Drive for Net Zero Energy Commercial Buildings Microsoft PowerPoint - 06 Crawley Drive for Net Zero Energy Commercial Buildings Microsoft...

73

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_MAINTAIN...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

MAINTAINPROJECTHISTORY.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialMAINTAINPROJECTHISTORY.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS...

74

Microsoft Word - 564M_Biomass_Project Descriptions FINAL 120409...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 Microsoft Word - 564MBiomassProject Descriptions FINAL 120409 More...

75

Microsoft Word - National Policy AssurancesAwardTermsREVJuly2005...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - National Policy AssurancesAwardTermsREVJuly2005.doc Microsoft Word - National Policy AssurancesAwardTermsREVJuly2005.doc More Documents & Publications Microsoft Word -...

76

Microsoft Word - National Science Bowl Fact Sheet.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Science Bowl Fact Sheet.doc Microsoft Word - National Science Bowl Fact Sheet.doc Microsoft Word - National Science Bowl Fact Sheet.doc More Documents & Publications...

77

Microsoft Word - Fact Sheet Environment 100808 FINAL.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc Microsoft Word - Fact Sheet Environment 100808 FINAL.doc More Documents & Publications...

78

Microsoft Word - PeerReview_SAR.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

& Publications Microsoft Word - PeerReviewCCSP.doc Microsoft Word - Cross Reference Matrix Introduction.doc DRAFT NEPA Guidance on Consideration of the Effects of Climate Change...

79

Microsoft Word - Cross Reference Matrix Introduction.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cross Reference Matrix Introduction.doc Microsoft Word - Cross Reference Matrix Introduction.doc Microsoft Word - Cross Reference Matrix Introduction.doc More Documents &...

80

Microsoft Word - PMCDP Curriculum Map Jan 2010 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PMCDP Curriculum Map Jan 2010 Microsoft Word - PMCDP Curriculum Map Jan 2010 Microsoft Word - PMCDP Curriculum Map Jan 2010 More Documents & Publications PMCDP Curriculum Map...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Microsoft Word - ColleageConsultingWO | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - ColleageConsultingWO More Documents & Publications Microsoft Word - PMCDP Curriculum Map Jan 2010 Microsoft Word - PMCDP Jan10 Catalog rev6 Professional Skills Program...

82

EERE Template for Microsoft Word Document Standard Cover and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE Template for Microsoft Word Document Standard Cover and Second Page EERE Template for Microsoft Word Document Standard Cover and Second Page This template was designed for...

83

Microsoft PowerPoint - Overview Briefing - Tab 1 DOE's Procurement...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Other Agencies You are here Home Microsoft PowerPoint - Overview Briefing - Tab 1 DOE's Procurement System July 2008 Microsoft PowerPoint - Overview Briefing - Tab 1...

84

Microsoft Word - Chapter 10_2006_Jun | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

102006Jun Microsoft Word - Chapter 102006Jun Microsoft Word - Chapter 102006Jun More Documents & Publications Policy Flash 2012-8 CHAPTER 3 OPAM Policy Acquisition Guides...

85

Microsoft Word - Chapter 10_2006_Jun | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - Chapter 102006Jun Microsoft Word - Chapter 102006Jun More Documents & Publications Policy Flash 2012-8 OPAM Policy Acquisition Guides Policy Flash 2011-103...

86

Microsoft PowerPoint - IGCA Training 2011-OPAM | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Training 2011-OPAM Microsoft PowerPoint - IGCA Training 2011-OPAM IGCA Inventory Data Collection Tool Training 2011 Microsoft PowerPoint - IGCA Training 2011-OPAM More...

87

Microsoft Word - IGCA Inventory Sub Guide 031611 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IGCA Inventory Sub Guide 031611 Microsoft Word - IGCA Inventory Sub Guide 031611 Microsoft Word - IGCA Inventory Sub Guide 031611 More Documents & Publications Job Counting...

88

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESSTutorial_ROTATION...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc Microsoft Word - APRIL 2009 PMCDP Module CHRIS ESS TutorialROTATIONWITHINDUSTRY.doc...

89

T-557: Microsoft Office Excel Office Art Object Parsing Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office...

90

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28,...

91

Microsoft Word - 1 Million Electric Vehicle Report Final | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 Million Electric Vehicle Report Final Microsoft Word - 1 Million Electric Vehicle Report Final Microsoft Word - 1 Million Electric Vehicle Report Final More Documents &...

92

Microsoft PowerPoint - Tsinghua Slideshow final for distribution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PowerPoint - Tsinghua Slideshow final for distribution (2) Microsoft PowerPoint - Tsinghua Slideshow final for distribution (2) Microsoft PowerPoint - Tsinghua Slideshow final for...

93

Microsoft Word - Horizon Wind Energy Comments.docx | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx More Documents & Publications Before the...

94

Microsoft Word - Horizon Wind Energy Comments.docx | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx Microsoft Word - Horizon Wind Energy Comments.docx More Documents & Publications Before...

95

Internet Routing Algorithms, Transmission and Time: Toward a Concept of Transmisive Control.  

E-Print Network (OSTI)

??This dissertation develops the concept of transmissive control to explore the consequences of changes in Internet routing for communication online. Where transmission often denotes an (more)

McKelvey, Fenwick Robert

2013-01-01T23:59:59.000Z

96

Standards as interdependent artifacts : the case of the Internet  

E-Print Network (OSTI)

This thesis has explored a new idea: viewing standards as interdependent artifacts and studying them with network analysis tools. Using the set of Internet standards as an example, the research of this thesis includes the ...

Hsieh, Mo-Han

2008-01-01T23:59:59.000Z

97

The consumer Internet in South Korea : an American's perspective  

E-Print Network (OSTI)

This thesis will explore the consumer internet industry in South Korea from the perspective of an American with Western values and sensibilities. South Korea is widely considered to be one of the most connected and ...

Byun, Jeffrey

2008-01-01T23:59:59.000Z

98

Search and Product Differentiation at an Internet Shopbot  

E-Print Network (OSTI)

Price dispersion among commodity goods is typically attributed to consumer search costs. We explore the magnitude of consumer search costs using a data set obtained from a major Internet shopbot. For the median consumer, ...

Brynjolfsson, Erik

2004-03-05T23:59:59.000Z

99

Hyperspectral mineral mapping in support of geothermal exploration...  

Open Energy Info (EERE)

2004 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Hyperspectral mineral mapping in support of geothermal exploration- Examples...

100

Exploration and Development at Dixie Valley, Nevada- Summary...  

Open Energy Info (EERE)

2007 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Exploration and Development at Dixie Valley, Nevada- Summary of Doe Studies...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Exploration and Development Techniques for Basin and Range Geothermal...  

Open Energy Info (EERE)

Council, 2002 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Exploration and Development Techniques for Basin and Range Geothermal...

102

Egs Exploration Methodology Project Using the Dixie Valley Geothermal...  

Open Energy Info (EERE)

2013 DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link for Egs Exploration Methodology Project Using the Dixie Valley Geothermal...

103

T-553: Microsoft February 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Microsoft February 2011 Security Bulletin Release 53: Microsoft February 2011 Security Bulletin Release T-553: Microsoft February 2011 Security Bulletin Release February 9, 2011 - 7:28am Addthis PROBLEM: Microsoft February 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms. (Affected Software and Download Locations) ABSTRACT: Microsoft released 21 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 3 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference links: Microsoft Security Bulletin Summary for February 2011 Microsoft Technical Security Notifications

104

U-124: Microsoft Security Bulletin Advance Notification for March 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

24: Microsoft Security Bulletin Advance Notification for March 24: Microsoft Security Bulletin Advance Notification for March 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 March 14, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is

105

U-103: Microsoft Security Bulletin Advance Notification for February 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: Microsoft Security Bulletin Advance Notification for 03: Microsoft Security Bulletin Advance Notification for February 2012 U-103: Microsoft Security Bulletin Advance Notification for February 2012 February 15, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for February 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for February 2012. Microsoft has posted 6 Critical Bulletins and 5 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a

106

U-164: Microsoft Security Bulletin Advance Notification for May 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

64: Microsoft Security Bulletin Advance Notification for May 64: Microsoft Security Bulletin Advance Notification for May 2012 U-164: Microsoft Security Bulletin Advance Notification for May 2012 May 8, 2012 - 7:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2012. PLATFORM: Windows XP Service Pack 3, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, Microsoft Visio Viewer 2010 and Microsoft Visio Viewer 2010 Service Pack 1, Microsoft SharePoint Server, Microsoft Silverlight ABSTRACT: Microsoft Security Bulletin Advance Notification for May 2012. Microsoft has posted 3 Critical Bulletins and 4 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address

107

T-584: Microsoft March 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Microsoft March 2011 Security Bulletin Release 84: Microsoft March 2011 Security Bulletin Release T-584: Microsoft March 2011 Security Bulletin Release March 21, 2011 - 4:25pm Addthis PROBLEM: Microsoft March 2011 Security Bulletin Release PLATFORM: Please see the Microsoft listing for affected software and various Windows OS Platforms.(Affected Software and Download Locations) ABSTRACT: Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: Microsoft Security Bulletin Summary for March 2011 Microsoft Technical Security Notifications

108

Internet Users Glossary  

E-Print Network (OSTI)

Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard. Distribution of this memo is unlimited. There are many networking glossaries in existence. This glossary concentrates on terms which are specific to the Internet. Naturally, there are entries for some basic terms and acronyms because other entries refer to them. Acknowledgements This document is the work of the User Glossary Working Group of the

G. Malkin; Xylogics Inc; T. Laquey Parker

1993-01-01T23:59:59.000Z

109

Central Internet Database (CID)  

Office of Environmental Management (EM)

RADCM-13 Reports Central Internet Database CID Photo Banner RADCM-13 Archived Reports By State California Adobe PDF Document Colorado Adobe PDF Document Idaho Adobe PDF Document...

110

Internet Banking System Prototype  

E-Print Network (OSTI)

Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.

Alnaqeib, Rami; Jalab, Hamid A; Zaidan, M A; Hmood, Ali K

2010-01-01T23:59:59.000Z

111

Depleted UF6 Internet Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

DUF6 Guide DU Uses DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home Internet Resources Depleted UF6 Internet Resources Links...

112

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

113

Internet of Food  

Science Conference Proceedings (OSTI)

Today, more and more "things" have an IP identity and thus are able to communicate with each other though the Internet. According to the definition of WIKIPEDIA [1], The IP identity of things (or Internet of Things), refers to uniquely identifiable objects ...

Jean-Paul Kouma; Li Liu

2011-10-01T23:59:59.000Z

114

T-645: Microsoft Security Bulletin Advance Notification | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification 5: Microsoft Security Bulletin Advance Notification T-645: Microsoft Security Bulletin Advance Notification June 13, 2011 - 3:45pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on June 14, 2011. PLATFORM: Windows Operating System and Components, Microsoft Office Suites and Software, Microsoft Server Software, Microsoft Developer Tools and Software and Microsoft Security Software ABSTRACT: Microsoft provides the Microsoft Security Bulletin Advance Notification Service. This advance notification is intended to help our customers plan for effective deployment of security updates, and includes information about the number of new security updates being released, the software affected, severity levels of vulnerabilities, and information about any

115

T-724: Microsoft Security Advisory: Fraudulent digital certificates could  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

724: Microsoft Security Advisory: Fraudulent digital certificates 724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing T-724: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing September 22, 2011 - 12:45pm Addthis PROBLEM: Microsoft Security Advisory: Fraudulent digital certificates could allow spoofing. PLATFORM: Microsoft Untrusted Certificate Store: DigiNotar root certificates ABSTRACT: Microsoft has released a Microsoft security advisory about this issue for IT professionals. reference LINKS: MS Article ID: 2616676 Microsoft Security Advisory: 2607712 DOE-CIRC Tech Bulletin: T-706 IMPACT ASSESSMENT: Medium Discussion: The Microsoft update revokes the trust of the following DigiNotar root certificates by putting them in the Microsoft Untrusted Certificate Store:

116

T-665: Microsoft Security Bulletin Advance Notification for July 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for July 5: Microsoft Security Bulletin Advance Notification for July 2011 T-665: Microsoft Security Bulletin Advance Notification for July 2011 July 11, 2011 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2011 PLATFORM: Windows Operating System and Components ABSTRACT: Microsoft released 4 bulletins to address vulnerability involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. reference LINKS: TechNet Webcast Microsoft Security Bulletin Summaries and Webcasts Microsoft Security Bulletin Advance Notification for July 2011

117

TMS PostScript Instruction: Microsoft Windows  

Science Conference Proceedings (OSTI)

Please note that these instructions were built using Microsoft Windows 2000 ... This guide is designed to help authors using the Windows operating system to...

118

U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28: Microsoft Windows win32k.sys TrueType Font Parsing 28: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability U-028: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability November 7, 2011 - 8:15am Addthis PROBLEM: Microsoft Windows win32k.sys TrueType Font Parsing Vulnerability. PLATFORM: Microsoft Windows 7 Microsoft Windows Server 2003 Datacenter Edition Microsoft Windows Server 2003 Enterprise Edition Microsoft Windows Server 2003 Standard Edition Microsoft Windows Server 2003 Web Edition Microsoft Windows Server 2008 Microsoft Windows Storage Server 2003 Microsoft Windows Vista Microsoft Windows XP Home Edition Microsoft Windows XP Professional ABSTRACT: A vulnerability has been reported in Microsoft Windows, which can be exploited by malicious people to compromise a user's system. reference LINKS:

119

Energy Policy Forum to Discuss "Possible Solutions to High Gas...  

Gasoline and Diesel Fuel Update (EIA)

This presentation contains content that your browser may not be able to show properly. This presentation was optimized for more recent versions of Microsoft Internet Explorer. If...

120

NIST SP 800-83 Rev. 1, Guide to Malware Incident Prevention ...  

Science Conference Proceedings (OSTI)

... Multiple brands of Web browsers (eg, Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, Opera) can be installed on a single ...

2013-07-19T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Guide to Malware Incident Prevention and Handling for ...  

Science Conference Proceedings (OSTI)

... Multiple brands of Web browsers (eg, Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Google Chrome, Opera) can be installed on a single ...

2013-07-19T23:59:59.000Z

122

DNA Analyst Training on Mixture Interpretation  

Science Conference Proceedings (OSTI)

... In order to access the event, you must have either Microsoft Internet Explorer 6.0+ or Mozilla Firefox 3+ browser for Windows operating systems. ...

2013-05-28T23:59:59.000Z

123

Emerging Trends in Synthetic Drugs Workshop  

Science Conference Proceedings (OSTI)

... In order to access the event, you must have either Microsoft Internet Explorer 6.0+ or Mozilla Firefox 3+ browser for Windows operating systems. ...

2013-05-28T23:59:59.000Z

124

Background:  

NLE Websites -- All DOE Office Websites (Extended Search)

TABLE OF CONTENTS Recommended Browsers for iSupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended...

125

Microsoft Visual C# 2005 Unleashed  

Science Conference Proceedings (OSTI)

Setting the standard for a premium C# reference, Microsoft Visual C# 2005 Unleashed provides practical examples for virtually every aspect of the C# programming language. The book is structured for progressive learning, so it can be read cover-to-cover ...

Kevin Hoffman

2005-12-01T23:59:59.000Z

126

Airborne Internet : market & opportunity  

E-Print Network (OSTI)

The purpose of this thesis to evaluate the opportunity for service provider entry and of the airborne internet, to analyze the disruptive impact technology used by AirCell and AeroSat has had on the development of an ...

Bhadouria, Anand

2007-01-01T23:59:59.000Z

127

Internet Topology over Time  

E-Print Network (OSTI)

There are few studies that look closely at how the topology of the Internet evolves over time; most focus on snapshots taken at a particular point in time. In this paper, we investigate the evolution of the topology of the Autonomous Systems graph of the Internet, examining how eight commonly-used topological measures change from January 2002 to January 2010. We find that the distributions of most of the measures remain unchanged, except for average path length and clustering coefficient. The average path length has slowly and steadily increased since 2005 and the average clustering coefficient has steadily declined. We hypothesize that these changes are due to changes in peering policies as the Internet evolves. We also investigate a surprising feature, namely that the maximum degree has changed little, an aspect that cannot be captured without modeling link deletion. Our results suggest that evaluating models of the Internet graph by comparing steady-state generated topologies to snapshots of the real data ...

Edwards, Benjamin; Stelle, George; Forrest, Stephanie

2012-01-01T23:59:59.000Z

128

ViDe White Paper Evaluating Microsoft  

E-Print Network (OSTI)

ViDe White Paper Evaluating Microsoft® Exchange 2000 Conferencing Server for use in Higher UNRELATED TO CURRENT TRENDS IN VIDEOCONFERENCING OR IN MICROSOFT PRODUCTS. September 2003 #12;White Paper, Australian National University Support for this White Paper activity was provided by Southeastern

Tennessee, University of

129

T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow  

NLE Websites -- All DOE Office Websites (Extended Search)

65: Vulnerability in Microsoft Malware Protection Engine Could 65: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability February 25, 2011 - 7:40am Addthis PROBLEM: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability. PLATFORM: Microsoft Malware Protection Engine Last version of the Microsoft Malware Protection Engine affected by this vulnerability: Version 1.1.6502.0 This version is the last version of the Microsoft Malware Protection Engine that is affected by the vulnerability. First version of the Microsoft Malware Protection Engine with this vulnerability addressed:Version 1.1.6603.0 If the version of the Microsoft Malware Protection Engine is equal to or

130

T-533: Microsoft January 2011 Security Bulletin Release | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft January 2011 Security Bulletin Release 3: Microsoft January 2011 Security Bulletin Release T-533: Microsoft January 2011 Security Bulletin Release January 12, 2011 - 2:25pm Addthis PROBLEM: Microsoft January 2011 Security Bulletin Release PLATFORM: Various Windows OS Platforms, Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and Windows Server 2008 R2 ABSTRACT: Microsoft released 2 bulletins to address 3 vulnerabilities involving Microsoft Windows and components in Windows OS, and Windows Server Releases. Only 1 of these bulletins get our maximum severity rating of Critical. reference LINKS: Microsoft Security Bulletin Advance Notification for December 2010 TechNet Webcast: Information About Microsoft January 2011 Security Bulletins Discussion: Microsoft Security Bulletin MS11-001 - Important CVE-2010-3145 - This

131

Microsoft Word - Document5  

NLE Websites -- All DOE Office Websites (Extended Search)

as VRML, Java * Available on low cost platforms * Technology applicable to interactive information retrieval and data exploration Conclusion Mission * Work closely with NERSC...

132

Characterizing internet scams through underground infrastructure infiltration  

E-Print Network (OSTI)

Charac- terizing Internet Scam Hosting Infrastructure. In2010. [29] Ironport. 2008 Internet Security Trends. http://DrugRevenue) emerge as major Internet threats. http://

Kanich, Christopher William

2012-01-01T23:59:59.000Z

133

Graph Algorithms in the Internet Age  

E-Print Network (OSTI)

given expected degrees. Internet Mathematics, 1(1), 2003. [law relationships of the internet topology. SIGCOMM, pagesto generate annotated internet topologies. SIGCOMM, pages [

Stanton, Isabelle Lesley

2012-01-01T23:59:59.000Z

134

T-687: Microsoft Security Bulletin Advance Notification for August 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

87: Microsoft Security Bulletin Advance Notification for August 87: Microsoft Security Bulletin Advance Notification for August 2011 T-687: Microsoft Security Bulletin Advance Notification for August 2011 August 8, 2011 - 3:50pm Addthis PROBLEM: This is an advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Advance Notification for August 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: An advance notification of security bulletins that Microsoft is intending to release on August 9, 2011. 12 Bulletin updates and two are considered 'Critical'. Impact: This advance notification provides a number as the bulletin identifier,

135

Microsoft Word - EERE PSRP 7 23 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 Microsoft Word - EERE PSRP 7 23 2010 More Documents & Publications Office of Energy Efficiency and Renewable Energy Program...

136

Microsoft Word - GJPPGPracticesDraft.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - GJPPGPracticesDraft.doc More Documents & Publications 1 Biofuels & Greenhouse Gas Emissions: Myths versus Facts Microsoft Word - 47C468D4-69BA-281F40.doc...

137

Microsoft PowerPoint - Executive Order13423rbl | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - Executive Order13423rbl More Documents & Publications Microsoft PowerPoint - DonsSlides121307 OPAM Policy Acquisition Guides AttachmentFlash2010-39.pdf...

138

Microsoft Word - AL2005-07.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AL2005-07.doc Microsoft Word - AL2005-07.doc More Documents & Publications Microsoft Word - AL2006-07.doc OPAM Policy Acquisition Guides Applications for Certification (Purchasing)...

139

Microsoft PowerPoint - GNEP PARTNERS CANDIDATE PARTNERS AND OBSERVERS...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications GNEP Partners and Observers Microsoft PowerPoint - 5.3 Item 01 Top Kill Operation Status 09 June 1400.pptx Microsoft PowerPoint - Book and Journal Formsv2wButton.ppt...

140

Precursor or Sequela: Pathological Disorders in People with Internet Addiction Disorder  

E-Print Network (OSTI)

Background: This study aimed to evaluate the roles of pathological disorders in Internet addiction disorder and identify the pathological problems in IAD, as well as explore the mental status of Internet addicts prior to addiction, including the pathological traits that may trigger Internet addiction disorder. Methods and Findings: 59 students were measured by Symptom CheckList-90 before and after they became addicted to the Internet. A comparison of collected data from Symptom Checklist-90 before Internet addiction and the data collected after Internet addiction illustrated the roles of pathological disorders among people with Internet addiction disorder. The obsessive-compulsive dimension was found abnormal before they became addicted to the Internet. After their addiction, significantly higher scores were observed for dimensions on depression, anxiety, hostility, interpersonal sensitivity, and psychoticism, suggesting that these were outcomes of Internet addiction disorder. Dimensions on somatisation, paranoid ideation, and phobic anxiety did not change during the study period, signifying that these dimensions are not related to Internet addiction disorder. Conclusions: We can not find a solid pathological predictor for Internet addiction disorder. Internet addiction disorder may

Guangheng Dong; Qilin Lu; Hui Zhou; Xuan Zhao

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Internet Evolution and Social Impact  

E-Print Network (OSTI)

Earlier HomeNet publications reported small but reliable negative effects of using the Internet on measures of social involvement and psychological well-being among new Internet users in a sample of Pittsburgh families in 1995--1996. The effects were called a "paradox" because participants in the sample used the Internet heavily for communication, which typically has positive effects on well-being. Since that first study, the Internet changed markedly, giving people much greater choice of contacts, activities, and information.

Sara Kiesler; Robert Kraut; Jonathon Cummings; Vicki Helgeson; Anne Crawford

2002-01-01T23:59:59.000Z

142

Internet geolocation: Evasion and counterevasion  

Science Conference Proceedings (OSTI)

Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to ... Keywords: Internet geolocation, Tor, adversarial environment, anonymizing network, evasion

James A. Muir; Paul C. Van Oorschot

2009-12-01T23:59:59.000Z

143

An intermittent energy internet architecture  

Science Conference Proceedings (OSTI)

We examine how to re-design the Internet for an energy-constrained future powered by diffuse, intermittent, and expensive power sources. We consider the types of constraints this might place upon the Internet architecture and the manner in which important ... Keywords: energy, internet architecture

Barath Raghavan; David Irwin; Jeannie Albrecht; Justin Ma; Adam Streed

2012-05-01T23:59:59.000Z

144

IPS - Secure Internet Payment System  

Science Conference Proceedings (OSTI)

There are a number of questions one might ask about security of money transactions on the Internet. A first question might be: "Why do we need to protect money transaction on the Internet?" The Internet is an insecure and unreliable communication medium ...

Zoran Djuric

2005-04-01T23:59:59.000Z

145

70-620 MCTS: Windows Vista Configuration MicrosoftMicrosoft Certified Technology Specialist Exam 70-620 Set  

Science Conference Proceedings (OSTI)

This Microsoft Official Academic Course prepares the student for the new Microsoft Certified Technology Specialist examination, 70-620. It is a complete program of textbook, lab manual and software, and provides the beginning information and hands-on ...

Microsoft Official Academic Course

2010-03-01T23:59:59.000Z

146

Microsoft Word - updated Recipient Webinar Transcript - Contractor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

under 'Download Templates", Microsoft Excel, you just double-click on that. You get a zip folder with two separate files in it, one for grant recipients and one for contractors....

147

Microsoft Word - Policy Flash_2010-02_Deputy_FPD_Certification...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - Policy Flash 2008-06.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCurriculumFINAL.doc Microsoft Word - PolicyFlash 0901L1Safetycourse...

148

Microsoft Word - Policy_Flash_ 09_01_L1_Safety_course.doc | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - PolicyFlash 0903ACOR.doc Microsoft Word - PolicyFlash0902InterimCertification.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc...

149

Microsoft PowerPoint - 16.1045_Peer Reviews Panel_Lehman Workshop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

w-headings More Documents & Publications Microsoft PowerPoint - 09 Lehman final 1003 SC PM Workshop Microsoft PowerPoint - 15.1615Cost Estimating Panel Microsoft PowerPoint -...

150

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft PowerPoint - Nov 2009 PI Org Chart (web) Microsoft PowerPoint - Nov 2009 PI Org Chart (web) PI Organization chart Microsoft PowerPoint - Nov 2009 PI Org Chart (web) More...

151

VPNClientInstallationandSetupGuide-MC.pdf  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

both 32 and 64-bit versions. System Requirements Microsoft Windows If you are using Internet Explorer, use version 5.0, Service Pack 2 or later. For WebLaunch, use Internet...

152

The English literature researcher in the age of the Internet  

Science Conference Proceedings (OSTI)

This study explores the extent to which the information seeking behaviour of researchers active in the field of English Literature in the universities of the UK and the wider world has changed as a result of the developing electronic information revolution. ... Keywords: English literature, Internet, electronic information sources, humanities researchers, information seeking

David Ellis; Hanna Oldman

2005-02-01T23:59:59.000Z

153

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

154

Microsoft PowerPoint - 16.1330_Rimando 110316 rev3 [Compatibility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 15.1500Michael Deane Compatibility Mode Microsoft PowerPoint - 16.0805Tom Fox Compatibility Mode Microsoft PowerPoint - 03 Wyss Economic Outlook Compatibility...

155

Microsoft PowerPoint - 10 Lee LCLS Lessons Learned PM Workshop...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

revised - Harry Peters Compatibility Mode Microsoft PowerPoint - 15.1500Michael Deane Compatibility Mode Microsoft PowerPoint - 16.0805Tom Fox Compatibility Mode...

156

Microsoft PowerPoint - 15.1500_Michael Deane [Compatibility Mode...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Compatibility Mode More Documents & Publications Microsoft PowerPoint - 16.0805Tom Fox Compatibility Mode Microsoft PowerPoint - 16.1330Rimando 110316 rev3 Compatibility...

157

T-586: Microsoft Advisory about fraudulent SSL Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

586: Microsoft Advisory about fraudulent SSL Certificates 586: Microsoft Advisory about fraudulent SSL Certificates T-586: Microsoft Advisory about fraudulent SSL Certificates March 23, 2011 - 3:05pm Addthis PROBLEM: Microsoft just released an advisory alerting its customers that a total of 9 certificates were issued using the leaked/stolen CA certificated from Comodo. PLATFORM: These certificates affect the following Web properties: login.live.com mail.google.com www.google.com login.yahoo.com (3 certificates) login.skype.com addons.mozilla.org "Global Trustee" ABSTRACT: Microsoft Advisory about fraudulent SSL Certificates. reference LINKS: Microsoft Security Advisory: 2524375 ISC 2011-03-23 Security updates IMPACT ASSESSMENT: High Discussion: Microsoft is aware of nine fraudulent digital certificates issued by Comodo, a certification authority present in the Trusted Root Certification

158

T-717: Microsoft Security Bulletin Summary for September 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Security Bulletin Summary for September 2011 7: Microsoft Security Bulletin Summary for September 2011 T-717: Microsoft Security Bulletin Summary for September 2011 September 14, 2011 - 9:30am Addthis PROBLEM: Summary of Microsoft security bulletins released on September 13, 2011. PLATFORM: MS Windows Operating System and Components ABSTRACT: Microsoft Security Bulletin Summary for September 2011. reference LINKS: Microsoft Security Bulletin Microsoft Security Bulletin Summaries IMPACT ASSESSMENT: Medium Discussion: CVE-2011-1984 - MS11-070 WINS Local Elevation of Privilege Vulnerability CVE-2011-1991 - MS11-071 Windows Components Insecure Library Loading Vulnerability CVE-2011-1986 - MS11-072 Excel Use after Free WriteAV Vulnerability CVE-2011-1987 - MS11-072 Excel Out of Bounds Array Indexing Vulnerability

159

T-620: Microsoft Security Bulletin Advance Notification for May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-620: Microsoft Security Bulletin Advance Notification for May T-620: Microsoft Security Bulletin Advance Notification for May 2011 T-620: Microsoft Security Bulletin Advance Notification for May 2011 May 10, 2011 - 7:00am Addthis PROBLEM: Microsoft released 2 bulletins to address vulnerabilities involving Microsoft Windows Server and Microsoft Office. This Microsoft Bulletin contains 1 Critical vulnerability and 1 Important vulnerability which require a restart after the applied patches. PLATFORM: Windows Vista, Windows Vista Service Pack 1, and Windows Vista Service Pack 2, Windows Vista x64 Edition, Windows Vista x64 Edition Service Pack 1, and Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based

160

S kommer vi alltid in p internet; Everything concerns internet.  

E-Print Network (OSTI)

?? Internet har i ver 20 r pverkat samhllets frutsttningar, s ven skolans arbetsstt och undervisningssituation. Frndringarna i samhllssektorn avspeglar sig inte minst i samhllskunskapsmnet (more)

Dahlstrm, Tpp Ida

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Central Internet Database (CID) Home  

Office of Environmental Management (EM)

Banner Welcome to the updated Central Internet Database (CID) The CID is a gateway to waste management and facility information from current and archived Department of Energy...

162

Internet Security Glossary, Version 2  

E-Print Network (OSTI)

not specify an Internet standard of any kind. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The IETF Trust (2007).

R. Shirey

2006-01-01T23:59:59.000Z

163

Internet Support for Engaged Learning  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Support for Student Engagement in Science Skills and strategies students need to be successful today and in the future are effectively taught through engagement in...

164

A Comparison of Education, Business, and Engineering Undergraduate Students Internet Use and their Experience, Confidence, and Competence in Using New Literacies of the Internet  

E-Print Network (OSTI)

This study explored beginning and advanced pre-service teachers Internet use and their experience, confidence, and competence in using new literacies of the Internet. In addition, this study compared the pre-service teachers to same-aged business and engineering students. Through using an online survey, this study recruited 1350 students from the various disciplines. This study conducted comparisons between a) underclassmen across the three majors, b) seniors across the majors, and c) underclassmen and seniors within the majors. This study found that as digital natives, education, business, and engineering students used the Internet frequently. However, they were relatively unfamiliar with using new literacies of the Internet during their high school and university educational experiences. Overall, the three majors students were confident but they were not competent in using new literacies of the Internet including locating and evaluating information on the Internet. Comparisons between and within the majors revealed that education underclassmen were less confident and competent than engineering underclassmen peers and senior education students in evaluating information on the Internet. Education seniors were comparable to business and engineering seniors in their confidence and competence in both locating and evaluating information on the Internet. The findings imply that teacher educators need to understand the weaknesses of their pre-service teachers and provide them with appropriate opportunities and training to know how to effectively use and furthermore teach new literacies of the Internet.

Kim, Su Yeon

2011-05-01T23:59:59.000Z

165

Microsoft Word - lbrereleasefinal  

NLE Websites -- All DOE Office Websites (Extended Search)

Low Background Radiation Experiment Low Background Radiation Experiment Yields Interesting Preliminary Results CARLSBAD, N.M., May 18, 2011 - New Mexico State University's Low Background Radiation Experiment (LBRE), which takes place 2,150 feet below the earth's surface at the Waste Isolation Pilot Plant, recently released some results about the project's first two years of experimentation. The March 2011 edition of Health Physics printed an article titled "Exploring Biological Effects of Low Level Radiation from the Other Side of Background," summarizing some initial data taken from LBRE and from a sister experiment conducted at the Lovelace Respiratory Research Institute in Albuquerque. "It's nice that we got them published, but they are still very preliminary," said NMSU Professor

166

From the internet of computers to the internet of things  

Science Conference Proceedings (OSTI)

This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, we consider RFID and other important technological developments such as IP stacks and web servers ... Keywords: RFID, internet of things, smart objects, wireless sensor networks

Friedemann Mattern; Christian Floerkemeier

2010-01-01T23:59:59.000Z

167

Internet governance: A personal perspective  

Science Conference Proceedings (OSTI)

Internet governance is one of the hot issues that emerged during the World Summit on the Information Society (WSIS) in Tunis November 2005. The discussions did not start then but much earlier. This article gives an overview of the International Telecommunciation ... Keywords: ITU, WSIS, governance, internet

Houlin Zhao

2007-01-01T23:59:59.000Z

168

1 MICROSOFT.COM/CITIZENSHIP Microsoft on the Topic: Environmental Sustainability  

E-Print Network (OSTI)

Renewable Power: Microsoft's Mountain View, California campus generates 480 kilowatts from 2,288 solar panels covering more than 31,000 square feet of rooftop, and offsets 6 percent of its annual total energy

Narasayya, Vivek

169

INTERNET PRIVACY, IG-0493 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

here Home INTERNET PRIVACY, IG-0493 INTERNET PRIVACY, IG-0493 Recently enacted appropriations law required agency Inspectors General to report within 60 days on the collection...

170

Central Internet Database (CID)  

Office of Environmental Management (EM)

CID Reports > Archived CID Reports > Archived Reports Central Internet Database CID Photo Banner Archived Reports The reports in the Archived Reports section of the CID are based on the FY 2001 EM Corporate Database (except the Buried TRU Report). The EM Corporate database stores information on radioactive waste, contaminated media, and spent nuclear fuel by identifying "streams" of material. A "stream" is defined as a group of materials, media, or waste having similar origins or management requirements. Radioactive waste, contaminated media, or spent nuclear fuel may be part of more than one "stream" from the time it is generated to the time it is permanently disposed, depending on the physical location or the management activity it is undergoing. The CID retains the "stream" concept as part of its data structure.

171

T-547: Microsoft Windows Human Interface Device (HID) Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

547: Microsoft Windows Human Interface Device (HID) Vulnerability 547: Microsoft Windows Human Interface Device (HID) Vulnerability T-547: Microsoft Windows Human Interface Device (HID) Vulnerability February 1, 2011 - 3:20am Addthis PROBLEM Microsoft Windows Human Interface Device (HID) Vulnerability. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: Microsoft Windows does not properly warn the user before enabling additional Human Interface Device (HID) functionality over USB, which allows user-assisted attackers to execute arbitrary programs via crafted USB data, as demonstrated by keyboard and mouse data sent by malware on a Smartphone that the user connected to the computer. reference LINKS: Security Lab: Reference CVE-2011-0638 CVE Details: Reference CVE-2011-0638 Mitre Reference: CVE-2011-0638

172

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

613: Microsoft Excel Axis Properties Remote Code Execution 613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability May 2, 2011 - 7:42am Addthis PROBLEM: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fail to sufficiently validate user-supplied input. PLATFORM: Microsoft Excel (2002-2010) ABSTRACT: Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service

173

Microsoft Windows Server 2003 -palvelimen asentaminen ja kyttnotto yrityksess Postituspojat.  

E-Print Network (OSTI)

??Opinnytety toteutettiin yritysten Postituspojat ja HelmiTaito kanssa. Projektin tavoitteena oli saada Postituspojille toimiva uusi Microsoft Windows Server 2003 palvelinymprist. Uuden palvelinlaitteiston hankkiminen tuli Postituspojille ajankohtaiseksi (more)

Virtanen, Ilkka

2009-01-01T23:59:59.000Z

174

Microsoft Word - ACQUISITION LETTER.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - ACQUISITION LETTER.doc More Documents & Publications ACQUISITION LETTER DEAR Part 933 OPAM Policy Acquisition Guides Chapter 33 - Protests, Disputes and Appeals...

175

Stanford v. Roche, Microsoft and other Supreme Court Cases |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

other Supreme Court Cases Stanford v. Roche, Microsoft and other Supreme Court Cases LBNLDOE meeting0.pdf recentcaselaw lally drysdale.pdf More Documents & Publications...

176

Microsoft Word - FOA cover sheet.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Act: Training Program Development for Commercial Building Equipment Technicians, Building Operators, and Energy Commissioning AgentsAuditors" Microsoft Word - kDE-FOA-0000090.rtf...

177

V-196: Microsoft Security Bulletin Advance Notification for July...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

provides additional information about security in Microsoft products. Consumers can visit Security At Home, where this information is also available by clicking "Latest Security...

178

THE MICROSOFT JOURNAL FOR DEVELOPERS CUTTING EDGE  

E-Print Network (OSTI)

, Morgan Kaufmann, p. 294. 13.Weber S. (2004), The Internet, Chelsea House Publishers, p. 78. 14.White M. A

Fähndrich, Manuel A.

179

Oil & Natural Gas Projects Exploration and Production Technologies | Open  

Open Energy Info (EERE)

Oil & Natural Gas Projects Exploration and Production Technologies Oil & Natural Gas Projects Exploration and Production Technologies Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Oil & Natural Gas Projects Exploration and Production Technologies Author U.S. Department of Energy Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Oil & Natural Gas Projects Exploration and Production Technologies Citation U.S. Department of Energy. Oil & Natural Gas Projects Exploration and Production Technologies [Internet]. [cited 2013/10/15]. Available from: http://www.netl.doe.gov/technologies/oil-gas/Petroleum/projects/EP/Explor_Tech/P225.htm Retrieved from "http://en.openei.org/w/index.php?title=Oil_%26_Natural_Gas_Projects_Exploration_and_Production_Technologies&oldid=688583

180

Microsoft Silverlight 5 Building Rich Enterprise Dashboards  

Science Conference Proceedings (OSTI)

Create, customize and design rich enterprise dashboards with Microsoft Silverlight 5 book and eBook Overview With this book and e-book, learn how to create, customize and design rich enterprise dashboards with Silverlight Move from scenarios to requirements ...

Snyder Todd; Matthew Duffield; Jeffrey Smith; Joel Eden

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Microsoft VisualBasic.Net Professional Projects  

Science Conference Proceedings (OSTI)

From the Publisher:Incorporating five hands-on projects, Microsoft Visual Basic .NET Professional Projects is your key to unlocking the power of Visual Basic .NET. Each project focuses on a specific Visual Basic .NET concept and is based on a real-world ...

Kuljit Kaur; Pooja Bembey

2002-04-01T23:59:59.000Z

182

Microsoft SQL Azure Enterprise Application Development  

Science Conference Proceedings (OSTI)

Build enterprise-ready applications and projects with SQL Azure Develop large scale enterprise applications using Microsoft SQL Azure Understand how to use the various third party programs such as DB Artisan, RedGate, ToadSoft etc developed for SQL ...

Jayaram Krishnaswamy

2010-12-01T23:59:59.000Z

183

Research challenges towards the Future Internet  

Science Conference Proceedings (OSTI)

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture ... Keywords: Cognitive networks, Data and communication security, Future internet, Green networking, Internet architecture and protocols, Optical networks, System security, Wireless networks

Marco Conti; Song Chong; Serge Fdida; Weijia Jia; Holger Karl; Ying-Dar Lin; Petri Mhnen; Martin Maier; Refik Molva; Steve Uhlig; Moshe Zukerman

2011-12-01T23:59:59.000Z

184

Legal aspects of Internet governance reform  

Science Conference Proceedings (OSTI)

The Internet has moved on from its early almost lawless nature. There are now multiple organisations and legal aspects associated with Internet governance. Whether the issue on the Internet is network security, intellectual property rights (IPRs), e-commerce, ... Keywords: ICANN, WGIG, WSIS, cybercrime, framework, governance, internet, law, reform, treaty

David Satola

2007-01-01T23:59:59.000Z

185

Automated Personalization of Internet News  

Science Conference Proceedings (OSTI)

A systems approach to the automatic and adaptive personalization of Internet news is described. Implemented on the client side as a lightweight, transparent software system, this approach is based on implicit user feedback, thereby preserving privacy ...

Aditya V. Sunderam

2002-05-01T23:59:59.000Z

186

Underground Exploration  

E-Print Network (OSTI)

ultimately is chosen. The rationale is based on models that are backed by limited data obtained from G-Tunnel thermal testing. The G-Tunnel thermal tests were conducted over Exploration and Testing Strategies 9 9). Because no additional testing has been conducted since the G-Tunnel effort was terminated in 1989

187

Beyond the Hype of Frictionless Markets: Evidence of Heterogeneity in Price Rigidity on the Internet  

Science Conference Proceedings (OSTI)

We explore daily patterns of Internet pricing for the two major retailers, Amazon.com and Barnes and Noble (BN), using data on 377 books collected over a 449-day period in 2003-4. We frame this investigation in terms of a key question: How rigid are ... Keywords: Bookselling, E-Commerce, Economic Analysis, Empirical Regularities, Empirical Research, Internet Retailing, Price Rigidity, Strategic Pricing

Mark E. Bergen; Robert J. Kauffman; Dongwon Lee

2005-11-01T23:59:59.000Z

188

U-182: Microsoft Windows Includes Some Invalid Certificates | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

82: Microsoft Windows Includes Some Invalid Certificates 82: Microsoft Windows Includes Some Invalid Certificates U-182: Microsoft Windows Includes Some Invalid Certificates June 4, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Microsoft Windows. A remote user may be able to spoof code signing signatures. PLATFORM: Version(s): XP SP3, 2003 SP2, Vista SP2, 2008 SP2, 7 SP1, 2008 R2 SP1; and prior service packs ABSTRACT: The operating system includes some invalid intermediate certificates. The vulnerability is due to the certificate authorities and not the operating system itself. Reference Links: Security tracker ID 1027114 GENERIC-MAP-NOMATCH Vendor Advisory IMPACT ASSESSMENT: High Discussion: The invalid certificates and their thumbprints are: Microsoft Enforced Licensing Intermediate PCA: 2a 83 e9 02 05 91 a5 5f c6

189

Internet Slang and China's Social Culture: A Case Study of Internet Users in Guiyang.  

E-Print Network (OSTI)

??The number of Chinese Internet users has surpassed 300,000 people over the past decade, and the Internet boom has brought with it an upsurge in (more)

Draggeim, Alexandra V

2013-01-01T23:59:59.000Z

190

Internet Data Analysis for the Undergraduate Statistics Curriculum  

E-Print Network (OSTI)

Haythornthwaite edts. (2002). The Internet in Everyday Life.Where Mathematics meets the Internet. Notices of the AMS,Internet Data Analysis for the Undergraduate Statitics

Juana Sanchez; Yan He

2011-01-01T23:59:59.000Z

191

Internet Data logging and Display  

E-Print Network (OSTI)

The current energy savings technology relies on conventional data logging systems, in which two major barriers exist. Formost is the fact that retrieving the energy data is not convenient, and the cost of the data logging equipment is high. The solution presented here is to accomplish these goals is to include a miniature web server in a remote-logging module, which we designed as part of our device. Thus allowing data to be accessed more frequently, via the Internet. As it currently stands, the state of California in the United States is experiencing power grid problems as residential and industrial energy demands increase. If an energy savings program is to be implemented, then an energy monitoring strategy must also devised. Our Internet appliance provides a solution, and this paper summarizes our implementation details and provides a computer screen-capture of the data being posted onto the Internet.

Sweeney, J., Jr.; Culp, C.; Haberl, J. S.

2001-01-01T23:59:59.000Z

192

Internet ware cloud computing :Challenges  

E-Print Network (OSTI)

After decades of engineering development and infrastructural investment, Internet connections have become commodity product in many countries, and Internet scale "cloud computing" has started to compete with traditional software business through its technological advantages and economy of scale. Cloud computing is a promising enabling technology of Internet ware Cloud Computing is termed as the next big thing in the modern corporate world. Apart from the present day software and technologies, cloud computing will have a growing impact on enterprise IT and business activities in many large organizations. This paper provides an insight to cloud computing, its impacts and discusses various issues that business organizations face while implementing cloud computing. Further, it recommends various strategies that organizations need to adopt while migrating to cloud computing. The purpose of this paper is to develop an understanding of cloud computing in the modern world and its impact on organizations and businesse...

Qamar, S; Singh, Mrityunjay

2010-01-01T23:59:59.000Z

193

Internet Politics: Resist, Die, or Exploit?  

E-Print Network (OSTI)

In this paper, we disclose and explain Internet politics, an invisible hand that inherently affects Internet research. We show that it could cause significant underutilization of constructive research ideas and a vicious cycle of bias in mainstream research ideas. However, we also expose that it is possible to gradually alleviate effects of the Internet politics by well understanding it. To this end, we propose Internet politics analysis, a systematic approach that can potentially well address the research dilemmas caused by the Internet politics. In addition, we propose a simple but effective model for the Internet politics which can significantly facilitate the Internet politics analysis. As a result, it may lead to dramatic gains for the future Internet research.

Leiwen Deng; Ar Kuzmanovic

2008-01-01T23:59:59.000Z

194

Sustaining the Internet with hyperbolic mapping  

E-Print Network (OSTI)

The Internet infrastructure is severely stressed. Rapidly growing overhead associated with the primary function of the Internet---routing information packets between any two computers in the world---causes concerns among Internet experts that the existing Internet routing architecture may not sustain even another decade; parts of the Internet have started sinking into black holes already. Here we present a method to map the Internet to a hyperbolic space. Guided with the constructed map, which we release with this paper, Internet routing exhibits scaling properties close to theoretically best possible, thus resolving serious scaling limitations that the Internet faces today. Besides this immediate practical viability, our network mapping method can provide a different perspective on the community structure in complex networks.

Boguna, Marian; Krioukov, Dmitri

2010-01-01T23:59:59.000Z

195

Study of Proposed Internet Congestion Control Algorithms*  

Science Conference Proceedings (OSTI)

... Algorithms* Kevin L. Mills, NIST (joint ... Page 2. Study of Proposed Internet Congestion Control Algorithms Mills et al. Innovations ...

2013-04-01T23:59:59.000Z

196

The Evolution of International Internet Telephony  

E-Print Network (OSTI)

International Internet Telephony has been evolving since its introduction in 1996. In 1996, the typical player was

McGarty, Terrence

197

Coping with Internet channel conflict  

Science Conference Proceedings (OSTI)

If you do not sell your products directly over the Internet, people will go to your competitors who do, while if you do sell your products directly, your distributors and dealers will desert you and only carry products from manufacturers who do not compete ...

Younghwa Lee; Zoonky Lee; Kai R. T. Larsen

2003-07-01T23:59:59.000Z

198

Comparison shopping on the internet  

Science Conference Proceedings (OSTI)

Though comparison shopping is used widely by online shoppers, very little research exists about how comparison shoppers differ from those who are not involved in comparison shopping. A survey of 208 US consumers identified comparison shoppers, both on ... Keywords: USA, United States, comparison shopping, consumer attitudes, e-commerce, e-shopping, e-tailing, electronic commerce, electronic retailing, factors, internet, online shopping

Michael Klassen; Pola Gupta; Matthew P. Bunker

2009-05-01T23:59:59.000Z

199

Commercial Internet filters: Perils and opportunities  

Science Conference Proceedings (OSTI)

Organizations are becoming increasingly aware of Internet abuse in the workplace. Such abuse results in loss of workers' productivity, network congestion, security risks, and legal liabilities. To address this problem, organizations have started to adopt ... Keywords: Internet abuse, Internet filters, Text classification, Text mining

Chen-Huei Chou; Atish P. Sinha; Huimin Zhao

2010-03-01T23:59:59.000Z

200

Workshop on internet economics (WIE2011) report  

Science Conference Proceedings (OSTI)

The second Workshop on Internet Economics [2], hosted by CAIDA and Georgia Institute of Technology on December 1-2, 2011, brought together network technology and policy researchers with providers of commercial Internet facilities and services (network ... Keywords: economics, internet, network management

kc claffy

2012-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Internet market strategies: Antecedents and implications  

Science Conference Proceedings (OSTI)

The Web is a new market channel that has become a serious alternative to traditional channels. At present, there is little strategy analysis available to guide a company's decision about its involvement in the internet market. In this paper, we differentiate ... Keywords: Creative pricing policies, IMS model, Internet competition, Internet market, Mixed strategy, Pure strategy, Resource-based theory, Traditional markets

Jaeki Song; Fatemeh Mariam Zahedi

2006-03-01T23:59:59.000Z

202

Robustness provided by internet monitoring systems  

Science Conference Proceedings (OSTI)

Internet applications such as Wealth Management Banking Programs require a very high degree of robustness. To attain this continuous testing - that is monitoring the systems over a period of time - is suggested. The preparation of an appropriate site-monitoring ... Keywords: continuous testing, internet, internet offering, monitoring systems, requirements, robustness, site monitoring, soft launch, test environment, testing recommendation, transitional state

Barry Dellar

2002-01-01T23:59:59.000Z

203

Security of internet-connected computer networks  

Science Conference Proceedings (OSTI)

The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ... Keywords: attack detection, attacks, computer networks, digital signature, incidents, internet, network security, security breaches, security policy

I. Tutanescu; E. Sofron; M. Ali

2010-02-01T23:59:59.000Z

204

Toward a Framework for Assessing Internet Channels  

Science Conference Proceedings (OSTI)

The emergence of the Internet has forced a large number of firms to introduce Internet-based channels of distribution into existing distribution systems to market their products. In multiple channels context, there has been a call for better performance ... Keywords: Internet channels, strategic profit model (SPM), analytic network process (ANP), performance evaluation

Hung-Jen Tu; Chia-Yang Wong

2010-05-01T23:59:59.000Z

205

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

206

T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft MHTML Input Validation Hole May Permit Cross-Site 6: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code January 31, 2011 - 7:00am Addthis PROBLEM: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code. PLATFORM: Microsoft 2003 SP2, Vista SP2, 2008 SP2, XP SP3, 7; and prior service packs ABSTRACT: A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks. reference LINKS: Microsoft Security Advisory 2501696 Microsoft Support Security Tracker Alert CVE-2011-0096 IMPACT ASSESSMENT: Medium Discussion: The vulnerability exists due to the way MHTML interprets MIME-formatted requests for content blocks within a document. It is possible for this

207

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

208

Microsoft Word - H2 National Release 2.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- H2 National Release 2.doc More Documents & Publications Ammendment 2.doc Microsoft Word - PressReleaseSiting2-8-06Final.doc Microsoft Word - Second ITER Council Press Release...

209

Microsoft PowerPoint - 16.1225_Terry Cooke-Davies - Project Complexity...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

225Terry Cooke-Davies - Project Complexity as of 16 Mar Microsoft PowerPoint - 16.1225Terry Cooke-Davies - Project Complexity as of 16 Mar Microsoft PowerPoint - 16.1225Terry...

210

Microsoft PowerPoint - 16.1555_Chad Henderson_Final | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

555Chad HendersonFinal Microsoft PowerPoint - 16.1555Chad HendersonFinal Microsoft PowerPoint - 16.1555Chad HendersonFinal More Documents & Publications Sample Project...

211

Microsoft PowerPoint - 16.0855_Raines Draft Rev 4 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0855Raines Draft Rev 4 Microsoft PowerPoint - 16.0855Raines Draft Rev 4 Microsoft PowerPoint - 16.0855Raines Draft Rev 4 More Documents & Publications Earned Value (EV) Analysis...

212

Microsoft PowerPoint - Georgetown lecture 3-29-10 final fordistributi...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Georgetown lecture 3-29-10 final for distribution.pptx Microsoft PowerPoint - Georgetown lecture 3-29-10 final for distribution.pptx Microsoft PowerPoint - Georgetown lecture...

213

Microsoft Word - PolicyFlash_2010-01_January_2011_PMCDP_Curriculum...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1January2011PMCDPCurriculumFINAL.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCurriculumFINAL.doc Microsoft Word - Policy Flash2010-01January2011PMCDPCur...

214

Microsoft Word - Flash_09-05_PMCDP_Course_Curriculum_Changes...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5PMCDPCourseCurriculumChanges.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc Microsoft Word - Flash09-05PMCDPCourseCurriculumChanges.doc More...

215

Microsoft PowerPoint - 09 Lehman final 1003 SC PM Workshop |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- 09 Lehman final 1003 SC PM Workshop Microsoft PowerPoint - 09 Lehman final 1003 SC PM Workshop More Documents & Publications Microsoft PowerPoint - 16.1045Peer Reviews...

216

70-291: Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Package  

Science Conference Proceedings (OSTI)

A comprehensive program of textbook, lab manual and software, this Microsoft Official Academic Course provides everything students need to build the knowledge and skills necessary to configure, manage, and troubleshoot a Microsoft Windows Server 2003 ...

Microsoft Official Academic Course

2010-02-01T23:59:59.000Z

217

Microsoft Word - Graphics A-76 Post - MEO VV Review Report _F...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Graphics A-76 Post - MEO VV Review Report F.doc Microsoft Word - Graphics A-76 Post - MEO VV Review Report F.doc Microsoft Word - Graphics A-76 Post - MEO VV Review Report...

218

Microsoft Word - AcqGuide70pt31B.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - AcqGuide70pt31B.doc More Documents & Publications OPAM Policy Acquisition Guides Microsoft Word - AcqGuide70pt31A.doc PolicyFlash2010-12(2).pdf...

219

Microsoft PowerPoint - Book and Journal Forms_v2_wButton.ppt...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Book and Journal Formsv2wButton.ppt Microsoft PowerPoint - Book and Journal Formsv2wButton.ppt Microsoft PowerPoint - Book and Journal Formsv2wButton.ppt More Documents &...

220

Microsoft Word - PPL 970-Materials and Inventory 5-9-05.doc ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PPL 970-Materials and Inventory 5-9-05.doc Microsoft Word - PPL 970-Materials and Inventory 5-9-05.doc Microsoft Word - PPL 970-Materials and Inventory 5-9-05.doc More Documents &...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Microsoft PowerPoint - FederalReporting Grants Apr 2010 [Compatibility...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PowerPoint - FederalReporting Contractors Apr 2010 Compatibility Mode Microsoft PowerPoint - 15.1500Michael Deane Compatibility Mode Microsoft PowerPoint - 16.0805Tom Fox...

222

Microsoft PowerPoint - 16.0805_Tom Fox [Compatibility Mode] ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

05Tom Fox Compatibility Mode Microsoft PowerPoint - 16.0805Tom Fox Compatibility Mode Microsoft PowerPoint - 16.0805Tom Fox Compatibility Mode More Documents &...

223

Microsoft PowerPoint - 15.1615_Cost Estimating Panel | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel Microsoft PowerPoint - 15.1615Cost Estimating Panel More Documents & Publications Contractor SOW...

224

Microsoft Word - GRS Review_OMB White Paper - Real Property Right...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Microsoft Word - GRS ReviewOMB White Paper - Real Property Right-sizing and Carbon Reduction August 7 2009 2.docx Microsoft Word - GRS ReviewOMB White Paper - Real Property...

225

Microsoft PowerPoint - Georgetown lecture 3-29-10 final fordistributi...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Publications Microsoft PowerPoint - Saudi Arabia 2-22-10 final for distribution.pptx Microsoft PowerPoint - UAE Masdar 2-24-10 final for distribution.pptx SEAB Climate Action Plan...

226

Microsoft Word - Moving to a Clean Energy Economy-VA 9 24 09...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Moving to a Clean Energy Economy-VA 9 24 09.doc Microsoft Word - Moving to a Clean Energy Economy-VA 9 24 09.doc Microsoft Word - Moving to a Clean Energy Economy-VA 9 24 09.doc...

227

Microsoft PowerPoint - UAE Masdar 2-24-10 final for distribution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UAE Masdar 2-24-10 final for distribution.pptx Microsoft PowerPoint - UAE Masdar 2-24-10 final for distribution.pptx Microsoft PowerPoint - UAE Masdar 2-24-10 final for...

228

Microsoft PowerPoint - Saudi Arabia 2-22-10 final for distribution...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Saudi Arabia 2-22-10 final for distribution.pptx Microsoft PowerPoint - Saudi Arabia 2-22-10 final for distribution.pptx Microsoft PowerPoint - Saudi Arabia 2-22-10 final for...

229

T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Office Visio DXF File Handling Arbitrary Code 6: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability June 28, 2011 - 3:42pm Addthis PROBLEM: Functional code that demonstrates an exploit of the Microsoft Office Visio DXF file handling arbitrary code execution vulnerability is publicly available. PLATFORM: Microsoft Office Visio 2002 SP2 and prior Microsoft Office Visio 2003 SP3 and prior Microsoft Office Visio 2007 SP2 and prior ABSTRACT: Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. reference LINKS: IntelliShield ID: 20432 Original Release: S516 CVE-2010-1681 IMPACT ASSESSMENT: High Discussion: The vulnerability exists because the affected software does not perform

230

U-145: Microsoft Security Bulletin Summary for April 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Summary for April 2012 5: Microsoft Security Bulletin Summary for April 2012 U-145: Microsoft Security Bulletin Summary for April 2012 April 11, 2012 - 9:30am Addthis PROBLEM: Microsoft Security Bulletin Summary for April 2012 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2, ABSTRACT: Microsoft Security Bulletin Summary for April 2012. Microsoft has posted 4 Critical Bulletins and 2 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on April 11, 2012, at 11:00 AM Pacific Time (US & Canada). reference LINKS: Microsoft Security Bulletin Security Bulletin Summary Archive

231

U-009:Microsoft Security Bulletin Summary for October 2011 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

09:Microsoft Security Bulletin Summary for October 2011 09:Microsoft Security Bulletin Summary for October 2011 U-009:Microsoft Security Bulletin Summary for October 2011 October 12, 2011 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Summary for October 2011 PLATFORM: Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7, Windows Server 2008 R2. ABSTRACT: Microsoft released 8 bulletins to address vulnerabilities. This Microsoft bulletin contains 2 critical vulnerabilities. reference LINKS: Microsoft Security Bulletin Summary for October 2011 Security Bulletin Summary October Archive IMPACT ASSESSMENT: High Discussion: For more details regarding the Microsoft October 2011 bulletins, please see follow link for CVE details. You can find more information located under the "Affected Software and Download Locations" section using the following

232

V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft SharePoint Input Validation Flaws Permit 2: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks V-112: Microsoft SharePoint Input Validation Flaws Permit Cross-Site Scripting and Denial of Service Attacks March 15, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Microsoft SharePoint PLATFORM: Microsoft SharePoint 2010 SP1 ABSTRACT: This security update resolves four reported vulnerabilities in Microsoft SharePoint and Microsoft SharePoint Foundation. REFERENCE LINKS: Security Tracker Alert ID 1028278 MS Security Bulletin MS13-024 CVE-2013-0080 CVE-2013-0083 CVE-2013-0084 CVE-2013-0085 IMPACT ASSESSMENT: High DISCUSSION: The security update addresses the vulnerabilities correcting the way that Microsoft SharePoint Server validates URLs and user input.

233

Microsoft Word - MAT0013.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

MAT0013 ~ IATA/Biologicals & Dry Ice Shipper MAT0013 ~ IATA/Biologicals & Dry Ice Shipper Course Syllabus Subject Category: Hazardous Materials Transportation Course Prerequisite: None Course Length: Varies by Vendor and Delivery Method Medical Approval: None Delivery Mode: Off-Site classroom, CD, or via Internet Schedule: As required, established by Research or Support Division Location/Time: Varies, typically 1 day or less, based on vendor schedule or mode of delivery Course Purpose: Dry ice is regulated as Dangerous Goods when transported by air. Certain biological materials may also be regulated as Dangerous Goods, Division 6.2. Personnel who participate in the process of shipping biological materials in dry ice containing packages by air are required to be trained in accordance with the training requirements

234

Microsoft Word - induspmt.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Water Resources Control Board Water Resources Control Board Division of Water Quality 1001 I Street * Sacramento, California 95814 * (916) 341-5538 Mailing Address: P.O. Box 1977 * Sacramento, California * 95812-1977 FAX (916) 341-5543 * Internet Address: http://www.waterboards.ca.gov/stormwtr/index.html Alan C. Lloyd Ph D. Secretary for Environmental Protection Arnold Schwarzengger Governor To: STORM WATER DISCHARGER SUBJECT: CHECKLIST FOR SUBMITTING A NOTICE OF INTENT In order for the State Water Resources Control Board to expeditiously process your Notice of Intent (NOI), the following items must be submitted to either of the addresses indicated below: 1._______ NOI (please keep a copy for your files) with all applicable sections completed and original signature of the facility operator;

235

Microsoft Word - Designated_User_Facilities_April_13_2010 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications DOE Designated User Facilities PIA - Environmental Molecular Sciences Laboratory (EMSL) User System (ESU) Microsoft Word - PSRP Updates...

236

C:\\Users\\sengels\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

COURT OF APPEALS FOR THE DISTRICT OF COLUMBIA CIRCUIT No. 10-1082 STATE OF WASHINGTON, Petitioner v. UNITED STATES DEPARTMENT OF ENERGY, et al., Respondents ON PETITION FOR REVIEW...

237

Microsoft PowerPoint - Durango Solar Leasing Prebid Meeting for Internet posting.ppt  

Office of Legacy Management (LM)

Debbie Barr Debbie Barr Jalena Dayvault Dr. Laura Kilpatrick November 15, 2011 U.S. Department of Energy Office of Legacy Management Bidders Conference and Site Visit U.S. Department of Energy (DOE) Photovoltaic Solar Project Bidders Conference Durango, Colorado November 15, 2011 Office of Legacy Management Office of Site Operations 3 3 Presentation Outline Durango Disposal Site Durango Disposal Cell Background Disposal Cell Facts Disposal Cell Protectiveness Disposal Site: Long-Term Surveillance Plan 4 4 Durango Disposal Cell Background The Uranium Mill Tailings Radiation Control Act authorized DOE to clean up uranium mill tailings at 22 inactive mill sites from 1983 to 1998 Tailings were removed from Smelter Mountain and placed in a new disposal site above the west end of

238

EphCOM: Practical Ephemeral Communications (How to implement ephemeral data with only primary Internet services)  

E-Print Network (OSTI)

The Internet never forgets and data lingers virtually forever. Private data created by users is frequently disseminated around the Internet and users often lose the control and ownership of their contents. This increasing diffusion of private data over the Internet motivates the need for ephemeral data, i.e. time-bounded data that cannot be accessed after a userspecified expiration time. This paper explores and formalizes the concept of Ephemeral Data Systems, systems that prevent an adversary from accessing expired contents. We present EphCOM, a practical Ephemeral Data System that supports ephemeral data using only a primary Internet service, namely the Domain Name Service (DNS). Our proposal leverages DNS servers caching mechanisms. EphCOM does not rely on any Trusted Platform Modules (TPM), peer-to-peer networks, or centralized servers, and is transparent to existing applications and services. It allows users to closely control data lifetime. We analyze its security and show, through extensive and large-s...

Project, The Ephemeral Data

2010-01-01T23:59:59.000Z

239

User Empowerment in the Internet of Things  

E-Print Network (OSTI)

This paper focuses on the characteristics of two big triggers that facilitated wide user adoption of the Internet: Web 2.0 and online social networks. We detect brakes for reproduction of these events in Internet of things. To support our hypothesis we first compare the difference between the ways of use of the Internet with the future scenarios of Internet of things. We detect barriers that could slow down apparition of this kind of social events during user adoption of Internet of Things and we propose a conceptual framework to solve these problems.

Munjin, Dejan

2011-01-01T23:59:59.000Z

240

Mobile Internet iPhone + iTouch Desktop Internet  

E-Print Network (OSTI)

www.morganstanley.com/techresearch Morgan Stanley does and seeks to do business with companies covered in Morgan Stanley Research. As a result, investors should be aware that the firm may have a conflict of interest that could affect the objectivity of Morgan Stanley Research. Investors should consider Morgan Stanley Research as only a single factor in making their investment decision. For analyst certification and other important disclosures, refer to the Disclosure Section, located at the end of this report. Internet Trends Outline

unknown authors

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for July 9: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

242

V-175: Microsoft Security Bulletin Advance Notification for June 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for June 5: Microsoft Security Bulletin Advance Notification for June 2013 V-175: Microsoft Security Bulletin Advance Notification for June 2013 June 11, 2013 - 12:12am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

243

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

244

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

245

Microsoft Word - ARRAModelWAS.doc | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- ARRAModelWAS.doc Microsoft Word - ARRAModelWAS.doc More Documents & Publications Work Authorization System Paperwork Reduction Act Form Glossary of Screen Labels for PARS II V1...

246

Microsoft PowerPoint - 04 Melendez Rimando Restructuring of EM...  

NLE Websites -- All DOE Office Websites (Extended Search)

PowerPoint - 04 Melendez Rimando Restructuring of EM Portfolio Briefing 3 March 2010 rev 2 rcvd 8 Mar 1100 Compatibi Microsoft PowerPoint - 04 Melendez Rimando Restructuring of EM...

247

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Microsoft Security Bulletin Advance Notification for April 30: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

248

U-033: Microsoft Security Bulletin Summary for November 2011 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Summary for November 2011 3: Microsoft Security Bulletin Summary for November 2011 U-033: Microsoft Security Bulletin Summary for November 2011 November 10, 2011 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Summary for November 2011. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

249

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

250

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

251

V-130: Microsoft Security Bulletin Advance Notification for April 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Microsoft Security Bulletin Advance Notification for April 0: Microsoft Security Bulletin Advance Notification for April 2013 V-130: Microsoft Security Bulletin Advance Notification for April 2013 April 10, 2013 - 12:18am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for April 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

252

V-108: Microsoft Security Bulletin Advance Notification for March 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for March 8: Microsoft Security Bulletin Advance Notification for March 2013 V-108: Microsoft Security Bulletin Advance Notification for March 2013 March 11, 2013 - 12:46am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for March 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

253

U-235: Microsoft Security Bulletin Advance Notification for August 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Security Bulletin Advance Notification for August 5: Microsoft Security Bulletin Advance Notification for August 2012 U-235: Microsoft Security Bulletin Advance Notification for August 2012 August 14, 2012 - 8:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for August 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

254

U-278: Microsoft Security Bulletin Advance Notification for October 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for October 8: Microsoft Security Bulletin Advance Notification for October 2012 U-278: Microsoft Security Bulletin Advance Notification for October 2012 October 10, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for October 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

255

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

256

V-042: Microsoft Security Bulletin Advance Notification for December 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Microsoft Security Bulletin Advance Notification for 2: Microsoft Security Bulletin Advance Notification for December 2012 V-042: Microsoft Security Bulletin Advance Notification for December 2012 December 7, 2012 - 3:30am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems,

257

U-256: Microsoft Security Bulletin Advance Notification for September 2012  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Microsoft Security Bulletin Advance Notification for 6: Microsoft Security Bulletin Advance Notification for September 2012 U-256: Microsoft Security Bulletin Advance Notification for September 2012 September 11, 2012 - 6:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for September 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

258

V-064: Microsoft Security Bulletin Advance Notification for January 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for January 4: Microsoft Security Bulletin Advance Notification for January 2013 V-064: Microsoft Security Bulletin Advance Notification for January 2013 January 8, 2013 - 1:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

259

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Security Bulletin Advance Notification for June 9: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

260

V-154: Microsoft Security Bulletin Advance Notification for May 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft Security Bulletin Advance Notification for May 4: Microsoft Security Bulletin Advance Notification for May 2013 V-154: Microsoft Security Bulletin Advance Notification for May 2013 May 13, 2013 - 12:47am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for May 2013 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

262

U-209: Microsoft Security Bulletin Advance Notification for July 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

209: Microsoft Security Bulletin Advance Notification for July 209: Microsoft Security Bulletin Advance Notification for July 2012 U-209: Microsoft Security Bulletin Advance Notification for July 2012 July 10, 2012 - 7:28am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for July 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

263

V-023: Microsoft Security Bulletin Advance Notification for November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft Security Bulletin Advance Notification for 3: Microsoft Security Bulletin Advance Notification for November 2012 V-023: Microsoft Security Bulletin Advance Notification for November 2012 November 13, 2012 - 2:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for November 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7

264

U-189: Microsoft Security Bulletin Advance Notification for June 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Microsoft Security Bulletin Advance Notification for June 89: Microsoft Security Bulletin Advance Notification for June 2012 U-189: Microsoft Security Bulletin Advance Notification for June 2012 June 13, 2012 - 6:00am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for June 2012 PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems, Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1,

265

Characterizing Internet Worm Infection Structure  

E-Print Network (OSTI)

Internet worm infection continues to be one of top security threats. Moreover, worm infection has been widely used by botnets to recruit new bots and construct P2P-based botnets. In this work, we attempt to characterize the network structure of Internet worm infection and shed light on the micro-level information of "who infects whom." Our work quantifies the infection ability of individual hosts and reveals the key characteristics of the underlying topologies formed by worm infection, i.e., the number of children and the generation of the Internet worm infection family tree. Specifically, we first analyze the infection tree of a wide class of worms, for which a new victim is compromised by each existing infected host with equal probability. We find that the number of children has asymptotically a geometric distribution with parameter 0.5. We also discover that the generation follows closely a Poisson distribution and the average path length of the worm infection family tree increases approximately logarithmi...

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

266

Metro Environmental: The impact of training HVAC technicians using the SightPros-VirTechs system for remote, wireless, Internet video assistance.  

E-Print Network (OSTI)

??This qualitative study explored the overall impact of training HVAC technicians using the SightPros-VirTechs system for remote, wireless, internet video assistance at a small HVAC (more)

Daily, Ellen Wilmoth Matthews

2008-01-01T23:59:59.000Z

267

Configuring Client PCs for use with Project Assessment and Reporting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

requirements are unsupported and can mean unpredictable results. 3. Using Microsoft Internet Explorer 8, open this link: https:pars2.doe.govPARS2SSSTempwfSSSXlsView.aspx?RPT...

268

Temperature Data for Week Ending May 12, 2005  

Annual Energy Outlook 2012 (EIA)

browser may not be able to show properly. This presentation was optimized for more recent versions of Microsoft Internet Explorer. If you would like to proceed anyway, click here....

269

NMMSS Fill-able Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fill-able Forms NMMSS Fill-able Forms NOTE: The forms on this page require Microsoft Internet Explorer 6.0 or above to work correctly. They do not support other browsers at this...

270

Internet Media Types and the Web  

E-Print Network (OSTI)

draft-masinter-mime-web-info-00 This document describes some of the ways in which parts of the MIME system, originally designed for electronic mail, have been used in the web, and some of the ways in which those uses have resulted in difficulties. This informational document is intended as background and justification for a companion Best Current Practice which makes some changes to the registry of Internet Media Types and other specifications and practices, in order to facilitate Web application design and standardization. Status of this Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at

L. Masinter

2010-01-01T23:59:59.000Z

271

T-557: Microsoft Office Excel Office Art Object Parsing Remote Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Microsoft Office Excel Office Art Object Parsing Remote Code 7: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability February 15, 2011 - 7:00am Addthis PROBLEM: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability. PLATFORM: Microsoft Office Excel ABSTRACT: This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. reference LINKS: ZDI-11-041 ZDI Public Disclosure: Microsoft CVE-2011-0979 IMPACT ASSESSMENT: High Discussion: The flaw occurs when parsing a document with a malformed Excel document.

272

Evaluation and testing of internet firewalls  

Science Conference Proceedings (OSTI)

In this article we propose a testing methodology for evaluating Internet firewalls and apply it to compare two popular firewalls. Copyright 1999 John Wiley & Sons, Ltd.

Khalid Al-Tawil; Ibrahim A. Al-Kaltham

1999-05-01T23:59:59.000Z

273

Internet, the Web, and Mathematical Science - CECM  

E-Print Network (OSTI)

The dominant mechanism, recently, for distribution of electronic preprints have ... On a simpler level, from the days of the first-generation Internet, before the web...

274

WEB RESOURCE: Central Internet Database - TMS  

Science Conference Proceedings (OSTI)

May 15, 2007 ... Topic Title: WEB RESOURCE: Central Internet Database Topic Summary: DOE. Integrates waste management and cleanup data from multiple...

275

Internet Engineering Task Force KK Ramakrishnan ...  

Science Conference Proceedings (OSTI)

... Engineering Task Force KK Ramakrishnan INTERNET DRAFT AT&T Labs Research draft-kksjf-ecn-00.txt Sally Floyd LBNL November 1997 ...

2009-08-19T23:59:59.000Z

276

Regulation and Censorship of the Internet.  

E-Print Network (OSTI)

??The Internet is probably one of the greatest inventions of mankind and one of the best things that happened in my generation. It has become (more)

Okeke, Innocent

2012-01-01T23:59:59.000Z

277

Practice of Internet Marketing in Destination Branding.  

E-Print Network (OSTI)

??This study provides information about destination branding and the effect of Internet marketing on tourism. Tourism branding generates interest in a destination as well as, (more)

Duong, Linh

2012-01-01T23:59:59.000Z

278

EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE.  

E-Print Network (OSTI)

??The current internet architecture allows hosts to send arbitrary IP packets across a network, which may not reflect valid source address information. IP spoofing and (more)

Maaz, Khan

2011-01-01T23:59:59.000Z

279

Clean Power for the Internet  

E-Print Network (OSTI)

Data centers have been increasingly large users of energy over the past 10 years. With the rapid increase in Internet use, these facilities continue to be built, stressing the local electricity grids with their immense energy needs, and typically with the backup support of diesel generators belching pollution into the sky. The extent of these impacts is unknown. The change in market dynamics in the year 2001 resulted in a slower growth rate in data centers, as it did with the rest of the Internet industry, but it opened up an opportunity for incorporating energy efficient technologies into the design of power delivery to these buildings. More energy-efficient design will ease pressure on the electric grid and also decrease pollution in these areas, many of which are already areas of pollution non-attainment. This paper discusses the air quality impact of data centers, their impact on the electric grid, and the possibility of using clean distributed energy resources (DER) to meet their power reliability and quantity needs. Current DER installation and its success in maintaining the needed reliability are reviewed. The environmental and economic impact of the use of DER in these buildings are also reviewed and ways to overcome the potential barriers to this technology are discussed.

Brown, E.; Elliott, R. N.; Shipley, A.

2002-04-01T23:59:59.000Z

280

Microsoft Word - tmp5.rtf  

NLE Websites -- All DOE Office Websites (Extended Search)

Five-Day Unit in Particle Physics for the Introductory Five-Day Unit in Particle Physics for the Introductory Physics Classroom Day 1 Introduction: We would like the students to understand why high-energy physics is asking the questions they are asking. Today the students will explore a mythical universe and the particles and forces that make up that universe. Students will understand that these same questions are the ones that have puzzled humans throughout time. Students will also get an introduction to current particle physics terminology and be introduced to the basics of theory formation. Materials for the Day: Make student copies of "How Does the Universe Work?," pages 10 and 11 in the TMP Book. Make student copies of page 2 and "Ultimate Periodical Table," pages 29-33 in

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Microsoft Word - LPN.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Cationic Liposome-Microtubule Complexes: Lipid-Protein Bio-Nanotubes with Open or Closed Ends Uri Raviv *,† , Daniel J. Needleman *,† , Youli Li *,† , Herbert P. Miller † , Leslie Wilson † , and Cyrus R. Safinya *,† * Materials Department, Physics Department † Molecular, Cellular, and Developmental Biology Department, Biomolecular Science and Engineering Program, University of California, Santa Barbara, CA 93106 In this work we explored the structured that form when cationic liposomes are mixed with microtubules (MTs). Using synchrotron small angle X-ray diffraction (SAXRD) and transmission electron microscopy (TEM), we find two novel structures(1). For soft and intermediate rigid membranes we find that the cationic liposomes spread and coat the MTs

282

Your Mission: To become familiar with the major plate boundaries through exploration of plate tectonic features using Google Earth.  

E-Print Network (OSTI)

boundaries through exploration of plate tectonic features using Google Earth. Your Supplies: (1) A computer with internet access and the Google Earth program of Earth's tectonic plates using Google Earth. To do this, login

Smith-Konter, Bridget

283

In Pursuit of Privacy on a Public Internet  

E-Print Network (OSTI)

In Pursuit of Privacy on a Public Internet by Marc MendoncaUser privacy on the Internet has been an increasing concernof Privacy on a Public Internet A thesis submitted in

Mendonca, Marc

2012-01-01T23:59:59.000Z

284

The energy and emergy of the internet  

Science Conference Proceedings (OSTI)

Recent years have seen a flurry of energy-efficient networking research. But does decreasing the energy used by the Internet actually save society much energy? To answer this question, we estimate the Internet's energy consumption. We include embodied ... Keywords: consumption, emergy, energy, sustainability

Barath Raghavan; Justin Ma

2011-11-01T23:59:59.000Z

285

Measuring the evolution of internet peering agreements  

Science Conference Proceedings (OSTI)

There is much interest in studying the structure and evolution of the Internet at the Autonomous System (AS) level. However, limitations of public data sources in detecting settlement-free peering links meant that prior work focused almost exclusively ... Keywords: autonomous systems, economics, internet topology, peering

Amogh Dhamdhere; Himalatha Cherukuru; Constantine Dovrolis; Kc Claffy

2012-05-01T23:59:59.000Z

286

Trinocular: Understanding Internet Reliability Through Adaptive Probing  

E-Print Network (OSTI)

and human factors cause Internet outages--from big events like Hurricane Sandy in 2012 and the Egyptian, increasing In- ternet "background radiation" by less than 0.7%. Trinocular is also predictable and precise require little traffic, a single machine can track 3.4M /24 IPv4 blocks, all of the Internet currently

Heidemann, John

287

Internet governance on a dollar a day  

Science Conference Proceedings (OSTI)

The submissions of ICANN and ISOC to the WSIS suggested Internet governance was purely about technical standardisation, addresses, domains and some service-related issues. Under this definition, there is little for poor people to worry about. At the ... Keywords: WGIG, WSIS, access, developing countries, development, internet

Charles Kenny

2007-01-01T23:59:59.000Z

288

Why the Internet is so 'small'?  

E-Print Network (OSTI)

During the last three decades the Internet has experienced fascinating evolution, both exponential growth in traffic and rapid expansion in topology. The size of the Internet becomes enormous, yet the network is very `small' in the sense that it is extremely efficient to route data packets across the global Internet. This paper provides a brief review on three fundamental properties of the Internet topology at the autonomous systems (AS) level. Firstly the Internet has a power-law degree distribution, which means the majority of nodes on the Internet AS graph have small numbers of links, whereas a few nodes have very large numbers of links. Secondly the Internet exhibits a property called disassortative mixing, which means poorly-connected nodes tend to link with well-connected nodes, and vice versa. Thirdly the best-connected nodes, or the rich nodes, are tightly interconnected with each other forming a rich-club. We explain that it is these structural properties that make the global Internet so 'small'.

Zhou, Shi

2010-01-01T23:59:59.000Z

289

Privacy Preservation Technologies in Internet of Things  

E-Print Network (OSTI)

Since the beginning of the Internet thirty years ago, we have witnessed a number of changes in the application of communication technologies. Today, the Internet can be described to a large extent as a ubiquitous infrastructure that is always accessible. After the era of connecting places and connecting people, the Internet of the future will also connect things. The idea behind the resulting Internet of Things is to seamlessly gather and use information about objects of the real world during their entire lifecycle. In this paper, we consider different approaches to technological protection of user data privacy in the world of Internet of Things. In particular,we consider what kind of security problems are being faced and what level of protection can be provided by applying approaches based on secure multi-party computations.

Sen, Jaydip

2010-01-01T23:59:59.000Z

290

Internet Kiosks in Rural India: What Influences Success?#  

E-Print Network (OSTI)

effects. Internet Kiosks in Rural India: What Influences62. Internet Kiosks in Rural India: What Influences Success?2005), Enabling ICT for Rural India, Project Report,

Kendall, Jake; Singh, Nirvikar

2007-01-01T23:59:59.000Z

291

DOE Site Facility Management Contracts Internet Posting | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Facility Management Contracts Internet Posting DOE Site Facility Management Contracts Internet Posting DOE-NNSA Site Facility Mgmt Contracts AUG 2013.pdf More Documents &...

292

from Savannah River Nuclear Solutions, LLC NEWS Internet Food...  

NLE Websites -- All DOE Office Websites (Extended Search)

Internet Food Service for SRS Employees Sought Greater Aiken-Augusta area food service companies are invited to consider providing meal ordering via the internet for delivery to...

293

The Locational Determinants of Internet Usage in Asia and Nepal.  

E-Print Network (OSTI)

??This study examines the relationship between internet development and various socio- economic factors that are assumed to affect internet infrastructure development decision. The data collected (more)

Chand, Smriti

2011-01-01T23:59:59.000Z

294

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

295

Future Internet Architecture and Cyber-assisted Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

Louis Host: Raj Kettimuthu Despite their huge differences, the Internet and the power grid share similar delivery patterns in the sense that the Internet delivers information...

296

Central Internet Database (CID) Reports  

Office of Environmental Management (EM)

Home > CID Reports Home > CID Reports Central Internet Database CID Photo Banner Reports The CID offers a choice of standard and archived reports. Standard reports are based on the most recently available DOE data related to the information requirements specified in the Settlement Agreement. Report categories include: Radioactive Waste Spent Nuclear Fuel and High-Level Radioactive Waste Facilities Non-Radioactive Hazardous Waste Toxic Release Inventory Waste The standard reports menu includes reports generated directly by the CID and reports generated by other systems. The CID generated reports allow users to select criteria to customize the report output. For the most current radioactive waste reports, CID users are directed to the Waste Information Management System (WIMS) Exit CID Website . WIMS provides radioactive waste disposition reports and disposition maps. While WIMS is a public site, you need to register and provide contact information the first time you enter WIMS.

297

Central Internet Database (CID) Glossary  

Office of Environmental Management (EM)

Glossary Glossary Central Internet Database CID Photo Banner Glossary # | A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z # 11e(2) Byproduct Material Tailings or waste produced by the extraction or concentration of uranium or thorium from any ore processed primarily for its source material (i.e., uranium or thorium) content. This excludes underground ores depleted by uranium solution extraction operations (in situ leaching) that continue to remain underground. 11e(2) byproduct material is defined by law under Section 11e(2) of the Atomic Energy Act as amended by Title II of the Uranium Mill Tailings Radiation Control Act of 1978. A Active Facility A facility that is being used to conduct DOE missions and has not yet been transferred to the Office of Environmental Management (EM) for management and/or cleanup.

298

Microsoft Word - Highland_CTC.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Highland Community Technology Center Highland Community Technology Center Table of Contents * Introduction Gloria Thurman, Program Coordinator, Highland Addition Community Center * Building Community Capacity Melinda Downing, Office of Stakeholder Relations, Office of Legacy Management, U.S. Department of Energy * Capacity Building in Federal Facility Communities Marsha Minter, Office of the Administrator, U.S. Environmental Protection Agency, Washington, DC * Gone Fishing: The Urban Internet Project is helping public housing residents tap the Internet Mark Baechtel, Fast Forward, Washington Post Supplement * Chronology of Events Introduction Welcome to the Highland Addition Community Center. Living in the Highland Addition community presents challenges and opportunities. The

299

Historical Exploration And Drilling Data From Geothermal Prospects And  

Open Energy Info (EERE)

Exploration And Drilling Data From Geothermal Prospects And Exploration And Drilling Data From Geothermal Prospects And Power Generation Projects In The Western United States Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Conference Proceedings: Historical Exploration And Drilling Data From Geothermal Prospects And Power Generation Projects In The Western United States Details Activities (20) Areas (7) Regions (0) Abstract: In 2005, Idaho National Laboratory was conducting a study of historical exploration practices and success rates for geothermal resources identification. Geo Hills Associates (GHA) was contracted to review and accumulate copies of published literature, Internet information, and unpublished geothermal exploration data to determine the level of exploration and drilling activities that occurred for all of the currently

300

V-088: Microsoft Security Bulletin Advance Notification for February 2013 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Microsoft Security Bulletin Advance Notification for 8: Microsoft Security Bulletin Advance Notification for February 2013 V-088: Microsoft Security Bulletin Advance Notification for February 2013 February 11, 2013 - 12:27am Addthis PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

70-622: Supporting and Troubleshooting Application on a Microsoft Windows Vista Client for Enterprise Support Technicians Package  

Science Conference Proceedings (OSTI)

The latest publication in the Microsoft Official Academic Course series for IT Professionals, this coursecovers the Windows Vista client mapping to the new Microsoft Certified IT Professional examination 70-622 for Enterprise Support Technicians. A comprehensive ...

Microsoft Official Academic Course

2010-03-01T23:59:59.000Z

302

IETF Internet-Draft Intended status: Informational  

E-Print Network (OSTI)

Towards an Information-Centric Internet with more Things draft-kutscher-icn-iwmt-00 The Internet is already made of things. However, we expect there to be many more less-capable things, such as sensors and actuators, connected to the Internet in years to come. In parallel, Internet applications are more and more being used to perform operations on named (information) objects, and various Information-Centric Networking (ICN) approaches are being researched in order to allow such applications to work effectively at scale and with various forms of mobility and in networking environments that are more challenging than a traditional access network and data center. In this position paper, we outline some benefits that may accrue, and issues that arise, should the Internet, with many more things, make use of the ICN approach to networking and we argue that ICN concepts should be considered when planning for increases in the number of things connected to the Internet. Status of this Memo This Internet-Draft is submitted in full conformance with the

D. Kutscher; S. Farrell

2011-01-01T23:59:59.000Z

303

U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

36: Microsoft JScript and VBScript Engine Integer Overflow Lets 36: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code August 15, 2012 - 7:00am Addthis PROBLEM: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: Version(s): 5.8 ABSTRACT: Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target REFERENCE LINKS: technet.microsoft.com/en-us/security/bulletin/ms12-056 http://www.securitytracker.com/id/1027392 CVE-2012-2523 Impact assessment: Medium Discussion: Vulnerability was reported in Microsoft JScript and VBScript. A remote user can cause arbitrary code to be executed on the target user's system. A

304

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

650: Microsoft Word Unspecified Flaw Lets Remote Users Execute 650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code June 20, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Microsoft Word. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Office XP; possibly other versions ABSTRACT: Microsoft Word Unspecified Flaw Lets Remote Users Execute Arbitrary Code. reference LINKS: Secunia Advisory: SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been reported in Microsoft Office Word. The vulnerability is due to memory corruption when parsing a specially crafted Word file.

305

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

306

V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: EMC NetWorker Module for Microsoft Applications Lets Remote 2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords October 15, 2012 - 6:00am Addthis PROBLEM: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords PLATFORM: EMC NetWorker Module for Microsoft Applications 2.2.1, 2.3 prior to build 122, 2.4 prior to build 375 ABSTRACT: EMC NetWorker Module for Microsoft Applications Two Vulnerabilities REFERENCE LINKS: EMC Identifier: ESA-2012-025 Secunia Advisory SA50957 SecurityTracker Alert ID: 1027647 CVE-2012-2284 CVE-2012-2290 IMPACT ASSESSMENT: Medium DISCUSSION:

307

U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft Windows win32k.sys Memory Corruption Vulnerability 5: Microsoft Windows win32k.sys Memory Corruption Vulnerability U-065: Microsoft Windows win32k.sys Memory Corruption Vulnerability December 20, 2011 - 9:45am Addthis PROBLEM: Microsoft Windows win32k.sys Memory Corruption Vulnerability. PLATFORM: Operating System Microsoft Windows 7 ABSTRACT: Successful exploitation may allow execution of arbitrary code with kernel-mode privileges. reference LINKS: Secunia Advisory SA47237 MS11-087:Article ID: 2639417 IMPACT ASSESSMENT: High Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious people to potentially compromise a user's system. The vulnerability is caused due to an error in win32k.sys and can be exploited to corrupt memory via e.g. a specially crafted web page

308

Microsoft PowerPoint - DOE-RL Hanford Metrics Presentation.pptx...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Implementing Least Privilege on Windows XP computers at DOE-RL Hanford Microsoft PowerPoint - PARS II CPP Deployment Schedule...

309

Microsoft Word - dDE-FOA-0000116.rtf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications Recovery Act - Geothermal Technologies Program:Ground Source Heat Pumps Microsoft Word - kDE-FOA-0000090.rtf Recovery Act: Wind Energy Consortia...

310

Microsoft PowerPoint - 16.1400_Panel PMCDP CRB Panel slides final...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

PowerPoint - 15 Baker 2010 PM workshop draft 28 Feb1 (2) revised Microsoft Word - PMCDP Course Curriculum Registration Guidelines 2 Certification and Equivalency Guidelines...

311

Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GAO doe mar 10 brief Compatibility Mode Microsoft PowerPoint - Overview Briefing - Tab 1 DOE's Procurement System July 2008 Energy.gov Careers & Internships For Staff &...

312

At Microsoft, we see information technology (IT) as a key tool to help address the daunting energy and climate  

E-Print Network (OSTI)

.microsoft.com/publicpolicy. Microsoft Policy BriEf | ExEcutivE suMMary A report generated by Microsoft Dynamics AX showing energy Breakthroughs in Clean Energy Generation and Delivery A long-term sustainable energy future will require fluid dynamics has significantly improved the design and placement of wind turbines to maximize

Narasayya, Vivek

313

IoT-IMS Communication Platform for Future Internet  

Science Conference Proceedings (OSTI)

In recent years, Internet of Things (IoT) and Cloud Computing are the hottest issues of Future Internet. However, there is a lack of common fabric for integrating IoT and Cloud. In telecommunications, the IMS (IP Multimedia Subsystem), based on the All-IP ... Keywords: Cloud Computing, Future Internet, IP Multimedia Subsystem, Internet of Things, Next Generation Network

Chi-Yuan Chen; Yuh-Shyan Chen; Han-Chieh Chao; Tin-Yu Wu; Chun-I Fan; Jiann-Liang Chen; Jenq-Muh Hsu

2011-10-01T23:59:59.000Z

314

Balance of Power: Dynamic Thermal Management for Internet Data Centers  

Science Conference Proceedings (OSTI)

The advent of Internet-based applications and their resulting multitier distributed architecture has changed the focus of design for large-scale Internet computing. Internet server applications execute in a horizontally scalable topology across hundreds ... Keywords: dynamic thermal management, thermal-load balancing, Internet data center, row-wise and regional thermal management, thermal policies

Ratnesh K. Sharma; Cullen E. Bash; Chandrakant D. Patel; Richard J. Friedrich; Jeffrey S. Chase

2005-01-01T23:59:59.000Z

315

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

316

Internet of Things: Applications and Challenges in Technology and Standardization  

Science Conference Proceedings (OSTI)

The phrase Internet of Things (IoT) heralds a vision of the future Internet where connecting physical things, from banknotes to bicycles, through a network will let them take an active part in the Internet, exchanging information about themselves and ... Keywords: Internet of Things (IoT), Interoperability, Network protoocl, Privacy, Security, Wireless networks

Debasis Bandyopadhyay; Jaydip Sen

2011-05-01T23:59:59.000Z

317

Central Internet Database (CID) Contact Us  

Office of Environmental Management (EM)

Contact Us Central Internet Database CID Photo Banner Contact Us DOE Contact: Doug Tonkay Phone: (301) 903-7212 Email: douglas.tonkay@em.doe.gov Last ReviewedUpdated 3252011...

318

Some Internet Architectural Guidelines and Philosophy  

Science Conference Proceedings (OSTI)

This document extends RFC 1958 by outlining some of the philosophical guidelines to which architects and designers of Internet backbone networks should adhere. We describe the Simplicity Principle, which states that complexity is the primary mechanism ...

R. Bush; D. Meyer

2002-12-01T23:59:59.000Z

319

Overview and Principles of Internet Traffic Engineering  

Science Conference Proceedings (OSTI)

This memo describes the principles of Traffic Engineering (TE) in the Internet. The document is intended to promote better understanding of the issues surrounding traffic engineering in IP networks, and to provide a common basis for the development ...

D. Awduche; A. Chiu; A. Elwalid; I. Widjaja; X. Xiao

2002-05-01T23:59:59.000Z

320

Analytical Study on Internet Banking System  

E-Print Network (OSTI)

The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In order to led business to success, the business and specially the services should provide comfort use to its costumer. The bank system is one of the most important businesses who may use the website. The using for the web-based systems should contain special requirements to achieve the business goal. Since that the paper will present the functional and non-functional for the web-based banking system.

AlAbdullah, Fadhel S; Alnaqeib, Rami; Jalab, Hamid A; Zaidan, A A; Zaidan, B B

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

NIRA : a new Internet routing architecture  

E-Print Network (OSTI)

(cont.) mechanism, a user only needs to know a small region of the Internet in order to select a route to reach a destination. In addition, a novel route representation and packet forwarding scheme is designed such that a ...

Yang, Xiaowei, 1974-

2004-01-01T23:59:59.000Z

322

The Internet past, present and future  

Science Conference Proceedings (OSTI)

This paper charts the transformation of the Internet from its military and academic origins to its current status as a global network for multimedia information publishing and retrieval. It explains the basic technologies that have enabled this transformation ...

S. P. Sim; S. Rudkin

1997-04-01T23:59:59.000Z

323

Microsoft Word - Addendum_A_Divider.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

in the interior of the Kenai Peninsula. Historic Context Early Russian explorers sent by Peter the Great reached the North Pacific in the early 1700s. The first European explorer...

324

Undirected Graphs maze exploration  

E-Print Network (OSTI)

and Adar, 2004 corporate e-mail #12;5 Power transmission grid of Western US Reference: Duncan Watts #12 The Internet as mapped by The Opte Project http://www.opte.org #12;8 Graph terminology #12;9 Some graph

Sedgewick, Robert

325

The Internet Ecosystem- The Potential for Discrimination  

E-Print Network (OSTI)

The Federal Communication Commission is considering rules enforcing network neutrality and legislation proposing similar goals have been discussed in Congress. The goals of the proposed regulation and legislation are preserve an open Internet, but are specifically directed toward access networks, or the first link that directly connects users to the Internet. We argue that preserving open competition in a host of higher level Internet services is equally if not more important, but since the rate of technology innovation typically out-paces the need for regulation, there is no need to impose regulation at this time. Using specific examples focused on the visible Internet as well as new services and applications that enable rapid innovation, we argue that the Internet has fostered a history of technological and business solutions that overcome what seems to be certain market dominance. A key enabler of these changes is the emergence of technologies that lower the barrier for entry in developing and deploying new services. We argue that regulators should be aware of the potential for anti-competitive practices, but should carefully consider the effects of regulation on the full Internet ecosystem. We

Dirk Grunwald

2010-01-01T23:59:59.000Z

326

Development of Exploration Methods for Engineered Geothermal Systems  

Open Energy Info (EERE)

Development of Exploration Methods for Engineered Geothermal Systems Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Abstract N/A Author U.S. Department of Energy Published Publisher Not Provided, Date Not Provided DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and Geochemical Interpretation Citation U.S. Department of Energy. Development of Exploration Methods for Engineered Geothermal Systems through Integrated Geophysical, Geologic and

327

Microsoft Expression Design Step by Step, 1st edition  

Science Conference Proceedings (OSTI)

The smart way to learn Microsoft Expression Design one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, and hands-on exercises to master the fundamentals of creating professional-looking designs and illustrations ...

Sara Froehlich

2008-01-01T23:59:59.000Z

328

Integrating ISA Server 2006 with Microsoft Exchange 2007  

Science Conference Proceedings (OSTI)

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes ... Keywords: Applied, Computer Architecture, Computer Science, Computers, Information Management, Operating Systems, Security, Viruses

Fergus Strachan

2008-05-01T23:59:59.000Z

329

Remote access to the workstations: For Microsoft Windows Users  

E-Print Network (OSTI)

Remote access to the workstations: For Microsoft Windows Users: 1. Install the following" for a workstation you want to connect to. It will launch a new browser window that will load a VNC Java applet will be asked first to enter it before the applet loads. The applet opens a Java application window, please

Keinan, Alon

330

The use of e-government services and the Internet: The role of socio-demographic, economic and geographical predictors  

Science Conference Proceedings (OSTI)

This article explores the use of e-government services from the perspective of digital divides. First, it aims to find out which socio-demographic, economic and geographical factors predict the use of e-government services. Second, the article aims to ... Keywords: Adoption, Finland, Service, The Internet, Users, e-government

Sakari Taipale

2013-05-01T23:59:59.000Z

331

A Comparative Case Study of the I-mode Mobile Internet Service between in Japan and in Netherlands  

Science Conference Proceedings (OSTI)

What factors and processes drive value appropriation and value creation in interdependent industry ecosystems? This paper explores this issue through a case study comparing the deployment of the i-mode mobile Internet service in two countries, seeking ... Keywords: platform, industry architecture, value creation, value appropriation, mobile telephony industry

Chen Weizhu

2010-10-01T23:59:59.000Z

332

Oil and Gas Exploration  

E-Print Network (OSTI)

Metals Industrial Minerals Oil and Gas Geothermal Exploration Development Mining Processing Nevada, oil and gas, and geothermal activities and accomplishments in Nevada: production statistics, exploration and development including drilling for petroleum and geothermal resources, discoveries of ore

Tingley, Joseph V.

333

Petroleum - Exploration & Production - EIA  

U.S. Energy Information Administration (EIA)

Exploration and reserves, storage, imports and exports, production, prices, sales. Electricity. ... Oil Production Capacity Expansion Costs for the Persian Gulf.

334

Internet Use and Political Engagement: The Role of E-Campaigning as a Pathway to Online Political Participation  

E-Print Network (OSTI)

Information Poverty, and the Internet. Cambridge: Cambridgeparticipations and the internet: assessing effects, causalthe Representativeness of Internet Political Participation,

Cantijoch, Marta; Cutts , David; Gibson, Rachel

2013-01-01T23:59:59.000Z

335

Original article Trends in Youth Internet Victimization: Findings From Three Youth Internet Safety Surveys 20002010  

E-Print Network (OSTI)

Purpose: The purpose of this research was to explore the trends in youth reports of unwanted online sexual solicitation, harassment, and exposure to pornography over time. Methods: The study was based on three separate cross-sectional national telephone surveys of approximately 1,500 youth Internet users, aged 10 through 17 years. Data were collected in 2000, 2005, and 2010. Results and Conclusion: Nine percent of youth reported an unwanted sexual solicitation in 2010. This continued the decline in unwanted sexual solicitations that occurred between 2000 (19%) and 2005 (13%), resulting in a total 50 % decrease between 2000 and 2010. Twenty-three percent of youth reported an unwanted exposure to pornography, a decline from 34 % in 2005, following an increase between 2000 and 2005 (25 % to 34%). However, marking the only trend to show an increase over the past 5 years, 11 % of youth reported an online harassment experience, which was an increase from 9 % in 2005, and 6 % in 2000. Some differences in these trends were noted for subgroups of youth across age, gender, and race. The trends in unwanted experiences online over the past decade identified by three Youth Internet Safety Surveys may contradict impressions that the general population, professionals, and the media have about what is happening. Trends provide evidence for some optimism that protective adaptations to the online environment have

unknown authors

2011-01-01T23:59:59.000Z

336

The FourTh Paradigm in PracTice Science@Microsoft  

E-Print Network (OSTI)

States), Marty Humphrey (University of virginia, United States), and Catharine van Ingen (Microsoft-Wei Cheah, and Catharine van Ingen addressed the computational challenges by building a four-stage data is critical. To enable such studies, Microsoft Research's Catharine van Ingen and lawrence Berkeley National

Chaudhuri, Surajit

337

Microsoft Word - DOE E-Government Act Report 11.16.06 Final.doc...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Word - DOE E-Government Act Report 11.16.06 Final.doc Microsoft Word - DOE E-Government Act Report 11.16.06 Final.doc Microsoft Word - DOE E-Government Act Report 11.16.06...

338

International Spanish/English Internet Smoking Cessation Trial Yields 20% Abstinence Rates at 1 Year  

E-Print Network (OSTI)

trial . Journal of Medical Internet Research , 10 , e36 .Journal of Medical Internet Research , 7 , e2 . Eysenbach ,Journal of Medical Internet Research , 7 , e11 . Feil , E.

Muoz, Ricardo F.; Barrera, Alinne Z.; Delucchi, Kevin; Penilla, Carlos; Torres, Leandro D.; Prez-Stable, Eliseo J.

2009-01-01T23:59:59.000Z

339

Can Emergency Medicine Residents Reliably Use the Internet to Answer Clinical Questions?  

E-Print Network (OSTI)

Google as a diagnostic aid: internet based study. BMJ. 2006;Engine Watch. Estimated Internet pages. Search Engine WatchResidents Reliably Use the Internet to Answer Clinical

Krause, Richard; Moscati, Ronald; Halpern, Shravanti; Schwartz, Diane G.; Abbas, June

2011-01-01T23:59:59.000Z

340

Microsoft Word - FCT-2012_Final.docx  

Office of Legacy Management (LM)

Opening this road makes the site more susceptible to potential trespass and vandalism. Oil and gas exploration has increased significantly in the area. New underground pipelines...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

of Energy Models are used throughout all aspects of oil & gas industry operations * Exploration * Appraisal * Production * Facilities design * Safety and environmental...

342

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

CO 2 containment. In addition, multiple perforations resulting from intensive hydrocarbon exploration and production have weakened seal integrity in many favorable locations. Even...

343

Microsoft Word - NT42960R17.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of experts in distinct disciplines. The expected outcomes of this project are improved exploration and production technology for production of natural gas from methane hydrates...

344

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

345

V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of 7: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability V-217: Microsoft Windows NAT Driver ICMP Packet Handling Denial of Service Vulnerability August 14, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in the Windows NAT Driver PLATFORM: Windows Server 2012 ABSTRACT: This security update resolves a vulnerability in the Windows NAT Driver in Microsoft Windows REFERENCE LINKS: Secunia Advisory SA54420 Security Tracker ID 1028909 Microsoft Security Bulletin MS13-064 CVE-2013-3182 IMPACT ASSESSMENT: Medium DI SCUSSION: The vulnerability is caused due to an error within the Windows NAT Driver when handling ICMP packets and can be exploited to cause the system to stop responding IMPACT: Denial of Service SOLUTION: Vendor has released a security update

346

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Microsoft SharePoint Multiple Flaws Permit Cross-Site 5: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

347

T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: Microsoft SharePoint Multiple Flaws Permit Cross-Site 15: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks T-715: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks September 13, 2011 - 12:35pm Addthis PROBLEM: Multiple vulnerabilities were reported in Microsoft SharePoint. A remote user can conduct cross-site scripting attacks. PLATFORM: Version(s): SharePoint software ABSTRACT: Microsoft SharePoint Multiple Flaws Permit Cross-Site Scripting Attacks. reference LINKS: MS11-074: Article ID: 2552998 SecurityTracker Alert ID: 1026040 CVE-2011-1893 CVE-2011-1892 CVE-2011-1891 CVE-2011-1890 CVE-2011-0653 IMPACT ASSESSMENT: High Discussion: A remote user can create a specially crafted URL or web site that, when loaded by a target user, will cause arbitrary scripting code to be executed

348

Internet Resource Pricing Models, Mechanisms, and Methods  

E-Print Network (OSTI)

With the fast development of video and voice network applications, CDN (Content Distribution Networks) and P2P (Peer-to-Peer) content distribution technologies have gradually matured. How to effectively use Internet resources thus has attracted more and more attentions. For the study of resource pricing, a whole pricing strategy containing pricing models, mechanisms and methods covers all the related topics. We first introduce three basic Internet resource pricing models through an Internet cost analysis. Then, with the evolution of service types, we introduce several corresponding mechanisms which can ensure pricing implementation and resource allocation. On network resource pricing methods, we discuss the utility optimization in economics, and emphasize two classes of pricing methods (including system optimization and entities' strategic optimizations). Finally, we conclude the paper and forecast the research direction on pricing strategy which is applicable to novel service situation in the near future.

He, Huan; Liu, Ying

2011-01-01T23:59:59.000Z

349

Hyperspectral mineral mapping in support of geothermal exploration-  

Open Energy Info (EERE)

mineral mapping in support of geothermal exploration- mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Hyperspectral mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA Abstract N/A Authors B. A. Martini, E. A. Silver, W. L. Pickles and P. A. Cocks Conference Geothermal Resources Council Annual Meeting; Morelia, Mexico; 2004 Published Geothermal Resources Council Annual Meeting;, 2004 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Hyperspectral mineral mapping in support of geothermal exploration- Examples from Long Valley Caldera, CA and Dixie Valley, NV, USA

350

Egs Exploration Methodology Project Using the Dixie Valley Geothermal  

Open Energy Info (EERE)

Egs Exploration Methodology Project Using the Dixie Valley Geothermal Egs Exploration Methodology Project Using the Dixie Valley Geothermal System, Nevada, Status Update Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Egs Exploration Methodology Project Using the Dixie Valley Geothermal System, Nevada, Status Update Authors Joe Iovenitti, Jon Sainsbury, Ileana Tibuleac, Robert Karlin, Philip Wannamaker, Virginia Maris, David Blackwell, Mahesh Thakur, Fletcher H. Ibser, Jennifer Lewicki, B. Mack. Kennedy and Michael Swyer Conference Thirty-Eighth Workshop on Geothermal Reservoir Engineering Stanford University; Stanford, California; 2013 Published Publisher Not Provided, 2013 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Egs Exploration Methodology Project Using the

351

Microsoft Word - EJPublicParticipation.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Environmental Justice and Public Participation Through Electronic Access Table of Contents * Introduction * Environmental Justice, Public Participation, Computers and the Internet * Capacity Building in Federal Facility Communities * Environmental Justice and Public Participation Through Electronic Access Summary * Conference Index Introduction For more than a decade, Hyde Park residents and other community residents have worked to improve our living conditions. Our work has been hampered by the multitude of industrial facilities, literally in our back yards. While some of these industrial facilities are inactive, others still operate. We are making progress. We are pleased that Melinda Downing from the Department of Energy, Marsha Minter from the

352

CAPRI: A Common Architecture for Distributed Probabilistic Internet Fault Diagnosis  

E-Print Network (OSTI)

This thesis presents a new approach to root cause localization and fault diagnosis in the Internet based on a Common Architecture for Probabilistic Reasoning in the Internet (CAPRI) in which distributed, heterogeneous ...

Lee, George J.

2007-06-04T23:59:59.000Z

353

An Internet multicast system for the stock market  

Science Conference Proceedings (OSTI)

We are moving toward an international, 24-hour, distributed, electronic stock exchange. The exchange will use the global Internet, or internet technology. This system is a natural application of multicast because there are a large number of receivers ... Keywords: multicast

2001-08-01T23:59:59.000Z

354

The dynamics of Internet publishing on the computer book industry  

E-Print Network (OSTI)

The Internet has been a disruptive force for many industries, but perhaps none more so than in the publishing business. While many segments of the publishing industry have made attempts to use the Internet to augment or ...

Allen, Robbie (Robbie C.)

2006-01-01T23:59:59.000Z

355

Fighting Internet Auction Fraud: An Assessment and Proposal  

Science Conference Proceedings (OSTI)

Although online auctions constitute one of the most successful Internet business models, auction fraud has become the largest component of all Internet fraud. Traditional government organizations have joined auction businesses in trying to develop new ...

Cecil Eng Huang Chua; Jonathan Wareham

2004-10-01T23:59:59.000Z

356

E-Lections: Voting Behavior and the Internet  

E-Print Network (OSTI)

comments and suggestions. We further thank Deutsche Telekom AG for providing data on the voice telephony network and IVW for providing data on newspaper circulation. E-Lections: Voting Behavior and the Internet This paper analyses the effect of information disseminated by the Internet on voting behavior. We address endogeneity in Internet availability by exploiting regional and technological peculiarities of the preexisting voice telephony network that hinder the roll-out of fixed-line broadband infrastructure for high-speed Internet. We find small negative effects of Internet availability on voter turnout, and no evidence that the Internet systematically benefits single parties. Robustness tests including placebo estimations from the pre-Internet era confirm our results. We relate differences in the Internet effect between national and local elections to a crowding out of national but not local newspapers. JEL Codes: Keywords:

Oliver Falck; Robert Gold; Stephan Heblich; Acknowledgments We; Sascha Becker; Nina Czernich; Rob Fairlie; Ronny Freier; Tarjei Havnes; Jed Kolko; Fabian Waldinger; Ludger Woessmann

2012-01-01T23:59:59.000Z

357

The Research of Internet Shopping Customer Value Model  

Science Conference Proceedings (OSTI)

The existing empirical study of Internet shopping in literature, mostly concerned about the interaction relationship of retailer and customer, few scholars study the process of transactions between customers and other services suppliers, by assaying ... Keywords: Internet Shopping, Stakeholders, Customer Value

Xiao-bin Liu; Ming-qing Qiu

2010-05-01T23:59:59.000Z

358

Yrityksen internet-markkinoinnin kehittmissuunnitelma case Intersport Megastore Lnsikeskus Turku.  

E-Print Network (OSTI)

??Tmn opinnytetyn aiheena oli Internet-markkinoinnin kehittminen Intersport Megastore Lnsikeskukselle. Tutkimuksessa kydn lpi yleisimmt Internet-markkinoinnin muodot perinteisist mainosbannereista aina uusimpiin muotoihin kuten sosiaaliseen mediaan. Tutkimuksessa on (more)

Lehto, Juha

2011-01-01T23:59:59.000Z

359

Ghost at the machine : Internet addiction and compulsive computer use  

E-Print Network (OSTI)

Technology use-particularly the use of the Internet-is a pervasive component of modem society. The Internet has changed the way we work and the way we play, creating new possibilities for self expression and communication. ...

VanCott, Rachel Diane

2008-01-01T23:59:59.000Z

360

Cognitive processing differences between frequent and infrequent Internet users  

Science Conference Proceedings (OSTI)

The Internet is rapidly transforming a range of human activities; socio-cognitive theory assumes that engagement in transformed activities, over time, transforms human cognition. Four hundred and six college students completed four modified cognitive ... Keywords: Cognition, Internet use

G. M. Johnson

2008-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Microsoft Word - What's New in Outlook 2007.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

What's New in Outlook 2007? What's New in Outlook 2007? Help The Help option has additional topics in Outlook 2007. Some of the most useful ones are under the Microsoft Office Outlook Help menu item. "What's New" and "Training" are both helpful. What's New in Outlook 2007? What's New? One topic that we recommend is "Getting to know you; again: The Ribbon". It explains the use of the Ribbon that we will be discussing later in this document. What's New in Outlook 2007? Training The Training option provides numerous small training modules that you can read to learn about specific areas within Outlook 2007. It also has an "Outlook 2007 Training Courses" option that provides links to a variety of online training courses provided by Microsoft. A great training resource that you can link to

362

Microsoft PowerPoint - TemplatesrnlTechBriefp1.ppt  

NLE Websites -- All DOE Office Websites (Extended Search)

NAPL Calculator NAPL Calculator at a glance  easy and quick  based on microsoft excel  guides clean-up decision making  works with soil, soil vapor, or groundwater samples The NAPL Calculator is an analytical model that is a self- executing Microsoft Excel workbook that requires qualitative/quantitative soil, groundwater, or soil vapor sample results and a few simple geotechnical parameters. A classic chemistry approach is used that is based on the work of Shiu, Feenstra, McKay and Cherry and is advocated by the U.S. Environmental Protection Agency. The method is known to many academics and researchers but not to many practitioners in environmental clean-up. Even for those who know the method, the calculation can be laborious. The NAPL Calculator is designed to make this

363

Management of the Future Internet: Status and Challenges  

Science Conference Proceedings (OSTI)

The 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI 2012) was held on April 16, 2012 in Maui, USA. This report summarizes the keynotes, presentations and discussions in ManFI 2012 and provides a high-level view of ideas, ... Keywords: Autonomic networking, Future Internet, Future Internet management, Management architecture, Network management, OpenFlow-based Future Internet architectures

Filip Turck; Yoshiaki Kiriha; James Won-Ki Hong

2012-12-01T23:59:59.000Z

364

Humanities and Arts: Sharing Center Stage on the Internet  

Science Conference Proceedings (OSTI)

This document is designed primarily for individuals who have limited knowledge of, or experience with, the Internet.

J. Max; W. Stickle

1997-10-01T23:59:59.000Z

365

Antitrust Analysis for the Internet Upstream Market: a BGP Approach  

E-Print Network (OSTI)

IXPs are independent organizations composed by Internet Service Providers, where they can route their traffic in a cost effective and technically efficient way. 4 These data were obtained for research purposes from the London Internet Exchange Point... , and UUNET played a major role in transporting packets across the Internet. Cossa (2000) considered a dataset from Boardwatch magazine Internet Service Providers Directory, 1999s edition, showing the breakdown of 8,950 backbone connections from 5...

D'Ignazio, Alessio; Giovannetti, Emanuele

2006-03-14T23:59:59.000Z

366

Microsoft Word - Agenda F&I Update 090804.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Room GH-019 Agenda Call in Number 301-903-6379 Confirmation Number 253041 Internet Access and Projector Will Be Available The presentations will be available via...

367

Live Video Scheduling in Differentiated Services Internet  

Science Conference Proceedings (OSTI)

Future Internet services will be judged to a large degree by the efficient deployment of real-time applications. The issue of utilisation is especially central for the economic introduction of live video in packet switching networks; at the same time, ...

Themistoklis Rapsomanikis

2000-09-01T23:59:59.000Z

368

LITERATURE SEARCH TUTORIAL Open Internet Browser  

E-Print Network (OSTI)

://www.ncbi.nlm.nih.gov/entrez/query.fcgi · To search PubMed--fill in search box enter search terms, or enter author name, or journal titles--see instructions written below search box. To obtain detailed instructions on how to enter items, click on blueLITERATURE SEARCH TUTORIAL · Open Internet Browser · Go to http

Dratz, Edward A.

369

Photovoltaic system planning tool with internet access  

Science Conference Proceedings (OSTI)

This paper presents advanced planning models integrated into a GIS-computational tool, based on a Geographic Information System, for evaluating solar energy resources, selecting the most suitable photovoltaic technology, and calculating the cost associated ... Keywords: distributed generation planning, internet GIS services, photovoltaic systems

I. J. Ramrez-Rosado; P. J. Zorzano-Santamara; L. A. Fernndez-Jimnez; E. Garca-Garrido

2007-01-01T23:59:59.000Z

370

User and network interplay in internet telemicroscopy  

Science Conference Proceedings (OSTI)

Remote access of electron microscopes over the Internet (i.e., Telemicroscopy) is a unique network-dependent immersive multimedia application. It demands high-resolution (2D and 3D) video image transfers with simultaneous real-time mouse and keyboard ...

Prasad Calyam; Nathan Howes; Abdul Kalash; Mark Haffner

2007-10-01T23:59:59.000Z

371

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

372

On the Module of Internet Banking System  

E-Print Network (OSTI)

Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is u...

Alanazi, Hamdan O; Hmood, Ali K; Zaidan, M A; Al-Nabhani, Yahya

2010-01-01T23:59:59.000Z

373

On inferring and characterizing internet routing policies  

Science Conference Proceedings (OSTI)

Border Gateway Protocol allows Autonomous Systems (ASs) to apply diverse routing policies for selecting routes and for propagating reachability information to other ASs. Although a significant number of studies have been focused on the Internet topology, ... Keywords: BGP, routing policies, traffic engineering

Feng Wang; Lixin Gao

2003-10-01T23:59:59.000Z

374

Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe  

E-Print Network (OSTI)

In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared. This proposed measurement scheme uses HTTP GET method for each connections. The normalized responses to identified sites like gateways of ISPs, google.com etc are used for calculating current link stability. The novelty of the approach is that historic values are used to calculate overall link stability. In this discussion, we also document a method to use the calculated values as a dynamic threshold metric. This is used in routing decisions and for load-balancing each of the connections in an aggregated bandwidth pipe. This scheme is a very popular practice in aggregated internet connections.

M, Vipin

2009-01-01T23:59:59.000Z

375

Algorithms for Large-Scale Internet Measurements  

E-Print Network (OSTI)

As the Internet has grown in size and importance to society, it has become increasingly difficult to generate global metrics of interest that can be used to verify proposed algorithms or monitor performance. This dissertation tackles the problem by proposing several novel algorithms designed to perform Internet-wide measurements using existing or inexpensive resources. We initially address distance estimation in the Internet, which is used by many distributed applications. We propose a new end-to-end measurement framework called Turbo King (T-King) that uses the existing DNS infrastructure and, when compared to its predecessor King, obtains delay samples without bias in the presence of distant authoritative servers and forwarders, consumes half the bandwidth, and reduces the impact on caches at remote servers by several orders of magnitude. Motivated by recent interest in the literature and our need to find remote DNS nameservers, we next address Internet-wide service discovery by developing IRLscanner, whose main design objectives have been to maximize politeness at remote networks, allow scanning rates that achieve coverage of the Internet in minutes/hours (rather than weeks/months), and significantly reduce administrator complaints. Using IRLscanner and 24-hour scan durations, we perform 20 Internet-wide experiments using 6 different protocols (i.e., DNS, HTTP, SMTP, EPMAP, ICMP and UDP ECHO). We analyze the feedback generated and suggest novel approaches for reducing the amount of blowback during similar studies, which should enable researchers to collect valuable experimental data in the future with significantly fewer hurdles. We finally turn our attention to Intrusion Detection Systems (IDS), which are often tasked with detecting scans and preventing them; however, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast stealth techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a novel model for the windowexpiration rules of popular IDS tools (i.e., Snort and Bro), derive the probability that existing scan patterns (i.e., uniform and sequential) are detected by each of these tools, and prove the existence of stealth-optimal patterns.

Leonard, Derek Anthony

2010-12-01T23:59:59.000Z

376

Assessing the Security of a CleanSlate Internet Architecture  

E-Print Network (OSTI)

designed a clean­slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, withoutAssessing the Security of a Clean­Slate Internet Architecture Gowtham Boddapati # John Day clean­ slate internet architectures. Our own investigations into the fundamental principles

Texas at Arlington, University of

377

The emerging Internet governance mosaic: connecting the pieces  

Science Conference Proceedings (OSTI)

The report highlights key Internet governance issues raised in relation to the authors' three-tier typology. The distinctive design and governance characteristics that underpin the global Internet phenomenon are then outlined, to indicate valuable governance ... Keywords: Internet, cyberspace, governance, multi-stakeholder, policy

William H. Dutton; Malcolm Peltu

2007-01-01T23:59:59.000Z

378

Traffic characterization and internet usage in rural Africa  

Science Conference Proceedings (OSTI)

While Internet connectivity has reached a significant part of the world's population, those living in rural areas of the developing world are still largely disconnected. Recent efforts have provided Internet connectivity to a growing number of remote ... Keywords: internet usage, interviews, rural networks

David L. Johnson; Veljko Pejovic; Elizabeth M. Belding; Gertjan van Stam

2011-03-01T23:59:59.000Z

379

Quantifying video-QoE degradations of internet links  

Science Conference Proceedings (OSTI)

With the proliferation of multimedia content on the Internet, there is an increasing demand for video streams with high perceptual quality. The capability of present-day Internet links in delivering high-perceptual-quality streaming services, however, ... Keywords: digital video broadcasting, internet, quality of experience (QoE)

Mukundan Venkataraman; Mainak Chatterjee

2012-04-01T23:59:59.000Z

380

Automatic Exploration of Datacenter performance Regimes  

E-Print Network (OSTI)

Horizontally scalable Internet services present an opportunity to use automatic resource allocation strategies for system management in the datacenter. In most of the previous work, a controller employs a performance model of the system to make decisions about the optimal allocation of resources. However, these models are usually trained offline or on a small-scale deployment and will not accurately capture the performance of the controlled application. To achieve accurate control of the web application, the models need to be trained directly on the production system and adapted to changes in workload and performance of the application. In this paper we propose to train the performance model using an exploration policy that quickly collects data from different performance regimes of the application. The goal of our approach for managing the exploration process is to strike a balance between not violating the performance SLAs and the need to collect sufficient data to train an accurate performance model, which requires pushing the system close to its capacity. We show that by using our exploration policy, we can train a performance model of a Web 2.0 application in less than an hour and then immediately use the model in a resource allocation controller.

Peter Bodk; Rean Griffith; Charles Sutton; O Fox; Michael I. Jordan; David A. Patterson

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A Vigorous Explorer Program  

E-Print Network (OSTI)

Explorers have made breakthroughs in many fields of astrophysics. The science from both these missions contributed to three Nobel Prizes - Giacconi (2002), Mather, and Smoot (2006). Explorers have: marked the definitive beginning of precision cosmology, discovered that short gamma-ray bursts are caused by compact star mergers and have measured metalicity to redshifts z>6. NASA Explorers do cutting-edge science that cannot be done by facility-class instruments. The Explorer program provides a rapid response to changing science and technology, to enable cutting-edge science at moderate cost. Explorers also enable innovation, and engage & train scientists, managers and engineers, adding human capital to NASA and the nation. The astrophysics Explorer launch rate now being achieved is 1 per 3 years, and budget projections are in the $150M/year range for the next five years. A newly Vigorous Explorer Program should be created to: 1. Reach the long-stated goal of annual astrophysics launches; 2. Find additional ...

Elvis, Martin; Brissenden, Roger; Chakrabarti, Supriya; Cherry, Michael; Devlin, Mark; Edelstein, Jerry; Eisenhardt, Peter; Feldman, Paul; Ford, Holland; Gehrels, Neil; Golub, Leon; Marshall, Herman; Martin, Christopher; Mather, John; McCandliss, Stephan; McConnell, Mark; McDowell, Jonathan; Meier, David; Millan, Robyn; Mitchell, John; Moos, Warren; Murray, Steven S; Nousek, John; Oegerle, William; Ramsey, Brian; Green, James; Grindlay, Jonathan; Kaaret, Philip; Kaiser, Mary Elizabeth; Kaltenegger, Lisa; Kasper, Justin; Krolik, Julian; Kruk, Jeffrey W; Latham, David; MacKenty, John; Mainzer, Amanda; Ricker, George; Rinehart, Stephen; Romaine, Suzanne; Scowen, Paul; Silver, Eric; Sonneborn, George; Stern, Daniel; Swain, Mark; Swank, Jean; Traub, Wesley; Weisskopf, Martin; Werner, Michael; Wright, Edward

2009-01-01T23:59:59.000Z

382

Snap: Robust Tool for Internet-wide Operating System Fingerprinting  

E-Print Network (OSTI)

Different approaches have been developed for TCP/IP fingerprinting, but none of these approaches is suited for Internet-wide fingerprinting. In this work, we develop approaches that rigorously tackle the issue of noise and packet loss while carrying out Internet-wide fingerprinting. We then carry out an Internet-wide scan to determine the distribution of different operating systems on the Internet. The results of our scan indicate that there are approximately 8.9 million publicly accessible web-servers on the Internet running Linux, while there are nearly 9.6 million web-servers with different embedded operating systems.

Nandwani, Ankur Bharatbhushan

2010-12-01T23:59:59.000Z

383

Internet- versus Telephone-based Local Outbreak Investigations  

E-Print Network (OSTI)

We compared 5 locally conducted, Internet-based outbreak investigations with 5 telephone-based investigations. Internet-based surveys required less completion time, and response rates were similar for both investigation methods. Participant satisfaction with Internet-based surveys was high. Although the Internet has been increasingly used in epidemiologic research, its use for investigation of infectious disease outbreaks has been less frequently described. Most reports of Internet-based outbreak investigations have described large, single outbreaks conducted by national or state public health agencies. Examples of reported Internet-based outbreak investigations include a communitywide norovirus outbreak in Finland, a communitywide Cryptosporidium outbreak in Kansas, a multistate Salmonella outbreak, and a conjunctivitis outbreak at a university (14). These reports noted several advantages of Internet use, including reductions in resource use, workload, and time required for survey completion and data entry (14). However, these advantages are not generally quantified in outbreak reports. Moreover, Internetbased outbreak investigations are seldom reported from the local health department level, where resources are often constrained compared with those of state and national agencies. We offer an analysis of several small Internetbased outbreak investigations conducted at the local level. We describe response rates to Internet-based surveys with and without telephone follow-up, the time needed to complete Internet-based outbreak surveys in comparison with traditional telephone surveys, participant satisfaction with Internet-based surveys, and differences in Internet-based outbreak investigations based on the respondents setting: professional versus household.

Tista S. Ghosh; Jennifer L. Patnaik; Nisha B. Alden; Richard L. Vogt

2006-01-01T23:59:59.000Z

384

DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

OSTI Home DDE Home DDE FAQs Help Site Map Contact Us Save searches, create alerts and export data :Sign In orCreate Account DOE Data Explorer Search Find Advanced Search Options...

385

DOE Data Explorer -  

Office of Scientific and Technical Information (OSTI)

OSTI Home DDE Home DDE FAQs Help Site Map Contact Us Save searches, create alerts and export data :Sign In orCreate Account DOE Data Explorer Search Find Advanced Search Options...

386

DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

DDE Discovering data and non-text information in the Department of Energy DOE Data Explorer What's New About DDE DOE Data Centers OSTI's Data ID Service Featured Collection...

387

Exploring Beowulf clusters  

Science Conference Proceedings (OSTI)

Beowulf clusters provide the computational power of parallel programming at minimal cost, making this technology available to small colleges and individual labs. In this paper, we explore the construction and programming of four distinct varieties of ...

Marsha Meredith; Teresa Carrigan; James Brockman; Timothy Cloninger; Jaroslav Privoznik; Jeffery Williams

2003-04-01T23:59:59.000Z

388

A Model of the Fresh Internet  

E-Print Network (OSTI)

Previous models of the Web graph have highlighted some interesting properties, but have failed to describe the behavior of new content, especially how links to newly created pages appear. We experimentally study new Internet content using real-world data collected at Yandex (Russia's most popular search engine) and then we propose a new model of the Web graph, which reflects the behavior of such new content. We show through a set of experiments that this model realistically predicts the personalized PageRank and the diameter of new Internet content, something already existing models did not do. This model can be used for crawling, for example to define and tune crawl policies to improve the freshness of a search engine's index.

Lefortier, Damien; Samosvat, Egor

2012-01-01T23:59:59.000Z

389

Hybrid Trust Model for Internet Routing  

E-Print Network (OSTI)

The current Internet is based on a fundamental assumption of reliability and good intent among actors in the network. Unfortunately, unreliable and malicious behaviour is becoming a major obstacle for Internet communication. In order to improve the trustworthiness and reliability of the network infrastructure, we propose a novel trust model to be incorporated into BGP routing. In our approach, trust model is defined by combining voting and recommendation to direct trust estimation for neighbour routers located in different autonomous systems. We illustrate the impact of our approach with cases that demonstrate the indication of distrusted paths beyond the nearest neighbours and the detection of a distrusted neighbour advertising a trusted path. We simulated the impact of weighting voted and direct trust in a rectangular grid of 15*15 nodes (autonomous systems) with a randomly connected topology.

Rantala, Pekka; Isoaho, Jouni

2011-01-01T23:59:59.000Z

390

Central Internet Database (CID) About the CID  

Office of Environmental Management (EM)

Home > About the CID Home > About the CID Central Internet Database CID Photo Banner About CID Overview Since its public release in 2000, the Central Internet Database (CID) has provided users with Department of Energy (DOE) waste management, cleanup, and facility information. The 2008 update of the CID is the first comprehensive update of the CID since its initial release. Several changes have been made in this new version of the CID. Most importantly the number and types of reports has been changed to reflect current DOE data collection. Also, in an effort to reduce redundancy with other DOE data reporting systems, the CID now directs users to other systems for radioactive waste information. Users will still be able to access the more detailed radioactive waste and contaminated media data previously featured in the CID by using the Archived Reports menu.

391

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Petroleum Exploration & Environmental Geochemistry to Carbon Sequestration Petroleum Exploration & Environmental Geochemistry to Carbon Sequestration EXECUTIVE SUMMARY Recent interest in carbon sequestration has generated a need to monitor for carbon dioxide leakage over a variety of subsurface storage reservoirs. The determination of whether and how much sequestered CO 2 may be leaking from a subsurface reservoir requires that the measurements be made within natural geologic conduits that can be defined by mapping the distribution of thermogenic hydrocarbon seeps associated with the subject reservoirs. Soil gas data from exploration and environmental surveys are presented as a series of case studies that provides effective guidance for locating these natural conduits. An extensive soil gas data base is presented that includes surveys

392

Internet and political communication - Macedonian case  

E-Print Network (OSTI)

Analysis how to use Internet influence to the process of political communication, marketing and the management of public relations, what kind of online communication methods are used by political parties, and to assess satisfaction, means of communication and the services they provide to their partys voters (people) and other interest groups and whether social networks can affect the political and economic changes in the state, and the political power of one party.

Emruli, Sali

2011-01-01T23:59:59.000Z

393

Security Survey of Internet Browsers Data Managers  

E-Print Network (OSTI)

The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

Boja, Catalin

2011-01-01T23:59:59.000Z

394

Correlated Resource Models of Internet End Hosts  

E-Print Network (OSTI)

Understanding and modelling resources of Internet end hosts is essential for the design of desktop software and Internet-distributed applications. In this paper we develop a correlated resource model of Internet end hosts based on real trace data taken from the SETI@home project. This data covers a 5-year period with statistics for 2.7 million hosts. The resource model is based on statistical analysis of host computational power, memory, and storage as well as how these resources change over time and the correlations between them. We find that resources with few discrete values (core count, memory) are well modeled by exponential laws governing the change of relative resource quantities over time. Resources with a continuous range of values are well modeled with either correlated normal distributions (processor speed for integer operations and floating point operations) or log-normal distributions (available disk space). We validate and show the utility of the models by applying them to a resource allocation ...

Heien, Eric M; David, Anderson

2010-01-01T23:59:59.000Z

395

Exploration Drilling | Open Energy Information  

Open Energy Info (EERE)

Exploration Drilling Exploration Drilling Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Exploration Drilling Details Activities (0) Areas (0) Regions (0) NEPA(15) Exploration Technique Information Exploration Group: Drilling Techniques Exploration Sub Group: Exploration Drilling‎ Parent Exploration Technique: Drilling Techniques Information Provided by Technique Lithology: Identify lithology and mineralization, provide core samples and rock cuttings Stratigraphic/Structural: Retrieved samples can be used to identify stratigraphy and structural features such as fracture networks or faults Hydrological: -Water samples can be used for geochemical analysis -Fluid pressures can be used to estimate flow rates Thermal: -Temperatures can be measured within the hole

396

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion, 1st edition  

Science Conference Proceedings (OSTI)

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). ...

Jim Harrison; Yuri Diogenes; Mohit Saxena

2010-02-01T23:59:59.000Z

397

Microsoft Word - Press Release RECOMP 2-8-08 REV FINAL.doc |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Press Release RECOMP 2-8-08 REV FINAL.doc More Documents & Publications USA RS Basic Contract - Contract No.: DE-RW0000005 Data Center Optimization Plan Microsoft Word - Document2...

398

Microsoft Word - Press Release RECOMP 2-8-08 REV FINAL.doc |...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications USA RS Basic Contract - Contract No.: DE-RW0000005 Data Center Optimization Plan Microsoft Word - AL-Consolidated Approps FY 2008 as of feb 21...

399

Microsoft Word - NNSA Logistics A-76 Post - MEO VV Review Report...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Post - MEO VV Review Report 111.doc More Documents & Publications Microsoft Word - Graphics A-76 Post - MEO VV Review Report F.doc Attachment 14 Sample LOO.doc&0; O:A76Post...

400

Microsoft Word - AcqGuide16pt1 Nov 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

- AcqGuide16pt1 Nov 2010 Microsoft Word - AcqGuide16pt1 Nov 2010 More Documents & Publications OPAM Policy Acquisition Guides Chapter 16 - Types of Contracts Policy Flash 2012-56...

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Microsoft PowerPoint - 15.1025_Bosco_PM Workshop Mar15_2010 ...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

More Documents & Publications JunePMCDPNewsletterFinal.pdf June 2011 PMCDP Newsletter Microsoft PowerPoint - DOE O 413 3B Brief v9 with key points in notes Read-Only...

402

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc | Department...  

NLE Websites -- All DOE Office Websites (Extended Search)

SMailSecureWeb-BasedEmailv3 2.doc Microsoft Word - SMailSecureWeb-BasedEmailv3 2.doc Instructions for Using Secure Email via Outlook Web Access More Documents &...

403

Microsoft Word - GRS Review_OMB White Paper - Real Property Right...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GRS ReviewOMB White Paper - Real Property Right-sizing and Carbon Reduction August 7 2009 2.docx Microsoft Word - GRS ReviewOMB White Paper - Real Property Right-sizing and...

404

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Microsoft Active Directory CRL Validation Flaw Lets Remote 1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication November 9, 2011 - 8:30am Addthis PROBLEM: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1

405

U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - 32: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical U-032: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical November 9, 2011 - 1:00pm Addthis PROBLEM: Microsoft Security Bulletin Windows TCP/IP MS11-083 - Critical. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Active Directory Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows 7 for 32-bit Systems Windows 7 for 32-bit Systems Service Pack 1 Windows 7 for x64-based Systems

406

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

407

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

408

V-133: Microsoft pulls Patch Tuesday security fix | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Microsoft pulls Patch Tuesday security fix 3: Microsoft pulls Patch Tuesday security fix V-133: Microsoft pulls Patch Tuesday security fix April 14, 2013 - 6:00am Addthis PROBLEM: Microsoft pulls Patch Tuesday security fix PLATFORM: Windows XP Service Pack 3,Windows XP Professional x64 Edition Service Pack 2, Windows Server 2003 Service Pack 2, Windows Server 2003 x64 Edition Service Pack 2, Windows Server 2003 with SP2 for Itanium-based Systems,Windows Vista Service Pack 2, Windows Vista x64 Edition Service Pack 2, Windows Server 2008 for 32-bit Systems Service Pack 2, Windows Server 2008 for x64-based Systems Service Pack 2, Windows Server 2008 for Itanium-based Systems Service Pack 2Windows 7 for 32-bit Systems, Windows 7 for 32-bit Systems Service Pack 1, Windows 7 for x64-based Systems, Windows

409

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for Itanium-based Systems Service Pack 2 Windows 7 for 32-bit Systems and Windows 7 for 32-bit Systems Service Pack

410

The Unintended Consequences of Internet Diffusion: Evidence from Malaysia  

E-Print Network (OSTI)

Job Market Paper Can the internet promote democratization by weakening government control of the media? To examine this question, I develop a model where internet penetration decreases incumbent party vote share by greatly increasing the cost of buying off the media. I test the model against evidence from Malaysia, where the incumbent coalition lost its 40 year monopoly on power in 2008. I use data matching IP addresses with physical locations to construct a measure of internet growth in Malaysia from 2004 to 2008. Using an instrumental variable approach, I find that areas with higher internet penetration experience higher turnout, higher turnover and tighter races, with the Internet accounting for a third of the 10 % swing against the incumbent party in 2008. In fact, the results suggest that in the absence of the internet, the opposition would not have achieved its historic upset in the 2008 elections.

Luke Miner; Greg Fischer; Alan Manning; George Michaelson; Kian Ming Ong; Yeong-chuan Lim; Henry Overman; Steve Pischke; Danny Quah; Ramasamy Ramach; Yasuyuki Sawada; Ibrahim Suffian; Dr. Fadhlullah Suhaimi

2011-01-01T23:59:59.000Z

411

Exploration Incentive Tax Credit (Montana)  

Energy.gov (U.S. Department of Energy (DOE))

The Mineral and Coal Exploration Incentive Tax Credit provides tax incentives to entities conducting exploration for minerals and coal. Expenditures related to the following activities are eligible...

412

Exploration for Uranium Ore (Virginia)  

Energy.gov (U.S. Department of Energy (DOE))

This legislation describes permitting procedures and requirements for exploration activities. For the purpose of this legislation, exploration is defined as the drilling of test holes or...

413

Microsoft Word - Pincus-R.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Using High-Resolution Cloud Simulations to Explore Using High-Resolution Cloud Simulations to Explore Variability Unresolved in Large-Scale Models R. Pincus National Oceanic and Atmospheric Administration Cooperative Institute for Research in Environmental Science Climate Diagnostics Center Boulder, Colorado S. A. Klein National Oceanic and Atmospheric Administration Geophysical Fluid Dynamics Lab Princeton, New Jersey K.-M. Xu National Aeronautics and Space Administration Langley Research Center Hampton, Virginia Fundamentals Large-scale models represent the atmospheric state as a time-evolving set of values at discrete points, each of which represents the mean within the grid-cell domain, typically 10s to 100s of km. The value at each point changes with time as various dynamic, thermodynamic, and microphysical processes act;

414

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Gulf Coast Carbon Gulf Coast Carbon Center: Exploring Carbon Public Policy Initiatives for Texas Ian J. Duncan GCCC Vision Statement The GCCC seeks to impact global levels of GHG in the atmosphere by doing science and engineering studies that will support reduction of CO2 and methane emissions and enable the development of an economically viable, multifaceted, CO2 sequestration industry in the Gulf Coast GCCC Industry Partners KEY PUBLIC POLICY STAKEHOLDERS * Texas Legislature * State Agencies * NGO's * General Public * Power Generating Companies * Coal/Lignite Mining industry * Refineries * Chemical Industry * Cement Industry * CO2 EOR Industry * Pipeline operators PUBLIC POLICY PROJECT CLASS UT's LBJ SCHOOL Course Goal: To explore the notion ......."CO2 EOR can drive the development of infrastructure

415

Microsoft PowerPoint - NRELFeb2009  

NLE Websites -- All DOE Office Websites (Extended Search)

RMOTC RMOTC The Rocky Mountain Oilfield Testing Center (RMOTC) i i il fi ld f i (RMOTC) is an operating oil field focusing on environmentally balanced energy technologies and alternatives and is the premier energy testing and alternatives and is the premier energy testing and demonstration field in the United States. 3 Location * RMOTC is located at Teapot Dome Oilfield Teapot Dome Oilfield within the Naval Petroleum Reserve No. 3 (NPR-3) * Town offices are located in Casper, Wyo. Casper WYOMING 4 Opportunities RMOTC offers testing, demonstration, research & d l i i i development opportunities in: * Renewable energy * Exploration * Environmental * Production * Drilling * Energy assurance 5 Fossil & renewable partnerships RMOTC is committed to exploring environmentally b l d l i h i ' i balanced solutions to the nation's energy issues.

416

What is the Internet doing for and to you?  

Science Conference Proceedings (OSTI)

Many HEP sites have been participating in a project to monitor end-to-end Internet performance. A few sites have acted as central collection, analysis and report generation points for the large amount of data generated. The reports are useful for short term trouble identification, long term projections, and the evaluation of Internet services. The work is illustrated by examples of both detailed and more general Internet performance.

Cottrell, R.L.A.; Logg, C.A. [Stanford Linear Accelerator Center, Menlo Park, CA (United States); Martin, D.E. [Fermi National Accelerator Center, Batavia, IL (United States). HEP Network Resource Center

1997-06-01T23:59:59.000Z

417

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 1020 of 31,917 results. 11 - 1020 of 31,917 results. Download Microsoft Word- Document in Microsoft Internet Explorer http://energy.gov/downloads/microsoft-word-document-microsoft-internet-explorer Download WC_1995_008_CLASS_WAIVER_of_Governments_Patent_Rights_In_In.pdf http://energy.gov/gc/downloads/wc1995008classwaiverofgovernmentspatentrightsininpdf Download WC_1996_001_CLASS_WAIVER_FOR_LELAND_STANFORD_JUNIOR_UNIVERSI.pdf http://energy.gov/gc/downloads/wc1996001classwaiverforlelandstanfordjunioruniversipdf Download WC_2000_003_CLASS_WAIVER_FOR_BWXT_UNDER_A_MANAGEMENT_AND_OPE.pdf http://energy.gov/gc/downloads/wc2000003classwaiverforbwxtunderamanagementandopepdf Download Preliminary Notice of Violation, MK-Ferguson of Oak Ridge Company- EA-98-08 Preliminary Notice of Violation issued to MK-Ferguson of Oak Ridge Company,

418

NSIT Computer Time Services: Internet Time Service (ITS) ...  

Science Conference Proceedings (OSTI)

Page 1. NIST Special Publication 250-59 NIST Computer Time Services: Internet Time Service (ITS), Automated Computer Time Service (ACTS), ...

2012-09-16T23:59:59.000Z

419

EDI MOVES FROM THE VAN TO THE INTERNET  

Science Conference Proceedings (OSTI)

... 6. Nash, Kim S., "Internet EDI on horizon: users worry that steep do-it-yourself security costs may spoil the view." Computerworld. ...

1996-10-28T23:59:59.000Z

420

Communication and information: alternative uses of the Internet in households  

Science Conference Proceedings (OSTI)

Keywords: Email, Internet, World Wide Web, computer-mediated communication, family communication, interpersonal communication, online services, social impact, technology adoption, user studies

Robert Kraut; Tridas Mukhopadhyay; Janusz Szczypula; Sara Kiesler; William Scherlis

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Proactive techniques for correct and predictable Internet routing  

E-Print Network (OSTI)

The Internet is composed of thousands of autonomous, competing networks that exchange reachability information using an interdomain routing protocol. Network operators must continually reconfigure the routing protocols to ...

Feamster, Nicholas G. (Nicholas Greer), 1979-

2006-01-01T23:59:59.000Z

422

A New Addressing and Forwarding Architecture for the Internet.  

E-Print Network (OSTI)

??The current Internet routing and addressing architecture is facing a serious scalability problem. The default free zone (DFZ) routing table size grows at an increasing (more)

Guo, Cong

2011-01-01T23:59:59.000Z

423

Impact of the Internet on Tourism and Hospitality in Kenya.  

E-Print Network (OSTI)

??This thesis gives an insight into the importance of the use of the Internet in tourism and hospitality industries in Kenya. The aim of this (more)

Njung'e, Mercyanne

2013-01-01T23:59:59.000Z

424

Automatisierte Wahl von Kommunikationsprotokollen fr das heutige und zuknftige Internet.  

E-Print Network (OSTI)

??Das erfolgreiche Internet basiert auf einer groen Anzahl unterschiedlicher Kommunikationsprotokolle. Diese erfllen wesentliche Aufgaben, wie Adressierung, Datentransport oder sichere Kommunikation. Whlt man die richtigen Protokolle (more)

Vlker, Lars

2012-01-01T23:59:59.000Z

425

The regulation of internet interconnection : assessing network market power  

E-Print Network (OSTI)

Interconnection agreements in the telecommunications industry have always been constrained by regulation. Internet interconnection has not received the same level of scrutiny. Recent debates regarding proposed mergers, ...

Maida, Elisabeth M. (Elisabeth Marigo)

2013-01-01T23:59:59.000Z

426

What You Don't Know About the Internet  

Science Conference Proceedings (OSTI)

... different from disseminating the information through a home page on the World Wide Web. Another very important consideration on the Internet is security.

427

Internet Banking in Greece: Development, Evaluation and Perspectives.  

E-Print Network (OSTI)

??Revolutionary developments in marketing, information and communications technology continue to transform the banking and financial industry. Distribution of banking services through the Internet is an (more)

Papandreou, Andreas-Nikolaos

2006-01-01T23:59:59.000Z

428

Consumer and Business Deception on the Internet: Content Analysis of Documentary Evidence  

Science Conference Proceedings (OSTI)

Internet deception threatens the sustainability of Internet commerce because it undermines trust. This paper investigates the deceptive tactics available on the Internet and some of the factors that make them more or less likely to be adopted. An established ... Keywords: Computer Crime, Electronic Commerce, Information Security, Internet Deception, Internet Fraud

Stefano Grazioli; Sirkka L. Jarvenpaa

2003-06-01T23:59:59.000Z

429

In Search of Copyrights Lost Ark: Interpreting the Right to Distribute in the Internet Age  

E-Print Network (OSTI)

photographs posted on internet website implicated Playboy's 512 in holding that an Internet provider which serves,Statutory Damages in the Internet Age (in process) (

Menell, Peter S

2010-01-01T23:59:59.000Z

430

Microsoft Project: Essentials for Beginners This course aims to help you manage projects, both small and large, by introducing  

E-Print Network (OSTI)

materials Costs Constraints and deadlines Project monitoring Printing Course Format: This is a oneMicrosoft Project: Essentials for Beginners Overview: This course aims to help you manage projects, both small and large, by introducing you to Microsoft Project 2007. The course covers the important

Frean, Marcus

431

The Microsoft Certified Master (MCM) program draws its strength from deep, hands-on product expertise delivered by instructors  

E-Print Network (OSTI)

: Directory program. Walter joined Microsoft in 2004 as a Senior Consultant in the Washington, DC, area prior technical content. Kimberly is the President and Founder of SQLskills.com. Windows Server 2008: Directory Walter Boyd is the Program Manager leading the Microsoft Certified Master: Windows Server® 2008

Fähndrich, Manuel A.

432

Exploring new energy alternatives.  

Science Conference Proceedings (OSTI)

What is most likely to satisfy our energy needs in the future - wind farms and photovoltaic arrays, or something yet to be invented? Options for the world's energy future may include surprises, thanks to innovative research under way around the world. The article focuses on the energy sources alternatives in the U.S. It explores innovations for energy sources such as wind farms, solar thermal concentrators, solar cells, and geothermal energy production. It states that the attainment of energy efficiency through conversation or improved technology allows to extract more applied energy. It points out that techniques are being explored to expand the possible fuel materials to includes other types of uranium and thorium. Furthermore, it discusses the capability of nanotechnology in offering a tool which could help create designs that convert energy more efficiently.

LePoire, D.J. (Environmental Science Division)

2011-09-01T23:59:59.000Z

433

RMOTC - Testing - Exploration  

NLE Websites -- All DOE Office Websites (Extended Search)

Exploration Helicopter flying over RMOTC testing facility for leak detection survey test Notice: As of July 15th 2013, the Department of Energy announced the intent to sell Naval Petroleum Reserve Number 3 (NPR3). The sale of NPR-3 will also include the sale of all equipment and materials onsite. A decision has been made by the Department of Energy to complete testing at RMOTC by July 1st, 2014. RMOTC will complete testing in the coming year with the currently scheduled testing partners. For more information on the sale of NPR-3 and sale of RMOTC equipment and materials please join our mailing list here. RMOTC's extensive exploration-related data sets, including 3D and 2D seismic, wells and logging data, and cores - both physical core samples, stored in Casper, and core analysis data and reports - provide a great

434

Computation in Large-Scale Scientific and Internet Data Applications is a Focus of MMDS 2010  

E-Print Network (OSTI)

The 2010 Workshop on Algorithms for Modern Massive Data Sets (MMDS 2010) was held at Stanford University, June 15--18. The goals of MMDS 2010 were (1) to explore novel techniques for modeling and analyzing massive, high-dimensional, and nonlinearly-structured scientific and Internet data sets; and (2) to bring together computer scientists, statisticians, applied mathematicians, and data analysis practitioners to promote cross-fertilization of ideas. MMDS 2010 followed on the heels of two previous MMDS workshops. The first, MMDS 2006, addressed the complementary perspectives brought by the numerical linear algebra and theoretical computer science communities to matrix algorithms in modern informatics applications; and the second, MMDS 2008, explored more generally fundamental algorithmic and statistical challenges in modern large-scale data analysis.

Mahoney, Michael W

2010-01-01T23:59:59.000Z

435

Exploration for deep coal  

Science Conference Proceedings (OSTI)

The most important factor in safe mining is the quality of the roof. The article explains how the Rosebud Mining Co. conducts drilling and exploration in 11 deep coal mine throughout Pennsylvania and Ohio. Rosebud uses two Atlas Copco CS10 core drilling rigs mounted on 4-wheel drive trucks. The article first appeared in Atlas Copco's in-house magazine, Deep Hole Driller. 3 photos.

NONE

2008-12-15T23:59:59.000Z

436

Influences, usage, and outcomes of Internet health information searching: Multivariate results from the Pew surveys  

E-Print Network (OSTI)

Journal of Medical Internet Research, 4(1), e2. Crow, G. ,Journal of Medical Internet Research, 5(2):e10. Retrieved onJournal of Medical Internet Research, 5(3), e21.

Rice, Ronald E

2006-01-01T23:59:59.000Z

437

Report of the national workshop on internet voting: issues and research agenda  

Science Conference Proceedings (OSTI)

As use of the Internet in commerce, education and personal communication has become common, the question of Internet voting in local and national elections naturally arises. In addition to adding convenience and precision, some believe that Internet ...

C. D. Mote, Jr.

2000-05-01T23:59:59.000Z

438

DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx DOE site facility mgt contracts Internet Posting 5-2-11.xlsx...

439

Review: Oral Tradition and the Internet: Pathways of the Mind by John Miles Foley  

E-Print Network (OSTI)

Oral tradition and the Internet: Pathways of the mind.Oral Tradition and the Internet: Pathways of the Mind, bybook, Oral Tradition and the Internet: Pathways of the Mind,

Litwin, Rory B

2013-01-01T23:59:59.000Z

440

Internet Self-Injury Forums as Communities of Social-Cognitive Literacy Practice  

E-Print Network (OSTI)

K. Y. A. (2004). The Internet and social life. Annual ReviewThe Oxford handbook of Internet psychology (pp. 223-236).Sage. Ess, C. (2007). Internet research ethics. In A. N.

Brett, Jeremy

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Internet use and personal empowerment of hearing-impaired adolescents  

Science Conference Proceedings (OSTI)

The Internet has become an ordinary and widely accepted alternative social environment-known as cyberspace-in which many people take part in numerous activities. For the hearing-impaired, cyberspace provides extra benefits for two basic reasons: means ... Keywords: Adolescents, Empowerment, Hearing-impaired, Internet, Well-being

Azy Barak; Yael Sadovsky

2008-09-01T23:59:59.000Z

442

Identity based architecture for secure communication in future internet  

Science Conference Proceedings (OSTI)

We propose to enhance the Next Generation Internet by creating a secure and scalable communication infrastructure that mirrors the structure of the real world: people talk to people, objects, objects between themselves and, in general, entities denoted ... Keywords: digital identity, identity-to-identity, next generation internet, overlay network

Antonio F. Gomez-Skarmeta; Pedro Martinez-Julia; Joao Girao; Amardeo Sarma

2010-10-01T23:59:59.000Z

443

Evolution of internet address space deaggregation: myths and reality  

Science Conference Proceedings (OSTI)

Internet routing table size growth and BGP update churn are two prominent Internet scaling issues. There is widespread belief in a high and fast growing number of ASs that deaggregate prefixes, e.g., due to multi-homing and for the purpose of traffic ... Keywords: address deaggregation, routing table growth, traffic engineering, update churn

Luca Cittadini; Wolfgang Muhlbauer; Steve Uhlig; Randy Bush; Pierre Francois; Olaf Maennel

2010-10-01T23:59:59.000Z

444

Assessing the Security of a Clean-Slate Internet Architecture  

E-Print Network (OSTI)

Assessing the Security of a Clean-Slate Internet Architecture Gowtham Boddapati John Day Ibrahim Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate a comprehensive approach to security. Most recently, there have been attempts to design clean- slate internet

Texas at Arlington, University of

445

End-to-end routing behavior in the internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

2006-10-01T23:59:59.000Z

446

End-to-end routing behavior in the Internet  

Science Conference Proceedings (OSTI)

The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements ...

Vern Paxson

1996-08-01T23:59:59.000Z

447

Controlling access to the Internet: The role of filtering  

Science Conference Proceedings (OSTI)

Controlling access to the Internet by means of filtering software has become a growth industry in the U.S. and elsewhere. Its use has increased as the mandatory response to the current plagues of society, namely, pornography, violence, hate, and ... Keywords: Internet, United States, ethics, filters, free speech, laws, libraries

R. S. Rosenberg

2001-05-01T23:59:59.000Z

448

The broadband bonus: Estimating broadband Internet's economic value  

Science Conference Proceedings (OSTI)

How much economic value did broadband Internet create? Despite the importance of this question for national policy, no research has estimated broadband's incremental contribution to U.S. GDP by calibrating against historical adoption and incorporating ... Keywords: Broadband, Economic value, Internet, Surplus

Shane Greenstein; Ryan C. McDevitt

2011-08-01T23:59:59.000Z

449

Understanding the Internet: A Guide for Materials Scientists and ...  

Science Conference Proceedings (OSTI)

Archie, the first Internet-wide archive index, allows users to search for files by name and .... Terminal access meant that users had to enter different commands for each .... One of the oldest and still best guides to the Internet, both in terms of...

450

The diffusion of the Internet: A cross-country analysis  

Science Conference Proceedings (OSTI)

This paper analyzes the process of Internet diffusion across the world using a panel of 214 countries during the period 1990-2004. Countries are classified as low- or high-income and it is shown that the diffusion process is characterized by a different ... Keywords: Digital divide, Internet, Network externalities, O14, O33, O57, S-shape curve, Technological diffusion

Luis Andrs; David Cuberes; Mame Diouf; Toms Serebrisky

2010-06-01T23:59:59.000Z

451

ICTs and Internet adoption in China's tourism industry  

Science Conference Proceedings (OSTI)

The fast development of information communication technologies (ICTs) and the expansion of the Internet have changed industry structures around the world. New technologies have been adopted in the tourism industry in Europe and America for more than ... Keywords: China, ICT, Internet, Tourism

Jennifer Xiaoqiu Ma; Dimitrios Buhalis; Haiyan Song

2003-12-01T23:59:59.000Z

452

Vehicular networks and the future of the mobile internet  

Science Conference Proceedings (OSTI)

The first DARPA experiment with wireless mobile Internet - the Packet Radio Network or PRNET - was completely independent of the infrastructure. This model was consistent with DARPA military goals as the PRNET was designed to support tactical operations ... Keywords: Mobile Internet, VANET, Vehicular network, Wireless network architecture

Mario Gerla; Leonard Kleinrock

2011-02-01T23:59:59.000Z

453

Understanding and modeling the internet topology: economics and evolution perspective  

Science Conference Proceedings (OSTI)

In this paper, we seek to understand the intrinsic reasons for the well-known phenomenon of heavy-tailed degree in the Internet AS graph and argue that in contrast to traditional models based on preferential attachment and centralized optimization, the ... Keywords: autonomous systems, clustering coefficient, degree distribution, internet topology, random walk, wealth evolution

Xiaoming Wang; Dmitri Loguinov

2010-02-01T23:59:59.000Z

454

Farm management systems and the Future Internet era  

Science Conference Proceedings (OSTI)

Smart/precision farming systems are expected to play an important role in improving farming activities. During the past years, sophisticated farm management systems have emerged to replace outdated complex and monolithic farm systems and software tools. ... Keywords: Farm management system, Future Internet, Generic enablers, Internet of Things

Alexandros Kaloxylos; Robert Eigenmann; Frederick Teye; Zoi Politopoulou; Sjaak Wolfert; Claudia Shrank; Markus Dillinger; Ioanna Lampropoulou; Eleni Antoniou; Liisa Pesonen; Huether Nicole; Floerchinger Thomas; Nancy Alonistioti; George Kormentzas

2012-11-01T23:59:59.000Z

455

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

456

Forecasting broadband Internet adoption on trains in Belgium  

Science Conference Proceedings (OSTI)

Thanks to the massive success of mobile access devices such as netbooks or Apple's iPhone 3G, Internet on the move has become one of the prominent features of today's information society. With the emergence of wireless and mobile communication networks, ... Keywords: Railroad industry, Segmentation forecasting, User-centric research, Wireless Internet services

Tom Evens; Dimitri Schuurman; Lieven De Marez; Gino Verleye

2010-02-01T23:59:59.000Z

457

of Internet-based Capabilities References: See Attachment 1  

E-Print Network (OSTI)

responsible and effective use of Internet-based capabilities, including social networking services (SNS). This policy recognizes that Internet-based capabilities are integral to operations across the Department of Defense. This DTM is effective immediately; it will be converted to a new

unknown authors

2012-01-01T23:59:59.000Z

458

Associating Internet usage with depressive behavior among college students  

E-Print Network (OSTI)

Abstract Depression is a mental health problem affecting a large population of college students. Since college students are active users of the Internet today, investigating associations between symptoms of depression and Internet usage has been an active area of research. While existing studies do provide critical insights, they are limited due to the fact that Internet usage of subjects is characterized by means of self-reported surveys only. In this paper, we report our findings on a month long experiment conducted at Missouri University of Science and Technology on associating depressive symptoms among college students and Internet usage using real Internet data collected continuously, unobtrusively and preserving privacy. In our study, 216 undergraduates were surveyed for depressive symptoms using the CES-D scale. We then collected their on-campus Internet usage via Cisco NetFlow records. Subsequent analysis revealed that several Internet usage features like average packets per flow, peer-to-peer (octets, packets and duration), chat octets, mail (packets and duration), ftp duration, and remote file octets exhibit a statistically significant correlation with depressive symptoms. Additionally, Mann-Whitney U-tests revealed that average packets per flow, remote file octets, chat (octets, packets and duration) and flow duration entropy demonstrate statistically significant differences in the mean values across groups with and without depressive symptoms. To the best of our knowledge, this is the first study that associates depressive symptoms among college students with continuously collected real Internet data.

Raghavendra Kotikalapudi; Frances Montgomery; Donald Wunsch

2012-01-01T23:59:59.000Z

459

Exploration and Development Techniques for Basin and Range Geothermal  

Open Energy Info (EERE)

Techniques for Basin and Range Geothermal Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Exploration and Development Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Abstract Abstract unavailable. Authors David D. Blackwell, Mark Leidig, Richard P. Smith, Stuart D. Johnson and Kenneth W. Wisian Conference GRC Annual Meeting; Reno, NV; 2002/09/22 Published Geothermal Resources Council, 2002 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Exploration and Development Techniques for Basin and Range Geothermal Systems: Examples from Dixie Valley, Nevada Citation David D. Blackwell,Mark Leidig,Richard P. Smith,Stuart D. Johnson,Kenneth

460

Randomness Quality of CI Chaotic Generators: Applications to Internet Security  

E-Print Network (OSTI)

Due to the rapid development of the Internet in recent years, the need to find new tools to reinforce trust and security through the Internet has became a major concern. The discovery of new pseudo-random number generators with a strong level of security is thus becoming a hot topic, because numerous cryptosystems and data hiding schemes are directly dependent on the quality of these generators. At the conference Internet`09, we have described a generator based on chaotic iterations, which behaves chaotically as defined by Devaney. In this paper, the proposal is to improve the speed and the security of this generator, to make its use more relevant in the Internet security context. To do so, a comparative study between various generators is carried out and statistical results are given. Finally, an application in the information hiding framework is presented, to give an illustrative example of the use of such a generator in the Internet security field.

Bahi, Jacques M; Guyeux, Christophe; Wang, Qianxue

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Darknet-Based Inference of Internet Worm Temporal Characteristics  

E-Print Network (OSTI)

Internet worm attacks pose a significant threat to network security and management. In this work, we coin the term Internet worm tomography as inferring the characteristics of Internet worms from the observations of Darknet or network telescopes that monitor a routable but unused IP address space. Under the framework of Internet worm tomography, we attempt to infer Internet worm temporal behaviors, i.e., the host infection time and the worm infection sequence, and thus pinpoint patient zero or initially infected hosts. Specifically, we introduce statistical estimation techniques and propose method of moments, maximum likelihood, and linear regression estimators. We show analytically and empirically that our proposed estimators can better infer worm temporal characteristics than a naive estimator that has been used in the previous work. We also demonstrate that our estimators can be applied to worms using different scanning strategies such as random scanning and localized scanning.

Wang, Qian; Chen, Chao

2010-01-01T23:59:59.000Z

462

Life Cycle Environmental Assessment of the Internet: The Benefits and  

NLE Websites -- All DOE Office Websites (Extended Search)

Life Cycle Environmental Assessment of the Internet: The Benefits and Life Cycle Environmental Assessment of the Internet: The Benefits and Impacts of Innovative Technologies Speaker(s): Oliver Jolliet Date: July 15, 2004 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Thomas McKone This seminar starts by providing a short introduction to the field of Environmental Life Cycle Assessment (LCA) through a practical example of packaging. It will then develop the case of the Life Cycle Benefits and Impacts of the Internet; raising the different scientific challenges that LCA faces to provide relevant results for innovative technologies.--The rapid development of the Internet and the related potential impacts on and benefits for the environment deserves attention. The infrastructure that supports a university's use of the Internet has been comprehensively

463

Exploring colourful holographic superconductors  

E-Print Network (OSTI)

We explore a class of holographic superconductors built using non-abelian condensates on probe branes in conformal and non-conformal backgrounds. These are shown to exhibit behaviour of the specific heat which resembles that of heavy fermion compounds in the superconducting phase. Instead of showing BCS-like exponential behaviour, the specific heat is polynomial in the temperature. It exhibits a jump at the critical temperature, in agreement with real-world superconductors. We also analyse the behaviour of the energy gap and the AC and DC conductivities, and find that the systems can be either semi-conducting or metallic just above the critical temperature.

Kasper Peeters; Jonathan Powell; Marija Zamaklar

2009-07-09T23:59:59.000Z

464

Exploring colourful holographic superconductors  

E-Print Network (OSTI)

We explore a class of holographic superconductors built using non-abelian condensates on probe branes in conformal and non-conformal backgrounds. These are shown to exhibit behaviour of the specific heat which resembles that of heavy fermion compounds in the superconducting phase. Instead of showing BCS-like exponential behaviour, the specific heat is polynomial in the temperature. It exhibits a jump at the critical temperature, in agreement with real-world superconductors. We also analyse the behaviour of the energy gap and the AC and DC conductivities, and find that the systems can be either semi-conducting or metallic just above the critical temperature.

Peeters, Kasper; Zamaklar, Marija

2009-01-01T23:59:59.000Z

465

Microsoft Word - Acoustek_final_Jan2009  

NLE Websites -- All DOE Office Websites (Extended Search)

88 88 BP GROUP: ACOUSTEK ASSESSMENT A demonstration of a pipeline monitoring system, Naval Petroleum Reserve No. 3, Teapot Dome Field, Wyoming Final Report for the Period of September 29-October 3, 2008 Date Completed: January 6, 2009 By Barry Lennox & Xuesong Wang, University of Manchester David Mackay, BP Exploration Mike Curtis, RMOTC Prepared for the United States Department of Energy Office of Fossil Energy Work performed under Rocky Mountain Oilfield Testing Center (RMOTC) CRADA 2008-112 DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors or their employees,

466

Microsoft Word - PBII Plenary Paper.doc  

Office of Scientific and Technical Information (OSTI)

From Plasma Immersion Ion Implantation to Deposition: From Plasma Immersion Ion Implantation to Deposition: A Historical Perspective on Principles and Trends André Anders Lawrence Berkeley National Laboratory, University of California, Berkeley, California 94720, USA Abstract Plasma immersion techniques of surface modification are known under a myriad of names. The family of techniques reaches from pure plasma ion implantation, to ion implantation and deposition hybrid modes, to modes that are essentially plasma film deposition with substrate bias. In the most general sense, all plasma immersion techniques have in common that the surface of a substrate (target) is exposed to plasma and that relatively high substrate bias is applied. The bias is usually pulsed. In this review, the roots of immersion techniques are explored, some going back

467

Microsoft Word - agreement_scanned.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

IMPLEMENTING ARRANGEMENT IMPLEMENTING ARRANGEMENT BETWEEN THE DEPARTMENT OF ENERGY OF THE UNITED STATES OF AMERICA AND THE DEPARTMENT OF TRADE AND INDUSTRY OF THE UNITED KINGDOM OF GREAT BRITAIN AND NORTHERN IRELAND TO COOPERATE IN THE FIELD OF FOSSIL ENERGY TECHNOLOGY WHEREAS, The Department of Energy of the United States of America (DOE) and the Department of Trade and Industry of the United Kingdom of Great Britain and Northern Ireland (DTI), hereinafter referred to as the "Participants"; Entered into a Memorandum of Understanding on Collaboration in Energy Research and Development on November 6, 2000 (the "the MOU"); Share an interest in joint planning and exchange of information and personnel in the field of cleaner coal technology, and for exploring opportunities for expanded fossil energy utilization,

468

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

FIFTH ANNUAL CONFERENCE ON CARBON CAPTURE AND SEQUESTRATION - DOE/NETL FIFTH ANNUAL CONFERENCE ON CARBON CAPTURE AND SEQUESTRATION - DOE/NETL May 8 - 11, 2006 CONFERENCE PROCEEDINGS Comparing Climate-Change Mitigating Potentials of Alternative Synthetic Liquid Fuel Technologies Using Biomass and Coal Robert H. Williams 1 , Eric D. Larson 1 , Haiming Jin 2 1 Princeton Environmental Institute, Princeton University Guyot Hall, Washington Road, Princeton, NJ, 08544 2 TX Energy, 1330 Post Oak Boulevard, Suite 1600, Houston, TX, 77056 Abstract The climate-change mitigation potentials of alternative options for making synthetic liquid fuel from coal and biomass without and with CO 2 capture and storage are explored. The emphasis is on making Fischer-Tropsch liquids, with comparisons to cellulosic ethanol. Particular attention is

469

Microsoft Word - HgAcBr  

NLE Websites -- All DOE Office Websites (Extended Search)

August 2013 August 2013 Quantification of the Mercury Adsorption Mechanism on Brominated Activated Carbon The primary anthropogenic source of mercury (Hg) emissions into the atmosphere is coal- fired power utilities. This work explores materials designed for Hg capture to be applied in the ductwork of a power plant to prevent Hg release into the atmosphere. Bench-scale com- bustion experiments have been carried out, in which sorbent materials were placed in a simulated flue gas stream doped with ppb levels of Hg. The sorbent surfaces were probed using x-ray absorption spectroscopy to determine the mechanism of Hg binding and to ultimately improve solvent design. The spectroscopy data was analyzed alongside results from density functional theory (DFT) for benchmarking so that DFT can be used as a

470

Microsoft Word - SD452.3 FINAL  

National Nuclear Security Administration (NNSA)

NA SD M 452.3-1 NA SD M 452.3-1 Approved: 12-10-09 DEFENSE PROGRAMS BUSINESS REQUIREMENTS AND PROCESSES MANUAL NATIONAL NUCLEAR SECURITY ADMINISTRATION Office of Defense Programs AVAILABLE ONLINE AT: INITIATED BY: http://www.nnsa.energy.gov Office of Defense Programs NA SD M 452.3-1 Page 12-10-09 1 DEFENSE PROGRAMS BUSINESS REQUIREMENTS AND PROCESSES MANUAL 1. PURPOSE. This Department of Energy (DOE), National Nuclear Security Administration (NNSA) Business Requirements and Process Manual supplements DOE O 452.3 "Management of the Department of Energy Nuclear Weapons Complex." This supplemental directive establishes the Requirements Modernization and Integration (RMI) Explorer as the electronic Defense Programs manual that implements DOE O

471

Microsoft PowerPoint - Proceedings Cover Sheets  

NLE Websites -- All DOE Office Websites (Extended Search)

Mineralization in Mineralization in Mineralization in Mineralization in Calcium Silicate Calcium Silicate Building Products Building Products Yixin Shao, Jun Chang and Sam Wang Yixin Shao, Jun Chang and Sam Wang Department of Civil Engineering Department of Civil Engineering McGill University McGill University Montreal, Canada Montreal, Canada Objectives Objectives To explore the possibility of sequestering carbon dioxide in calcium-carrying building products through their early age carbonation curing using recovered CO 2 or as-captured flue gas The potential carbon uptake by the commercial building products The strength gain and durability performance of the carbonated products To demonstrate environmental, technical and economical benefits of the technology The market The market Portland cement annual production:

472

Microsoft Word - LB-Lignite.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

Name Organization E-Mail Darin Damiani, U.S. Department of Energy, Darin.Damiani@netl.doe.gov Principal Investigator Edward Steadman Field Test Information: Field Test Name Lignite in North Dakota Field Validation Test Test Location Section 36-T159N-R90W in Burke County, North Dakota Amount and Source of CO 2 Tons Less than 500 tons for the project Source Commercial source - Praxair Flatland Exploration Company, subsidiary of Fischer Oil and Gas ND State Land Department Eagle Operating, Inc. Schlumberger Field Test Partners (Primary Sponsors) Praxair Summary of Field Test Site and Operations: CO 2 in an Unminable Lignite Seam - The site for the pilot-scale CO 2 sequestration-enhanced coalbed methane (ECBM) project operated by the Energy & Environmental Research Center is

473

Microsoft Word - ARRA Final Report Cover_1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Geothermal Technologies Program Geothermal Technologies Program under the American Recovery and Reinvestment Act OAS-RA-11-05 March 2011 Department of Energy Washington, DC 20585 March 22, 2011 MEMORANDUM FOR THE UNDER SECRETARY OF ENERGY FROM: Gregory H. Friedman Inspector General SUBJECT: INFORMATION: Audit Report on "The Department of Energy's Geothermal Technologies Program under the American Recovery and Reinvestment Act" BACKGROUND Under the American Recovery and Reinvestment Act of 2009 (Recovery Act), the Department of Energy's Geothermal Technologies Program received $400 million to promote the exploration and development of new geothermal fields and innovative research into advanced geothermal technologies. This funding represents an almost ten-fold increase over the $44 million originally

474

Internet as Teenager In Higher Education: Rapid Growth, Transformation, Uncertain but Bright Future  

E-Print Network (OSTI)

Internet is challenging higher education. Perhaps the mostMatkin, INTERNET AS TEENAGER IN HIGHER EDUCATION Notes Chronicle of Higher Education, E-Learning: Successes and

Matkin, Gary

2007-01-01T23:59:59.000Z

475

Rethinking the Design of the Internet: End to End Arguements vs. the Brave New World  

E-Print Network (OSTI)

This paper looks at the Internet and the changing set of requirements for the Internet that are 8oriented towards the consumer, and used for a

Clark, David

476

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11.pdf...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11.pdf More Documents & Publications DOEMajorSiteFacilityCon...

477

DOE_site_facility_mgt_contracts_Internet_Posting_3-21-11(1).pdf...  

NLE Websites -- All DOE Office Websites (Extended Search)

(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf DOEsitefacilitymgtcontractsInternetPosting3-21-11(1).pdf More Documents & Publications...

478

U-261: Novell GroupWise Internet Agent "Content-Length" Integer...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability U-261: Novell GroupWise Internet Agent "Content-Length" Integer Overflow Vulnerability September...

479

An Examination of Internet Pornography Usage Among Male Students at Evangelical Christian Colleges.  

E-Print Network (OSTI)

?? Internet pornography access among male students at Evangelical Christian colleges presents two dilemmas. First, Internet pornography access is institutionally prohibited based on a Biblical (more)

Chelsen, Paul Olaf

2011-01-01T23:59:59.000Z

480

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include comm...

Tatu Ylonen Ssh; Tatu Ylonen; Tatu Ylonen

1996-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "microsoft internet explorer" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

SSH - Secure Login Connections over the Internet  

E-Print Network (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, and symmetric algorithms (e.g., IDEA or threekey triple-DES) for encrypting transferred data. SSH is intended as a replacement for the existing rsh, rlogin, rcp, rdist, and telnet protocols. SSH is currently (March 1996) being used at thousands of sites in at least 50 countries. Its users include top universities, research laboratories, many major corporations, and numerous smaller companies and individuals. The SSH protocol can also be used as a generic transport layer encryption mechanism, providing both host authentication and user authentication, together with privacy and integrity protection. 1 Introduction The Internet has become the most economical means for communication between two remote sites. Its uses include commun...

Tatu Ylnen

1996-01-01T23:59:59.000Z

482

Central Internet Database (CID) Related Links  

Office of Environmental Management (EM)

Related Links Related Links Central Internet Database CID Photo Banner Links to Waste and Materials Disposition Information Below is a collection of reports and links to various documents that provide information related to waste and material disposition. While most of these are directly related to the Department of Energy's waste management activities, some links include information from the commercial sector. Some of the information provides an historical context for current waste disposition alternatives. To view PDF documents, please ensure Adobe Reader is installed on your computer, it is available to download here Exit CID Website . Waste Volume Related Databases For DOE/EM waste and material stream data: Waste Information Management System (WIMS) provided by Florida International University Exit CID Website

483

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Archived Data Dictionary Archived Data Dictionary Central Internet Database CID Photo Banner Archived Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Stream Disposition Quantity* EM Corp - The quantity of material or waste dispositioned for the stream during a specified year or range of years. Annual Stream Inventory Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be stored as of a particular year or range of years. Annual Stream Source Quantity* EM Corp - The amount of waste, media or SNF in the stream that is or will be generated new, generated as process outputs (secondary), or added through a receipt from another DOE or non-DOE site, in a particular year or range of years.

484

Central Internet Database (CID) Data Dictionary  

Office of Environmental Management (EM)

Data Dictionary Data Dictionary Central Internet Database CID Photo Banner Data Dictionary A | B | C | D | E | F | G | H | I | J | K | L | M N | O | P | Q | R | S | T | U | V | W | X | Y | Z Data Element Name Definition A Annual Disposition WIMS - Planned disposition quantity (total volume of container, as disposed, in m3) reported for each year: FY08 through FY50. B C Chemical Name TRI - (Form R - Part II - Section 1.2) The name of the toxic chemical that has been released and/or transferred during the reporting year. Listed toxic chemicals are those chemicals on the list in Committee Print Number 99-169 of the Senate Committee on Environment and Public Works, titled "Toxic Chemicals Subject to Section 313 of the Emergency Planning and Community Right-To-Know Act of 1986" (42 U.S.C. 11023). Currently, there are over 600 toxic chemicals included on the list subject to reporting.

485

Central Internet Database (CID) PEIS Settlement Information  

Office of Environmental Management (EM)

About the CID > PEIS About the CID > PEIS Settlement Agreement Information Requirements Central Internet Database CID Photo Banner PEIS Settlement Agreement Information Requirements Information Categories: Contaminated environmental media, contaminated facilities, and waste managed by the DOE Environmental Management (EM) program Contaminated facilities and waste generated or managed by the DOE Offices of Defense Programs (DP) Exit CID Website , Science (SC) Exit CID Website , and Nuclear Energy (NE) Exit CID Website . DOE-managed domestic/foreign research reactor spent nuclear fuel (spent fuel from commercial reactors is excluded ). Sites governed by Section 151(b) of the Nuclear Waste Policy Act (NWPA)* Adobe PDF Document Exit CID Website , as amended, upon the transfer of those sites to DOE ownership.

486

(for Gene Recognition Analysis Internet Link),  

NLE Websites -- All DOE Office Websites (Extended Search)

5 6/1/2011 5 6/1/2011 6.6 Speeding Up the Process of Gene Discovery The human genome contains information that could be used to prevent birth defects and treat or cure devastating diseases, but it is written in a language that scientists are only beginning to understand. To help decipher the code, Ed Uberbacher and colleagues at Oak Ridge National Laboratory combined cutting- edge computer technology with their knowledge of human biology to develop GRAIL (for Gene Recognition Analysis Internet Link), a "thinking" computer program that imitates the human learning process as it searches for genetic meaning. GRAIL and successor software programs can rapidly identify key instructions in genes from within vast stretches of DNA that appear to be meaningless-a critical contribution to the

487

Fermilab Leadership Institute Integrating Internet, Instruction and  

NLE Websites -- All DOE Office Websites (Extended Search)

Fermilab Leadership Institute Integrating Fermilab Leadership Institute Integrating Internet, Instruction and Curriculum Online Materials Projects ACT Program Information Example ACT Class Page Example LInC Class Page Please sign up here to be notified of future LInC program opportunities. Fermilab LInC Online is creating a cadre of educational leaders who effectively integrate technology in their classrooms to support engaged learning student investigations on real-world issues. Participants range from classroom teachers and technology coordinators through library media specialists, who create engaged learning projects that incorporate the best uses of technology. The new Fermilab LInC ACT course guides teachers through the process of evaluating, selecting and customizing an inquiry-based online project to

488

EXPLORER: A Natural Language Processing System for Oil Exploration  

E-Print Network (OSTI)

EXPLORER: A Natural Language Processing System for Oil Exploration Wendy G. Lehnert Department", whereas the second time "show" is used it has a technical meaning (i.e., an indicator of oil or gas Steven P. Shwartz Cognitive Systems Inc. 234 Church Street New Haven, Ct. 06510 EXPLORER (Lehnert

489

UWC geothermal resource exploration  

DOE Green Energy (OSTI)

A program was developed to explore the strength of the geothermal and hot dry rock (HDR) resource at the Montezuma Hot Springs at the United World College (UWC). The purpose of the UWC {number_sign}1 well is to obtain hydrologic, geologic, and temperature information for ongoing geothermal evaluation of the Montezuma Hot Springs area. If sufficient fluids are encountered, the hole will be cased with a 4 1/2 inch production casing and re-permitted as a geothermal low-temperature well. If no fluid is encountered, the well will be abandoned per Oil Conservation Division regulation. The objectives of the exploration are to evaluate the resource potential to provide space heating for the entire campus of the United World College, determine the effect of a well on the Hot Springs outflow, accurately measure the UWC heating loads versus time, evaluate the potential to support local thermal industry development, assess the feasibility of HDR development, and create an educational program from the collection of data derived from the research effort.

NONE

1996-04-01T23:59:59.000Z

490

DOE Data Explorer - Create Account  

Office of Scientific and Technical Information (OSTI)

DOE Data Explorer Create Account Create New Account To create a DataExplorer account, enter your email address and password below. You will be taken to your account management...

491

Autonomous Exploration: Driven by Uncertainty  

E-Print Network (OSTI)

Autonomous Exploration: Driven by Uncertainty Peter Whaite and Frank P. Ferrie TR-CIM-93-17 1993-6319 Telex: 05 268510 FAX: 514 398-7348 Email: cim@cim.mcgill.ca #12;Autonomous Exploration: Driven

Dudek, Gregory

492

Microsoft Word - 2007hsn-infocom-paper-lehman-etal.doc  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 Control Plane Architecture and Design Considerations for Multi-Service, Multi-Layer, Multi- Domain Hybrid Networks Tom Lehman 1 , Xi Yang 1 , Chin P. Guok 2 , Nageswara S. V. Rao 3 , Andy Lake 4 , John Vollbrecht 4 , Nasir Ghani 5 1 Information Sciences Institute East, University of Southern California, Arlington, VA 22203, USA, Email: {tlehman,xyang}@isi.edu 2 Network Engineering Services Group, ESnet, Berkeley, CA 94720, USA, Email: chin@es.net 3 Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831, USA, Email: raons@ornl.edu 4 University Corporation for Advanced Internet Development, Internet2, Ann Arbor, MI 48104, USA, Email: {jrv,alake}@internet2.edu 5 Department of Electrical and Computer Engineering, Tennessee Technological University, Cookville, TN 38505, USA,

493

Microsoft Word - Resource Materials_Oct09.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Resource Material Resource Material October Cyber Security Awareness Day 2009 Title # Inventory # Reproduce Description 1 Keeping Kids Safer on the Internet 50 0 NCMEC Handout 2 Stop-Think-Click 7 Practices for Safer Computing 75 0 FTC Foldout 3 Know the Rules... Internet Safety Quiz for Adults New 150 NCMEC Handout 4 Protect Your Family...Internet Safety & Security are all about you. New 150 Staysafe.org Trifold 5 Parent Texting Quiz New 150 NCMEC Handout 6 FTC Facts...Social Networking Sites: A Parent's Guide 100 0 FTC Handout 7 Work Computing Pyramid 50 50 Internal Handout 8 Home Computing Pyramid 50 50 Internal Handout 9 Tips to Prevent Sexting New 150 ConnectSafely.org Handout 10 Tips to Help Stop Cyberbullying New 150 ConnectSafely.org Handout

494

Sun-Synchronous Planetary Exploration  

E-Print Network (OSTI)

Contemporary planetary missions are characterized by favorable landing sites, communication, and duration. The ambition of planetary exploration is to discover the unknown: to explore regions, not just sites; to analyze, not just observe; and to operate effectively and reliably without excessive communication and ground support. New robotics technologies and mission concepts will revolutionize exploration systems and operations. This paper addresses the key enabling technologies for sun-synchronous planetary exploration: environmental modeling, temporal path planning, scaling, and robot configuration. 1.

William Red Whittaker; William red Whittaker; George Kantor; Ben Shamah; David Wettergreen

2000-01-01T23:59:59.000Z

495

Strategic motive of introducing Internet channels in a supply chain  

E-Print Network (OSTI)

Rapid advances of information technology in recent years have enabled both the manufacturers and the retailers to operate their own Internet channels. In this paper, we investigate the interaction between the capabilities of introducing the Internet channels, the pricing strategies, and the channel structure. We classify consumers into two segments: Grocery shoppers attach a higher utility from purchasing through the physical channel, whereas a priori Internet shoppers prefer purchasing online. We find that when the Internet shoppers are either highly profitable or fairly unimportant, the manufacturer prefers to facilitate the channel separation either through his own Internet channel or the retailers. In the intermediate region, however, the manufacturer encroaches the grocery shoppers and steals the demand from the retailers physical channel. With horizontal competition between retailers, a priori symmetric retailers may adopt different channel strategies as a stable market equilibrium. The manufacturer may willingly give up his Internet channel and leverage on the retailer competition. When the manufacturer sells through an online e-tailer, Internet shoppers may be induced to purchase through the physical channel. This reverse encroachment strategy emerges because selling through the e-tailer leads to a more severe double marginalization problem.

Lu Hsiao; Ying-ju Chen

2012-01-01T23:59:59.000Z

496

DOE Data Explorer  

Office of Scientific and Technical Information (OSTI)

DDE DDE Discovering data and non-text information in the Department of Energy DOE Data Explorer What's New About DDE DOE Data Centers OSTI's Data ID Service Featured Collection Featured Data Collection Visit CEDR View the archive Search Find Advanced Search Options × Full Text: Bibliographic Data: Creator/Author: Title: Subject: Identifier Numbers: Host Website: Research Org: Sponsor/Funding Org: Contributing Orgs: Type: Select Type Publication Date: from Date: to to Date: Sort: By Relevance By Title Limit to: Matches with DOI only Collections only (no DOIs) Clear Find Advanced Search Basic Search Browse DDE Content All Titles (alphabetically) Sponsor/Funding Organizations Types of Data and Non-text Other Related Organizations Subject Categories Some links on this page may take you to non-federal websites. Their

497

Success Stories: Carbon Explorer  

NLE Websites -- All DOE Office Websites (Extended Search)

LBNL Device Monitors Ocean Carbon LBNL Device Monitors Ocean Carbon Imagine waking up each morning and discovering that twenty percent of all plants in your garden had disappeared over night. They had been eaten. Equally astonishing would be the discovery in the afternoon that new plants had taken their place. This is the norm of life in the ocean. Without the ability to accurately observe these daily changes in ocean life cycles, over vast spatial scales, we lack the ability to predict how the ocean will respond to rising CO2 levels, crippling our ability to develop accurate models of global warming or devise strategies to prevent it. The Carbon Explorer, conceived by Berkeley Lab's James K. Bishop in collaboration with Scripps Institution of Oceanography (La Jolla, California) and WET labs, Inc. (Philomath, Oregon), bridges this

498

Microsoft PowerPoint - DSSE_Portfolio.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Knowledge Management & Analysis System Knowledge Management & Analysis System Data Systems Sciences & Engineering Group Computational Sciences & Engineering Division  Problem Statement: - DHS's DNDO subject matter experts need to collaborate with a variety of scientific data in order to support analysis of radiological and nuclear data across multiple data sites  Technical Approach: - KMAS is a web application running under Microsoft SharePoint - A common XML-based schema allows nuclear forensic data from disparate sources to be extracted and harvested d spa ate sou ces to be e t acted a d a ested  Benefit: - Transparent to the end user, the distributed database prevents KMAS from having to maintain a central library or repository of nuclear radiation data  Technology Readiness Level 9

499

Microsoft Word - Warm Rinse Guidance 6 29 2010_FINAL _2_  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

The following is a draft U.S. Department of Energy interpretive rule, which sets out the The following is a draft U.S. Department of Energy interpretive rule, which sets out the Department's views on the application of the clothes washer testing procedure described in 10 CFR § 430 Appendix J1. This draft interpretive rule represents the Department's interpretation of its existing regulations and is exempt from the notice and comment requirements of the Administrative Procedure Act. See 5 U.S.C. § 553(b)(A). Nevertheless, we are interested in receiving feedback from the public on the interpretation set forth below. Therefore, the Department is accepting comments from the public until July 30, 2010. Comments should be provided in WordPerfect, Microsoft Word, PDF, or text file format by sending an email to: WarmRinse.FAQ@hq.doe.gov. At the end of the

500

Microsoft Word - 100424 Smart Grid White Paper _final_.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NEUSTAR WHITE PAPER: NEUSTAR WHITE PAPER: WHEN SMART GRIDS GROW SMART ENOUGH TO SOLVE CRIMES March 18, 2010 I. INTRODUCTION Telecommunications carriers and Internet service providers enjoy a close-up view of our lives. They see our telephone calling patterns, track our mobile whereabouts, store our emails, and memorize our Internet browsing habits. No wonder these communication service providers often get caught in debates about the privacy of communication activities. Privacy-minded subscribers expect communication service providers to keep subscriber activities confidential. Law enforcement expects to view certain activities promptly upon request. If the service provider under-discloses or over-discloses information to law enforcement it risks legal liability.